File name:

fortnite.exe

Full analysis: https://app.any.run/tasks/0b11b8cc-ced1-44ab-af10-952ce3f041b1
Verdict: Malicious activity
Analysis date: June 06, 2025, 23:31:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
antivm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 19 sections
MD5:

CBC9CCBF67D8C8BD62DF6A5AC7715D3A

SHA1:

66B667603A40E753C57368929269A979B6331131

SHA256:

5740EA77CDA4ABC56242D4D361D6692BD0C8430D99159D6241DDFCB2375CF46B

SSDEEP:

393216:1KFyb2q4tGCYcBmZui+hinT9bdIfxYHJdPLL//fB26WGHwOsJii/ta1YwKzzLDG1:1KFyb2q4tGCYcBmZui+hinT9bdIfxYHL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • fortnite.exe (PID: 5772)
    • Process drops legitimate windows executable

      • fortnite.exe (PID: 5772)
    • Executable content was dropped or overwritten

      • fortnite.exe (PID: 5772)
      • java.exe (PID: 1512)
    • The process checks if it is being run in the virtual environment

      • java.exe (PID: 1512)
    • Reads security settings of Internet Explorer

      • java.exe (PID: 1512)
    • Connects to unusual port

      • webhelper.exe (PID: 4380)
    • There is functionality for VM detection VMWare (YARA)

      • java.exe (PID: 1512)
    • There is functionality for VM detection antiVM strings (YARA)

      • java.exe (PID: 1512)
  • INFO

    • Checks supported languages

      • fortnite.exe (PID: 5772)
      • java.exe (PID: 1512)
      • webhelper.exe (PID: 4380)
    • Reads the computer name

      • fortnite.exe (PID: 5772)
      • java.exe (PID: 1512)
      • webhelper.exe (PID: 4380)
    • Create files in a temporary directory

      • fortnite.exe (PID: 5772)
      • java.exe (PID: 1512)
      • webhelper.exe (PID: 4380)
    • The sample compiled with english language support

      • fortnite.exe (PID: 5772)
    • Reads Environment values

      • java.exe (PID: 1512)
    • Checks proxy server information

      • java.exe (PID: 1512)
      • slui.exe (PID: 7824)
    • Reads the machine GUID from the registry

      • java.exe (PID: 1512)
      • webhelper.exe (PID: 4380)
    • Reads the software policy settings

      • java.exe (PID: 1512)
      • slui.exe (PID: 7824)
    • Creates files or folders in the user directory

      • java.exe (PID: 1512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:06 23:29:09+00:00
ImageFileCharacteristics: Executable, No line numbers, Large address aware
PEType: PE32+
LinkerVersion: 2.4
CodeSize: 1820160
InitializedDataSize: 3692544
UninitializedDataSize: 4096
EntryPoint: 0x10f6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start fortnite.exe java.exe conhost.exe no specs webhelper.exe conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1512"C:\Users\admin\AppData\Local\Temp\runtime\jvm\bin\java.exe" -Djava.library.path="C:\Users\admin\AppData\Local\Temp\runtime" -cp . JNILoaderC:\Users\admin\AppData\Local\Temp\runtime\jvm\bin\java.exe
fortnite.exe
User:
admin
Company:
IBM Corporation
Integrity Level:
MEDIUM
Description:
IBM Semeru Runtime binary
Version:
21.0.7.0
Modules
Images
c:\users\admin\appdata\local\temp\runtime\jvm\bin\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\temp\runtime\jvm\bin\jli.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\users\admin\appdata\local\temp\runtime\jvm\bin\vcruntime140.dll
3268\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4380"C:\Users\admin\AppData\Local\Temp\webhelper_70fdf96ea9f2aad6\webhelper.exe" -f "C:\Users\admin\AppData\Local\Temp\webhelper_70fdf96ea9f2aad6\torrc"C:\Users\admin\AppData\Local\Temp\webhelper_70fdf96ea9f2aad6\webhelper.exe
java.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\webhelper_70fdf96ea9f2aad6\webhelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
5568\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exewebhelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5772"C:\Users\admin\AppData\Local\Temp\fortnite.exe" C:\Users\admin\AppData\Local\Temp\fortnite.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\fortnite.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7824C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 552
Read events
2 549
Write events
3
Delete events
0

Modification events

(PID) Process:(1512) java.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1512) java.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1512) java.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
136
Suspicious files
13
Text files
281
Unknown types
0

Dropped files

PID
Process
Filename
Type
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jvm.tar.gz
MD5:
SHA256:
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:5B59567B0C75089B88A855740D039BD8
SHA256:B6998B3568735638795585044ABE39D98E5CCB75BF693152F9CDEEA34B8EF2EA
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\JNILoader.classbinary
MD5:01EF331C79582C5F6EC1B438186FA709
SHA256:600023E3A93ACF0C2103AE42B3DE7802CB55EF6FEBDDC92AE99606025C998C13
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-localization-l1-2-0.dllexecutable
MD5:BEEFC05B866F087F8BE9713E2508599E
SHA256:01541491A8AB8E149919BA79923D972D63A7443CC293F36A8C942E1C0F8C9DD5
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-console-l1-2-0.dllexecutable
MD5:1307FF6815D39C2B6E1B67832BA34B6B
SHA256:DCB1DDFA6283118C0D9B8104D5FAA3F1866D756101D791EA75E558E04126B6C1
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:BE69F5B751F68B767F6DE67C6031EE1D
SHA256:BF09558A8675EC3F6293A978C9E1646B544D1E7CCEB6F50BB60D0D2884127DDA
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:F2F8E4305FF4E356393CF7DF02065B06
SHA256:344CD73BDFB0517F6C58A54185C0AD239949A9512429F84A8A053CFAE3226C79
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-heap-l1-1-0.dllexecutable
MD5:F0572BADFA6821A356C1C23CBE4BE831
SHA256:F3C4DDDE443E408044E066A413C64B438EA0EA3D378C7C6914E8663A638E9947
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:FB3BD208799D3ADF88954EE5A066AC5A
SHA256:42ACC4086C60FB958B6CC0FA4B0C89AD75D3CA933B3ABB6BD11536308C942F14
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-processthreads-l1-1-1.dllexecutable
MD5:55DD78B7600045C7AA225D8E6CE33BDF
SHA256:5107BDE4C31717A8E1098799950796165AF53EDD0FE4EE90A29D0126BC7BCC1A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
37
DNS requests
25
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEFZnHQTqT5lMbxCBR1nSdZQ%3D
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSr83eyJy3njhjVpn5bEpfc6MXawQQUOuEJhtTPGcKWdnRJdtzgNcZjY5oCEQDzZE5rbgBQI34JRr174fUd
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
whitelisted
5508
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
756
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTPlNxcMEqnlIVyH5VuZ4lawhZX3QQU9oUKOxGG4QR9DqoLLNLuzGR7e64CEQCrZoa1YnvoBZaCEzAShkn1
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
whitelisted
5508
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1512
java.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
7636
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5608
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5772
fortnite.exe
140.82.121.4:443
github.com
GITHUB
US
whitelisted
756
lsass.exe
172.64.149.23:80
ocsp.comodoca.com
CLOUDFLARENET
US
whitelisted
4
System
192.168.100.255:138
whitelisted
756
lsass.exe
104.18.38.233:80
ocsp.comodoca.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.22
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 2.23.246.101
whitelisted
google.com
  • 216.58.212.142
whitelisted
github.com
  • 140.82.121.4
whitelisted
ocsp.comodoca.com
  • 172.64.149.23
  • 104.18.38.233
whitelisted
ocsp.usertrust.com
  • 172.64.149.23
  • 104.18.38.233
whitelisted
ocsp.sectigo.com
  • 104.18.38.233
  • 172.64.149.23
whitelisted
objects.githubusercontent.com
  • 185.199.111.133
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.108.133
whitelisted
archive.torproject.org
  • 159.69.63.226
shared

Threats

PID
Process
Class
Message
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 201
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 293
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 805
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 840
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 201
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 293
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 763
No debug info