File name:

fortnite.exe

Full analysis: https://app.any.run/tasks/0b11b8cc-ced1-44ab-af10-952ce3f041b1
Verdict: Malicious activity
Analysis date: June 06, 2025, 23:31:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
antivm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 19 sections
MD5:

CBC9CCBF67D8C8BD62DF6A5AC7715D3A

SHA1:

66B667603A40E753C57368929269A979B6331131

SHA256:

5740EA77CDA4ABC56242D4D361D6692BD0C8430D99159D6241DDFCB2375CF46B

SSDEEP:

393216:1KFyb2q4tGCYcBmZui+hinT9bdIfxYHJdPLL//fB26WGHwOsJii/ta1YwKzzLDG1:1KFyb2q4tGCYcBmZui+hinT9bdIfxYHL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • fortnite.exe (PID: 5772)
      • java.exe (PID: 1512)
    • Process drops legitimate windows executable

      • fortnite.exe (PID: 5772)
    • The process drops C-runtime libraries

      • fortnite.exe (PID: 5772)
    • The process checks if it is being run in the virtual environment

      • java.exe (PID: 1512)
    • Reads security settings of Internet Explorer

      • java.exe (PID: 1512)
    • Connects to unusual port

      • webhelper.exe (PID: 4380)
    • There is functionality for VM detection VMWare (YARA)

      • java.exe (PID: 1512)
    • There is functionality for VM detection antiVM strings (YARA)

      • java.exe (PID: 1512)
  • INFO

    • Checks supported languages

      • fortnite.exe (PID: 5772)
      • java.exe (PID: 1512)
      • webhelper.exe (PID: 4380)
    • The sample compiled with english language support

      • fortnite.exe (PID: 5772)
    • Reads Environment values

      • java.exe (PID: 1512)
    • Create files in a temporary directory

      • fortnite.exe (PID: 5772)
      • java.exe (PID: 1512)
      • webhelper.exe (PID: 4380)
    • Reads the computer name

      • java.exe (PID: 1512)
      • fortnite.exe (PID: 5772)
      • webhelper.exe (PID: 4380)
    • Checks proxy server information

      • java.exe (PID: 1512)
      • slui.exe (PID: 7824)
    • Reads the software policy settings

      • java.exe (PID: 1512)
      • slui.exe (PID: 7824)
    • Reads the machine GUID from the registry

      • java.exe (PID: 1512)
      • webhelper.exe (PID: 4380)
    • Creates files or folders in the user directory

      • java.exe (PID: 1512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:06 23:29:09+00:00
ImageFileCharacteristics: Executable, No line numbers, Large address aware
PEType: PE32+
LinkerVersion: 2.4
CodeSize: 1820160
InitializedDataSize: 3692544
UninitializedDataSize: 4096
EntryPoint: 0x10f6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start fortnite.exe java.exe conhost.exe no specs webhelper.exe conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1512"C:\Users\admin\AppData\Local\Temp\runtime\jvm\bin\java.exe" -Djava.library.path="C:\Users\admin\AppData\Local\Temp\runtime" -cp . JNILoaderC:\Users\admin\AppData\Local\Temp\runtime\jvm\bin\java.exe
fortnite.exe
User:
admin
Company:
IBM Corporation
Integrity Level:
MEDIUM
Description:
IBM Semeru Runtime binary
Version:
21.0.7.0
Modules
Images
c:\users\admin\appdata\local\temp\runtime\jvm\bin\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\temp\runtime\jvm\bin\jli.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\users\admin\appdata\local\temp\runtime\jvm\bin\vcruntime140.dll
3268\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4380"C:\Users\admin\AppData\Local\Temp\webhelper_70fdf96ea9f2aad6\webhelper.exe" -f "C:\Users\admin\AppData\Local\Temp\webhelper_70fdf96ea9f2aad6\torrc"C:\Users\admin\AppData\Local\Temp\webhelper_70fdf96ea9f2aad6\webhelper.exe
java.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\webhelper_70fdf96ea9f2aad6\webhelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
5568\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exewebhelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5772"C:\Users\admin\AppData\Local\Temp\fortnite.exe" C:\Users\admin\AppData\Local\Temp\fortnite.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\fortnite.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7824C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 552
Read events
2 549
Write events
3
Delete events
0

Modification events

(PID) Process:(1512) java.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1512) java.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1512) java.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
136
Suspicious files
13
Text files
281
Unknown types
0

Dropped files

PID
Process
Filename
Type
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jvm.tar.gz
MD5:
SHA256:
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jninative.dllexecutable
MD5:FD61C3A56156B562605C81C1C52D76FE
SHA256:3448515314EC80EDFC803271DCD6485345433745D15C09BD83E5E8DB641E0A92
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:2E6DC354465A993505C117C1C8B9AAEC
SHA256:C9A71F0466186323EE6091235B0226626F75F6449D418DDA7C29A56AE696BDB8
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:FB3BD208799D3ADF88954EE5A066AC5A
SHA256:42ACC4086C60FB958B6CC0FA4B0C89AD75D3CA933B3ABB6BD11536308C942F14
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-console-l1-2-0.dllexecutable
MD5:1307FF6815D39C2B6E1B67832BA34B6B
SHA256:DCB1DDFA6283118C0D9B8104D5FAA3F1866D756101D791EA75E558E04126B6C1
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\JNILoader.classbinary
MD5:01EF331C79582C5F6EC1B438186FA709
SHA256:600023E3A93ACF0C2103AE42B3DE7802CB55EF6FEBDDC92AE99606025C998C13
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-heap-l1-1-0.dllexecutable
MD5:F0572BADFA6821A356C1C23CBE4BE831
SHA256:F3C4DDDE443E408044E066A413C64B438EA0EA3D378C7C6914E8663A638E9947
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:5B59567B0C75089B88A855740D039BD8
SHA256:B6998B3568735638795585044ABE39D98E5CCB75BF693152F9CDEEA34B8EF2EA
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:DA124D272E1EEEA56E446FEC95AFADA1
SHA256:2CA25EA0322D32CCEE119C32D604C39FCDA254A140FADA57374D523265BE8DBB
5772fortnite.exeC:\Users\admin\AppData\Local\Temp\runtime\jdk-21.0.7+6-jre\bin\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:5A7F590FD08D06CC8298837DCDEDB2BE
SHA256:C81EEAD0E8681AC16298AAED8F203D126C9EB19CAF8FA183179FADE8C0AF165A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
37
DNS requests
25
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEFZnHQTqT5lMbxCBR1nSdZQ%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSr83eyJy3njhjVpn5bEpfc6MXawQQUOuEJhtTPGcKWdnRJdtzgNcZjY5oCEQDzZE5rbgBQI34JRr174fUd
unknown
whitelisted
756
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTPlNxcMEqnlIVyH5VuZ4lawhZX3QQU9oUKOxGG4QR9DqoLLNLuzGR7e64CEQCrZoa1YnvoBZaCEzAShkn1
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
whitelisted
1512
java.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
whitelisted
5508
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5508
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
7636
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5608
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5772
fortnite.exe
140.82.121.4:443
github.com
GITHUB
US
whitelisted
756
lsass.exe
172.64.149.23:80
ocsp.comodoca.com
CLOUDFLARENET
US
whitelisted
4
System
192.168.100.255:138
whitelisted
756
lsass.exe
104.18.38.233:80
ocsp.comodoca.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.22
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 2.23.246.101
whitelisted
google.com
  • 216.58.212.142
whitelisted
github.com
  • 140.82.121.4
whitelisted
ocsp.comodoca.com
  • 172.64.149.23
  • 104.18.38.233
whitelisted
ocsp.usertrust.com
  • 172.64.149.23
  • 104.18.38.233
whitelisted
ocsp.sectigo.com
  • 104.18.38.233
  • 172.64.149.23
whitelisted
objects.githubusercontent.com
  • 185.199.111.133
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.108.133
whitelisted
archive.torproject.org
  • 159.69.63.226
shared

Threats

PID
Process
Class
Message
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 201
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 293
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 805
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 840
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 201
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 293
4380
webhelper.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 763
No debug info