| File name: | SecuriteInfo.com.Win32.Malware-gen.23594321.exe |
| Full analysis: | https://app.any.run/tasks/a7628b8d-6250-4790-b68a-d839f0ea3fea |
| Verdict: | Malicious activity |
| Threats: | Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests. |
| Analysis date: | January 30, 2026, 14:14:44 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections |
| MD5: | C61120E11AA588B1D618AB1259FF691A |
| SHA1: | A7682BCE4ADFD67AF2B3962BE9A0DB1E9DE8E3D9 |
| SHA256: | 5DFD68940C695A01548C0F75B755629B32B9809304312AEDA3A9742A451012B4 |
| SSDEEP: | 98304:F6GavilIvoI2u7cVvyYqvKr6ePDfxmoHVHWGq2Fltfit/28AafGWIeYoVQGrOG0g:IpTn32kJjWND0z |
| .exe | | | Inno Setup installer (65.1) |
|---|---|---|
| .exe | | | Win32 EXE PECompact compressed (generic) (24.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (3.9) |
| .exe | | | Win32 Executable (generic) (2.6) |
| .exe | | | Win16/32 Executable Delphi generic (1.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2025:01:08 15:36:35+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 684032 |
| InitializedDataSize: | 143360 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xa7f98 |
| OSVersion: | 6.1 |
| ImageVersion: | - |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 5.60.5.0 |
| ProductVersionNumber: | 5.60.5.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | Eon Pro Group Ltd |
| FileDescription: | Nvidia cuda video decode api, version 566.24. nvidia video e |
| FileVersion: | 5.60.5 |
| LegalCopyright: | Copyright © 2028 Eon Pro Group Ltd |
| OriginalFileName: | martread+pat-br |
| ProductName: | martread+pat-br |
| ProductVersion: | 5.60.5 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1068 | "C:\Users\admin\Desktop\SecuriteInfo.com.Win32.Malware-gen.23594321.exe" | C:\Users\admin\Desktop\SecuriteInfo.com.Win32.Malware-gen.23594321.exe | explorer.exe | ||||||||||||
User: admin Company: Eon Pro Group Ltd Integrity Level: MEDIUM Description: Nvidia cuda video decode api, version 566.24. nvidia video e Exit code: 1 Version: 5.60.5 Modules
| |||||||||||||||
| 4724 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5200 | "C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\FnHotkeyUtility.exe" -Embedding | C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\FnHotkeyUtility.exe | — | svchost.exe | |||||||||||
User: admin Company: Lenovo Integrity Level: MEDIUM Description: This utility controls special keyboard functions like hotkeys and function keys, on your Lenovo notebook. Exit code: 0 Version: 2.0.16.17 Modules
| |||||||||||||||
| 6756 | "cmd.exe" /c start "" C:\Users\admin\taskhost.exe | C:\Windows\System32\cmd.exe | — | FnHotkeyUtility.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7376 | "C:\Users\admin\AppData\Local\Temp\is-3CS2R.tmp\SecuriteInfo.com.Win32.Malware-gen.23594321.tmp" /SL5="$130324,4880337,828416,C:\Users\admin\Desktop\SecuriteInfo.com.Win32.Malware-gen.23594321.exe" /VERYSILENT /PASSWORD=PLACEHOLDER_PASSWORD | C:\Users\admin\AppData\Local\Temp\is-3CS2R.tmp\SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | SecuriteInfo.com.Win32.Malware-gen.23594321.exe | ||||||||||||
User: admin Company: Eon Pro Group Ltd Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 7392 | "C:\Users\admin\Desktop\SecuriteInfo.com.Win32.Malware-gen.23594321.exe" /VERYSILENT /PASSWORD=PLACEHOLDER_PASSWORD | C:\Users\admin\Desktop\SecuriteInfo.com.Win32.Malware-gen.23594321.exe | SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | ||||||||||||
User: admin Company: Eon Pro Group Ltd Integrity Level: MEDIUM Description: Nvidia cuda video decode api, version 566.24. nvidia video e Exit code: 0 Version: 5.60.5 Modules
| |||||||||||||||
| 7496 | "C:\Windows\helpPane.exe" | C:\Windows\HelpPane.exe | taskhost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Help and Support Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7552 | "C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\FnHotkeyUtility.exe" -Embedding | C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\FnHotkeyUtility.exe | — | svchost.exe | |||||||||||
User: admin Company: Lenovo Integrity Level: MEDIUM Description: This utility controls special keyboard functions like hotkeys and function keys, on your Lenovo notebook. Exit code: 0 Version: 2.0.16.17 Modules
| |||||||||||||||
| 8052 | C:\Users\admin\taskhost.exe | C:\Users\admin\taskhost.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 8396 | "C:\Users\admin\AppData\Local\Temp\is-76R0A.tmp\SecuriteInfo.com.Win32.Malware-gen.23594321.tmp" /SL5="$120324,4880337,828416,C:\Users\admin\Desktop\SecuriteInfo.com.Win32.Malware-gen.23594321.exe" | C:\Users\admin\AppData\Local\Temp\is-76R0A.tmp\SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | SecuriteInfo.com.Win32.Malware-gen.23594321.exe | ||||||||||||
User: admin Company: Eon Pro Group Ltd Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 1 Version: 51.1052.0.0 Modules
| |||||||||||||||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | Ex_31 |
Value: 0C0103000100 | |||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | Ex_1A |
Value: 0C0103000200 | |||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | Ex_91 |
Value: 0C0103080000 | |||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | 05 |
Value: 0C0103004000 | |||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | Ex_20 |
Value: 0C0103100001 | |||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | Ex_25 |
Value: 0C0103100010 | |||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | Ex_27 |
Value: 0C0103100012 | |||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | Ex_1B |
Value: 0C0103100018 | |||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | Ex_99 |
Value: 0C010310002D | |||
| (PID) Process: | (9056) FnHotkeyUtility.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Lenovo\Hotkey\VID_1915&PID_eee0 |
| Operation: | write | Name: | Ex_9A |
Value: 0C010310002E | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7392 | SecuriteInfo.com.Win32.Malware-gen.23594321.exe | C:\Users\admin\AppData\Local\Temp\is-3CS2R.tmp\SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | executable | |
MD5:A1FAFB4891F774ED6B28FBB252248C52 | SHA256:59453C9B443C47091A8002B6FE216D27DACCBD7F9D0D62882A97BC104EDBA508 | |||
| 1068 | SecuriteInfo.com.Win32.Malware-gen.23594321.exe | C:\Users\admin\AppData\Local\Temp\is-76R0A.tmp\SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | executable | |
MD5:A1FAFB4891F774ED6B28FBB252248C52 | SHA256:59453C9B443C47091A8002B6FE216D27DACCBD7F9D0D62882A97BC104EDBA508 | |||
| 7376 | SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\is-DNBF6.tmp | executable | |
MD5:AC01B1EFE9BDD6C127BCB489765E935D | SHA256:2728E26AF764A64DD31F6DF20BAD9CE68F27A1C54628ABF7353A62F5E67A9DFF | |||
| 7376 | SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\FnHotkeyUtility.exe | executable | |
MD5:AC01B1EFE9BDD6C127BCB489765E935D | SHA256:2728E26AF764A64DD31F6DF20BAD9CE68F27A1C54628ABF7353A62F5E67A9DFF | |||
| 7376 | SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\is-S2PEC.tmp | executable | |
MD5:084F247502E6054ADA4A65A8935A4396 | SHA256:A62F73B7CEF738EBD9963744665AA85772B428AEF214F07F8112FF3816B09241 | |||
| 7376 | SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\ludp.dll | executable | |
MD5:084F247502E6054ADA4A65A8935A4396 | SHA256:A62F73B7CEF738EBD9963744665AA85772B428AEF214F07F8112FF3816B09241 | |||
| 8396 | SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | C:\Users\admin\AppData\Local\Temp\is-A02GA.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 7376 | SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | C:\Users\admin\AppData\Local\Temp\is-A5TL6.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 7376 | SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\is-D6JSK.tmp | executable | |
MD5:990A590EB079F420946FDE91975798B9 | SHA256:A68A9AC35AA1E183FE3BD9E7144259631530DB07502112A339E5E1C8DCCC9A31 | |||
| 7376 | SecuriteInfo.com.Win32.Malware-gen.23594321.tmp | C:\ProgramData\9cde36b5-8801-40b4-8ab2-378a2730bd18\vcruntime140_1.dll | executable | |
MD5:F17586DB47571622455A6F57FECDDA53 | SHA256:E30874CEAF6B8DFE72BA67E5C1F21027D79CB3A873A32EB12C5ED89BFA660D1F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
7588 | RUXIMICS.exe | GET | 304 | 20.73.194.208:443 | https://settings-win.data.microsoft.com/settings/v3.0/WSD/RUXIM?os=Windows&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3623&OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&FlightRing=Retail&AttrDataVer=186&App=RUXIM&AppVer=&DeviceFamily=Windows.Desktop | US | — | — | whitelisted |
6768 | MoUsoCoreWorker.exe | GET | 304 | 20.73.194.208:443 | https://settings-win.data.microsoft.com/settings/v3.0/wsd/muse?ProcessorClockSpeed=3094&FlightIds=&UpdateOfferedDays=4294967295&BranchReadinessLevel=CB&OEMManufacturerName=DELL&IsCloudDomainJoined=0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&sku=48&ActivationChannel=Retail&AttrDataVer=186&IsMDMEnrolled=0&ProcessorCores=6&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&TotalPhysicalRAM=6144&PrimaryDiskType=4294967295&FlightingBranchName=&ChassisTypeId=1&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260281&sampleId=95271487&deviceClass=Windows.Desktop&App=muse&DisableDualScan=0&AppVer=10.0&OEMSubModel=J5CR&locale=en-US&IsAlwaysOnAlwaysConnectedCapable=0&ms=0&DefaultUserRegion=244&UpdateServiceUrl=http%3A%2F%2Fneverupdatewindows10.com&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&os=windows&deviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&DeferQualityUpdatePeriodInDays=0&ring=Retail&DeferFeatureUpdatePeriodInDays=30 | US | — | — | whitelisted |
7588 | RUXIMICS.exe | GET | 200 | 184.24.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | NL | binary | 825 b | whitelisted |
6768 | MoUsoCoreWorker.exe | GET | 200 | 184.24.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | NL | binary | 825 b | whitelisted |
7428 | svchost.exe | GET | 200 | 184.24.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | NL | binary | 825 b | whitelisted |
7428 | svchost.exe | GET | 200 | 20.73.194.208:443 | https://settings-win.data.microsoft.com/settings/v3.0/WSD/WaaSAssessment?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&ring=Retail&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=10.0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=WaaSAssessment&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&ServicingBranch=CB&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&HonorWUfBDeferrals=0&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2 | US | text | 5.66 Kb | whitelisted |
5208 | slui.exe | POST | 500 | 128.24.231.64:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | US | xml | 512 b | whitelisted |
7496 | HelpPane.exe | POST | 200 | 196.251.107.23:80 | http://196.251.107.23/04ca1421433e0038.php | GB | text | 72 b | unknown |
3292 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl | US | binary | 814 b | whitelisted |
— | — | POST | 500 | 48.192.1.65:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | US | xml | 512 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
7588 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:137 | — | Not routed | — | whitelisted |
6768 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
7428 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
— | — | 2.16.241.219:443 | www.bing.com | AKAMAI-ASN1 | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | Not routed | — | whitelisted |
7588 | RUXIMICS.exe | 184.24.77.37:80 | crl.microsoft.com | AKAMAI-ASN1 | NL | whitelisted |
6768 | MoUsoCoreWorker.exe | 184.24.77.37:80 | crl.microsoft.com | AKAMAI-ASN1 | NL | whitelisted |
7428 | svchost.exe | 184.24.77.37:80 | crl.microsoft.com | AKAMAI-ASN1 | NL | whitelisted |
6768 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
www.bing.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7496 | HelpPane.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 42 |
7496 | HelpPane.exe | Malware Command and Control Activity Detected | ET MALWARE StealC_V2 CnC Activity (POST) |
7496 | HelpPane.exe | Malware Command and Control Activity Detected | ET MALWARE StealC CnC Activity (POST) |
7496 | HelpPane.exe | A Network Trojan was detected | MALWARE [ANY.RUN] Win32/Stealc stealer activity observed |