| File name: | 2to1ep.exe |
| Full analysis: | https://app.any.run/tasks/cc678e1e-9631-42f3-80b7-e7a5fe8601ed |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | January 09, 2026, 15:16:25 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 7 sections |
| MD5: | 7D1A85E807FF9B48EDC2E08A01B35E07 |
| SHA1: | 9D772258C620629C299BBAD24C968B1CC476A6A1 |
| SHA256: | 65BA3988D38F83B9EE1F31CAFA5BD37DC6B72279F5618AAC94D71A904EFA0CAC |
| SSDEEP: | 98304:i/0CqfgbrcfRkzKVfq7AnYRO4Y6ZhkDQet54netUjZUj0vNQLFZfQpyJoic3yjHI:hvfkWZwE1MUQ881mw0X/ki+BIsG |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:06:21 16:50:42+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.43 |
| CodeSize: | 178688 |
| InitializedDataSize: | 154624 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xc380 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1176 | steamcmd.exe | C:\Windows\System32\a\steamcmd.exe | — | 2to1ep.exe | |||||||||||
User: Administrator Company: Valve Corporation Integrity Level: HIGH Description: Steam Client Bootstrapper (buildbot_winslave04_steam_steam_rel_client_win32@winslave04) Version: 02.02.95.35 Modules
| |||||||||||||||
| 1180 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=6016,i,8683242162212284257,11576130786639527932,262144 --disable-features=PaintHolding --variations-seed-version --log-level=3 --mojo-platform-channel-handle=6004 /prefetch:1 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: Administrator Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 133.0.3065.92 Modules
| |||||||||||||||
| 1192 | bypass.exe | C:\Windows\System32\a\bypass.exe | 2to1ep.exe | ||||||||||||
User: Administrator Company: 44 CALIBER Integrity Level: HIGH Description: 44 CALIBER Version: 1.6.2.0 Modules
| |||||||||||||||
| 1208 | t2.exe | C:\Windows\System32\a\t2.exe | — | 2to1ep.exe | |||||||||||
User: Administrator Integrity Level: HIGH Exit code: 12288 Modules
| |||||||||||||||
| 1260 | synchost.exe | C:\Windows\System32\a\synchost.exe | 2to1ep.exe | ||||||||||||
User: Administrator Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 1296 | XClient.exe | C:\Windows\System32\a\XClient.exe | — | 2to1ep.exe | |||||||||||
User: Administrator Integrity Level: HIGH Description: Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1348 | reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\WINDOWS\Worm.bat /f | C:\Windows\System32\reg.exe | cmd.exe | ||||||||||||
User: Administrator Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1420 | CritScript.exe | C:\Windows\System32\a\CritScript.exe | 2to1ep.exe | ||||||||||||
User: Administrator Integrity Level: HIGH Modules
| |||||||||||||||
| 1480 | 7x.exe | C:\Windows\System32\a\7x.exe | 2to1ep.exe | ||||||||||||
User: Administrator Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1572 | XClient.exe | C:\Windows\System32\a\XClient.exe | 2to1ep.exe | ||||||||||||
User: Administrator Integrity Level: HIGH Description: Version: 1.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 23004100430042006C006F0062000000000000000000000001000000000000004C000000 | |||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value: 00000000000000000000000000000000030001000100010014000000000000002C000000000000003A003A007B00360034003500460046003000340030002D0035003000380031002D0031003000310042002D0039004600300038002D003000300041004100300030003200460039003500340045007D003E002000200000001000000000000000430043006C00650061006E00650072002E006C006E006B003E0020007C0000001500000000000000410064006F006200650020004100630072006F006200610074002E006C006E006B003E0020007C0000000F00000000000000460069007200650066006F0078002E006C006E006B003E0020007C000000150000000000000047006F006F0067006C00650020004300680072006F006D0065002E006C006E006B003E0020007C000000180000000000000056004C00430020006D006500640069006100200070006C0061007900650072002E006C006E006B003E0020007C00000016000000000000004D006900630072006F0073006F0066007400200045006400670065002E006C006E006B003E0020007C00000016000000000000006100730073006500730073006D0065006E007400740061006C006B002E007200740066003E002000200000001400000000000000640069006500610067007200650065006D0065006E0074002E0070006E0067003E002000200000001000000000000000610062006F00760065007700650064002E007200740066003E00200020000000140000000000000067006F0061006C006400690072006500630074006F0072002E007200740066003E0020002000000010000000000000006C0069006E00650072006F0063006B002E0070006E0067003E0020002000000010000000000000007000720069006F007200760061006E002E007200740066003E0020002000000014000000000000007000720069007600610074006500770072006900740065002E0070006E0067003E00200020000000130000000000000073006500630074006F0072006F0072006400650072002E0070006E0067003E002000200000000F0000000000000068006F00750072006300750070002E007200740066003E0020002000000011000000000000006E0069006300650067006C006100730073002E0070006E0067003E002000200000000E00000000000000320074006F003100650070002E006500780065003E00200020000000150000000000000073007400610072007400650064006D006F00740069006F006E002E007200740066003E00200020000000150000000000000077006F00720064007300730065006100720063006800650073002E0070006E0067003E0020002000000002000000000000000200010000000000000000000100000000000000020001000000000000000000110000000600000001000000140000000000000000000000000000000000000000000000803F0100000000000000004002000000000000004040030000000000000080400400000000000000A04005000000803F0000000006000000803F0000404009000000803F0000803F07000000803F0000004008000000803F000080400A0000000040000040400F000000803F0000A0400B000000004000008040100000000040000000000C00000000400000803F0D0000000040000000400E000000404000000040120000004040000040401300000000400000A04011000200010000000000000000000100000000000000020001000000000000000000120000000700000001000000140000000000000000000000000000000000000000000000C04009000000803F0000803F07000000803F0000004008000000803F000040400A000000803F000080400F000000803F0000A0400B000000803F0000C040100000000040000000000C00000000400000803F0D0000000040000000400E000000004000004040120000000040000080401300000000000000803F0100000000000000004002000000000000004040030000000000000080400400000000000000A04005000000803F000000000600000000400000A0401100 | |||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconNameVersion |
Value: 1 | |||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts |
| Operation: | write | Name: | LastUpdate |
Value: D01B616900000000 | |||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000005024E |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456E9BC50E45F05DB4C86F7D791C25A96C7 | |||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000005024E |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006024E |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456E9BC50E45F05DB4C86F7D791C25A96C7 | |||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000502F2 |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456E9BC50E45F05DB4C86F7D791C25A96C7 | |||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000008007A |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456E9BC50E45F05DB4C86F7D791C25A96C7 | |||
| (PID) Process: | (4972) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090298 |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456E9BC50E45F05DB4C86F7D791C25A96C7 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\VCRUNTIME140.dll | executable | |
MD5:32DA96115C9D783A0769312C0482A62D | SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F | |||
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\_asyncio.pyd | executable | |
MD5:56F958EEBBC62305B4BF690D61C78E28 | SHA256:50631361EF074BE42D788818AF91D0301D22FA24A970F41F496D8272B92CFE31 | |||
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\_bz2.pyd | executable | |
MD5:684D656AADA9F7D74F5A5BDCF16D0EDB | SHA256:A5DFB4A663DEF3D2276B88866F6D220F6D30CC777B5D841CF6DBB15C6858017C | |||
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\_hashlib.pyd | executable | |
MD5:3E540EF568215561590DF215801B0F59 | SHA256:0ED7A6ED080499BC6C29D7113485A8A61BDBA93087B010FCA67D9B8289CBE6FA | |||
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\_socket.pyd | executable | |
MD5:566CB4D39B700C19DBD7175BD4F2B649 | SHA256:77EBA293FE03253396D7BB6E575187CD026C80766D7A345EB72AD92F0BBBC3AA | |||
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\_queue.pyd | executable | |
MD5:CC0F4A77CCFE39EFC8019FA8B74C06D0 | SHA256:DEE7D19A9FCAB0DF043DC56F2CDC32F1A2A968AB229679B38B378C61CA0CBA53 | |||
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\_overlapped.pyd | executable | |
MD5:363409FBACB1867F2CE45E3C6922DDB4 | SHA256:F154AC9D5CA0646D18F6197C0406F7541B6E0752B2D82A330036C1E39D3A49E7 | |||
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\_ctypes.pyd | executable | |
MD5:29873384E13B0A78EE9857604161514B | SHA256:3CC8500A958CC125809B0467930EBCCE88A09DCC0CEDD7A45FACF3E332F7DB33 | |||
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\api-ms-win-core-datetime-l1-1-0.dll | executable | |
MD5:A672B1D8CE985E4A8DA41E0DE58A0E76 | SHA256:55E6F9CEE657B6A25F68AEA8A22ECB606DC5C25F69993EB023A452295BE6D2A8 | |||
| 7676 | 2to1ep.exe | C:\Users\Administrator\AppData\Local\Temp\_MEI76762\api-ms-win-core-file-l1-1-0.dll | executable | |
MD5:B914966BC29D1C55A656071AD9E592AA | SHA256:35A8879678F63635E2D4D41DEC511B0E71AB8E5B8BF7F8B92AC615E4452D2AF8 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
7760 | 2to1ep.exe | GET | 200 | 194.26.141.203:80 | http://194.26.141.203/reverse_shell.exe | unknown | — | — | unknown |
7760 | 2to1ep.exe | GET | — | 130.12.180.43:80 | http://130.12.180.43/files/5561582465/kdgXbnm.exe | unknown | — | — | unknown |
7760 | 2to1ep.exe | GET | — | 130.12.180.43:80 | http://130.12.180.43/files/7782139129/xcxtV93.exe | unknown | — | — | unknown |
7760 | 2to1ep.exe | GET | 200 | 45.150.34.192:80 | http://45.150.34.192/win-addone/Addone_plugin_dc.exe | unknown | — | — | unknown |
7760 | 2to1ep.exe | GET | 200 | 194.26.141.203:80 | http://194.26.141.203/reverse.exe | unknown | — | — | unknown |
7760 | 2to1ep.exe | GET | 200 | 130.12.180.43:80 | http://130.12.180.43/files/6075866260/eHBuoD4.exe | unknown | — | — | unknown |
7760 | 2to1ep.exe | GET | 200 | 45.150.34.192:80 | http://45.150.34.192/win-addone/Addone_asyc_pl.exe | unknown | — | — | unknown |
7760 | 2to1ep.exe | GET | 200 | 45.150.34.192:80 | http://45.150.34.192/win-addone/Adone_xen_o.exe | unknown | — | — | unknown |
7760 | 2to1ep.exe | GET | 200 | 45.150.34.192:80 | http://45.150.34.192/win-addone/Addone_qua.exe | unknown | — | — | unknown |
7760 | 2to1ep.exe | GET | 200 | 20.81.164.199:8888 | http://20.81.164.199:8888/demon.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
6944 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:137 | — | Not routed | — | whitelisted |
6296 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6768 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:138 | — | Not routed | — | whitelisted |
3412 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
7760 | 2to1ep.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | whitelisted |
7760 | 2to1ep.exe | 45.141.117.162:80 | — | LAIN we love lain, cats and the world wide web | DE | unknown |
7760 | 2to1ep.exe | 101.33.243.139:8888 | — | TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited | CN | unknown |
7760 | 2to1ep.exe | 175.178.251.212:8888 | — | TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited | CN | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
gitlab.com |
| whitelisted |
www.namuvpn.com |
| unknown |
sancaktepekombiservis.com |
| unknown |
sfa.com.ar |
| malicious |
goboadvertising.autodealertech.co |
| unknown |
download.kbcard.com |
| whitelisted |
vdfccjpnedujhrzscjtq.supabase.co |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
7760 | 2to1ep.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Python Suspicious User Agent |
7760 | 2to1ep.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 23 |
7760 | 2to1ep.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Python Suspicious User Agent |
7760 | 2to1ep.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Python Suspicious User Agent |
7760 | 2to1ep.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Python Suspicious User Agent |
7760 | 2to1ep.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Python Suspicious User Agent |
7760 | 2to1ep.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Python Suspicious User Agent |
7760 | 2to1ep.exe | Potentially Bad Traffic | ET INFO PE EXE or DLL Windows file download HTTP |
7760 | 2to1ep.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Python Suspicious User Agent |
7760 | 2to1ep.exe | Potentially Bad Traffic | ET INFO PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
kernel32.exe | === Shellcode Loader Started === |
kernel32.exe | Testing decryption algorithm... |
kernel32.exe | Decryption algorithm test PASSED |
kernel32.exe | Initial delay: 6340 ms |
kernel32.exe | Creating scheduled task... |
kernel32.exe | CreatePersistentTask called |
kernel32.exe | GetCurrentExePath called |
kernel32.exe | schtasks /create /tn "WindowsUpdateService" /tr ""C:\WINDOWS\system32\a\kernel32.exe"" /sc onlogon /rl highest /f |
kernel32.exe | CreateProcess succeeded |
kernel32.exe | Task created successfully |