File name:

tor.exe

Full analysis: https://app.any.run/tasks/793cd7c4-cf27-48f7-8759-1730eb0a0bd6
Verdict: Malicious activity
Analysis date: April 29, 2025, 21:30:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

A46913AB31875CF8152C96BD25027B4D

SHA1:

99E9C857A9BCCA65E727773B40595478C38E7A75

SHA256:

66FD723D0DD219807C6D7DCC331E25C8D05ADCCF4A66312928FBE1D0E45670ED

SSDEEP:

98304:TOPU8DPCBmhqrL+qO9vZRdA7qGRplv9L1Z3dYrUeBkBx8eL1IPPGwiylCMXZx9Nj:aw1IPVXVNS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Connects to unusual port

      • tor.exe (PID: 668)
  • INFO

    • Creates files or folders in the user directory

      • tor.exe (PID: 668)
    • Reads the machine GUID from the registry

      • tor.exe (PID: 668)
    • Reads the computer name

      • tor.exe (PID: 668)
    • Checks supported languages

      • tor.exe (PID: 668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 7133184
InitializedDataSize: 1848832
UninitializedDataSize: -
EntryPoint: 0x1350
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start tor.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
668"C:\Users\admin\AppData\Local\Temp\tor.exe" C:\Users\admin\AppData\Local\Temp\tor.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\tor.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
1760C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5548"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6456\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetor.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
479
Read events
479
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
668tor.exeC:\Users\admin\AppData\Roaming\tor\unverified-microdesc-consensus.tmptext
MD5:14A0B06A0731352D44CBCABD433C4C02
SHA256:352B3979CA3C4841B58254072CA374E0B40C2CA5BFBC9703582E35869D6E4832
668tor.exeC:\Users\admin\AppData\Roaming\tor\cached-certstext
MD5:4954AF8DF29BEB39222D3223A121DAE8
SHA256:8B1F83867669ECD1BBD674A4663A4FCA4144E4B6AE39E7E79E158E038C0434AC
668tor.exeC:\Users\admin\AppData\Roaming\tor\state.tmptext
MD5:C0AC1407DE089E9A135B078D05A79CDD
SHA256:27A94335DA4287A48D18F3994F863FA5BCCE077FC04EDCEB8C802387361699C2
668tor.exeC:\Users\admin\AppData\Roaming\tor\cached-certs.tmptext
MD5:4954AF8DF29BEB39222D3223A121DAE8
SHA256:8B1F83867669ECD1BBD674A4663A4FCA4144E4B6AE39E7E79E158E038C0434AC
668tor.exeC:\Users\admin\AppData\Roaming\tor\cached-microdescs.newtext
MD5:BBF9C934396C28383738DD2006EF12C2
SHA256:B3732BDF282D04B6C1CF32F0A8F9F598C6C399D1EFFDDA33A163057284C6D1AE
668tor.exeC:\Users\admin\AppData\Roaming\tor\cached-microdesc-consensustext
MD5:14A0B06A0731352D44CBCABD433C4C02
SHA256:352B3979CA3C4841B58254072CA374E0B40C2CA5BFBC9703582E35869D6E4832
668tor.exeC:\Users\admin\AppData\Roaming\tor\cached-microdesc-consensus.tmptext
MD5:14A0B06A0731352D44CBCABD433C4C02
SHA256:352B3979CA3C4841B58254072CA374E0B40C2CA5BFBC9703582E35869D6E4832
668tor.exeC:\Users\admin\AppData\Roaming\tor\statetext
MD5:C0AC1407DE089E9A135B078D05A79CDD
SHA256:27A94335DA4287A48D18F3994F863FA5BCCE077FC04EDCEB8C802387361699C2
668tor.exeC:\Users\admin\AppData\Roaming\tor\unverified-microdesc-consensustext
MD5:14A0B06A0731352D44CBCABD433C4C02
SHA256:352B3979CA3C4841B58254072CA374E0B40C2CA5BFBC9703582E35869D6E4832
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
26
DNS requests
13
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.18.69.217:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.18.69.217:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4976
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
2.18.69.217:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4976
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.18.69.217:80
www.microsoft.com
AKAMAI-AS
AT
whitelisted
2.18.69.217:80
www.microsoft.com
AKAMAI-AS
AT
whitelisted
668
tor.exe
94.242.53.228:443
FNK LLC
RU
unknown
668
tor.exe
46.38.236.250:9001
netcup GmbH
DE
unknown
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
668
tor.exe
37.46.211.16:443
ZONER a.s.
CZ
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 2.18.69.217
  • 23.219.150.101
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.73
  • 40.126.31.0
  • 20.190.159.68
  • 20.190.159.130
  • 40.126.31.130
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.0
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
668
tor.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 724
668
tor.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 189
668
tor.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 694
668
tor.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 221
668
tor.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 724
668
tor.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 221
No debug info