File name:

6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe

Full analysis: https://app.any.run/tasks/1ac4a1ea-ec23-48f4-8ab1-c630a2d37fb0
Verdict: Malicious activity
Analysis date: June 21, 2025, 04:13:14
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

F12C2505D4EE9D89F0ADEC9A9EDEC36B

SHA1:

C077A04F9409355FEF88581F963E0F68FEC1379D

SHA256:

6BCFC2C16F23AE1F4D9E47525B485828B8909A52B686A9221802895212C17189

SSDEEP:

24576:AE2Kb/L6k7FtySMy8LKdNwxPHoIKYrpmCAQfoTj:Rb/L6k7FtySMy8edNMfoIKYrkCAQfoTj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Internet Explorer settings

      • 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe (PID: 1044)
    • Reads Microsoft Outlook installation path

      • 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe (PID: 1044)
    • Write to the desktop.ini file (may be used to cloak folders)

      • 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe (PID: 1044)
    • Reads security settings of Internet Explorer

      • 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe (PID: 1044)
  • INFO

    • Checks supported languages

      • 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe (PID: 1044)
    • Process checks Internet Explorer phishing filters

      • 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe (PID: 1044)
    • Reads the computer name

      • 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe (PID: 1044)
    • Checks proxy server information

      • 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe (PID: 1044)
      • slui.exe (PID: 1204)
    • Reads the software policy settings

      • slui.exe (PID: 1204)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:03:20 10:01:29+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 307200
InitializedDataSize: 208384
UninitializedDataSize: -
EntryPoint: 0x32690
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
153
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe no specs slui.exe ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1044"C:\Users\admin\Desktop\6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe" C:\Users\admin\Desktop\6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1204C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1964\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3936"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
1 593
Read events
1 580
Write events
11
Delete events
2

Modification events

(PID) Process:(1044) 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1044) 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1044) 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1044) 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1044) 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1044) 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1044) 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1044) 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFavoritesInitialSelection
Value:
(PID) Process:(1044) 6bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFeedsInitialSelection
Value:
Executable files
0
Suspicious files
0
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\info.phptext
MD5:56F6FCCAE921D07F3C16EC128F50CCC5
SHA256:ACC2A121C54EBEA320E4832B214CE325FFC8A12C59E33B84382DD52C7A438650
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\eclipse\last_evacuation_notice.txttext
MD5:9B5B8A9FC0B0EE679A11D9387C177E85
SHA256:776B7995D0CD1C89DC00BCF02EBC36330C53A34ADCC65F985E5BEFB89AB328BE
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\eclipse\eclipse_info.txttext
MD5:64D55E92A2BBA6F2DB28CDF82A017404
SHA256:3687BB23384ADED0A9AEFA97AC3AAE4FD7DF499FC3CE04C349ACEA94166362AA
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\web.configxml
MD5:5F5089E02B8F3A62DA0ABA32F062AB83
SHA256:CB4C70BCC52CC7EF8612238D79EFE214AE0D4D7685C186D91186BA5459D2C707
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\index.htmlhtml
MD5:75CA1FCB77C02C0F604F305F40264455
SHA256:3F0A1CD24B13781515CE8D43600061615B50E3EE007D111C49D73D53081D721A
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\save_story.asphtml
MD5:A694A540E7CDA5D909443820A766E79B
SHA256:0AD609FF553538A2DE0DC7D31F9E52FBB2C1B6097003703D7C234469EEF313DA
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\favicon.icoimage
MD5:2D9ECA4F71428DEC439585B09C9C0556
SHA256:F1570F222F473B210F31B53560BA13108F3BB553D993C71C3BAAD93A5540AAC7
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\schisofrenia.htmlhtml
MD5:B3047B6F3C94D2FA7FDED9E60EFA8189
SHA256:994A2E42FFCD406919B90D33F158182DE7C69DE10E1F13D81B6CB68805DBA779
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\eclipse\base_orchestrator.txttext
MD5:2D21A1FF6E5ADED56E6D0AF500B59E1D
SHA256:CB38E2782206B0200DF5DFDC12130F4BF065CBF3D644CCB61B8088D89DBF57DC
10446bcfc2c16f23ae1f4d9e47525b485828b8909a52b686a9221802895212c17189.exeC:\Users\admin\Desktop\tube.htmlhtml
MD5:FBB719AA9253867AC9552BEF85CF1F66
SHA256:BD58067FC83C870B80CD5E5206E9BD14A0A1007F5D7722CC2CE45218C47F352E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.222.86.92:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.110.193:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2632
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
3760
SIHClient.exe
GET
200
23.222.86.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3760
SIHClient.exe
GET
200
23.222.86.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4832
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
23.55.110.193:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.222.86.92:80
www.microsoft.com
AKAMAI-AS
NZ
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1872
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 142.250.180.110
whitelisted
crl.microsoft.com
  • 23.55.110.193
whitelisted
www.microsoft.com
  • 23.222.86.92
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 13.89.179.11
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted

Threats

No threats detected
No debug info