File name:

putty-64bit-0.83-installer.exe

Full analysis: https://app.any.run/tasks/7395cad2-cd1b-4eb9-8875-94da1cf1ec97
Verdict: Malicious activity
Threats:

A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices.

Analysis date: September 14, 2025, 01:14:48
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
oyster
backdoor
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 8 sections
MD5:

E614214AA364A4F7C0F313326AE53966

SHA1:

36C2FCD1BAB2DE1D8E6B314C85DB5F3526435B87

SHA256:

76889EF23DC327C0A63DA2E296E079CE1F6844DA185C3160402341557E6BCCFA

SSDEEP:

98304:MXO1B3C8oOsFOG4UsVgMTsymif5pIXETOdicQZF/Z0j2KBnYTPsN9tyyBi4al5Oe:U2qKyRjS3tv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • putty-64bit-0.83-installer.exe (PID: 2964)
    • OYSTER mutex has been found

      • dwr.exe (PID: 4700)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • putty-64bit-0.83-installer.exe (PID: 2964)
      • dwr.exe (PID: 4700)
    • Likely accesses (executes) a file from the Public directory

      • dwr.exe (PID: 4700)
      • msiexec.exe (PID: 4200)
    • Reads the date of Windows installation

      • putty-64bit-0.83-installer.exe (PID: 2964)
    • Executable content was dropped or overwritten

      • putty-64bit-0.83-installer.exe (PID: 2964)
    • Process drops legitimate windows executable

      • putty-64bit-0.83-installer.exe (PID: 2964)
    • There is functionality for taking screenshot (YARA)

      • dwr.exe (PID: 4700)
  • INFO

    • Reads the computer name

      • putty-64bit-0.83-installer.exe (PID: 2964)
      • msiexec.exe (PID: 2040)
      • dwr.exe (PID: 4700)
    • The sample compiled with english language support

      • putty-64bit-0.83-installer.exe (PID: 2964)
    • Checks supported languages

      • putty-64bit-0.83-installer.exe (PID: 2964)
      • dwr.exe (PID: 4700)
      • msiexec.exe (PID: 2040)
    • Reads Microsoft Office registry keys

      • putty-64bit-0.83-installer.exe (PID: 2964)
    • Process checks computer location settings

      • putty-64bit-0.83-installer.exe (PID: 2964)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 4200)
    • Checks proxy server information

      • msiexec.exe (PID: 4200)
      • dwr.exe (PID: 4700)
      • slui.exe (PID: 856)
    • Reads the software policy settings

      • msiexec.exe (PID: 4200)
      • slui.exe (PID: 856)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 4200)
      • dwr.exe (PID: 4700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:07:28 09:26:33+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.44
CodeSize: 266752
InitializedDataSize: 191488
UninitializedDataSize: -
EntryPoint: 0x28af0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
154
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start putty-64bit-0.83-installer.exe #OYSTER dwr.exe msiexec.exe msiexec.exe no specs slui.exe ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
856C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2040C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2964"C:\Users\admin\AppData\Local\Temp\putty-64bit-0.83-installer.exe" C:\Users\admin\AppData\Local\Temp\putty-64bit-0.83-installer.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\putty-64bit-0.83-installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3820\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4200"C:\WINDOWS\System32\msiexec.exe" /i "C:\Users\Public\DWR\putty-64bit-0.83-installer.msi" C:\Windows\System32\msiexec.exe
putty-64bit-0.83-installer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
1602
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4700"C:\Users\Public\DWR\dwr.exe" C:\Users\Public\DWR\dwr.exe
putty-64bit-0.83-installer.exe
User:
admin
Company:
ByteDance Pte. Ltd.
Integrity Level:
MEDIUM
Description:
CapCut
Version:
1.0.0.000000
Modules
Images
c:\users\public\dwr\dwr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\setupapi.dll
4824"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
5 328
Read events
5 324
Write events
4
Delete events
0

Modification events

(PID) Process:(2964) putty-64bit-0.83-installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msi\OpenWithProgids
Operation:writeName:Msi.Package
Value:
(PID) Process:(4700) dwr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4700) dwr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4700) dwr.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
3
Suspicious files
8
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2964putty-64bit-0.83-installer.exeC:\Users\Public\DWR\putty-64bit-0.83-installer.msiexecutable
MD5:D047042B7A64933F9ED793D76D3A753B
SHA256:9C2369C883840F71DF670E069C86FB0E6E6755B6F6DABF288EE3A061A08C5F64
2964putty-64bit-0.83-installer.exeC:\Users\Public\DWR\configs.pdfbinary
MD5:D517FD9BFB2009B4B43A9C2D554B6617
SHA256:966E0AA4E7E029D0E7FF337FB8EDF6712EF8A49F3CDAC17BE0EFCF0C31799714
2964putty-64bit-0.83-installer.exeC:\Users\Public\DWR\mpr.dllexecutable
MD5:A29F7A0B3A1CD4B859510BDCE3F03305
SHA256:0CA442E4C56AAC7A875B27577EC2B22B4B33882281DE60B534A2D204D106B264
2964putty-64bit-0.83-installer.exeC:\Users\Public\DWR\dwr.exeexecutable
MD5:F8EB016C73BE68EA1F8D2BEA7CC90784
SHA256:FA3491A8A852C23592C5B2E75F7C2F3EB4863565F6376C969D88753EFEB396BC
4200msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDBbinary
MD5:362EAEBF0821741B21F9ECDD6C48FEF5
SHA256:9F4CB882602BBD9D9F69C735B418AAE36AE3FCA51BA7508B264D7BFAC50E4CD3
4200msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDBbinary
MD5:59B73AB39DBBF7176B9FD9A6B6977315
SHA256:7F490EF3E00918ED10CE46DF81A7A1795B6985576A737CD7D42171EF9CF2916D
4200msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_D665BA8E68FA19E17C77043D2120E619binary
MD5:1FDADB8A9F2F7FF4AB41E566D2C2D186
SHA256:91099BDA20B632C1650D8BB608C4432D197AD95E43233444386963A8FB39740F
4200msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_71A3756DBB32C004799210B766A7AFA4binary
MD5:A483576990B5C5D07C1F9A84A85FB576
SHA256:E00ED79209480232437AEF29B123A0802E6E34D504626456EFD2EC9F4CB0E611
4200msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_D665BA8E68FA19E17C77043D2120E619binary
MD5:ED24904DEBC23AF3AEC5A32229D19FD5
SHA256:8C5197DE893EB924716A645E036BB9D896C2914523996DA42620CED19B602D72
4200msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_71A3756DBB32C004799210B766A7AFA4binary
MD5:8AAC01DB844735596BA71D75682E4CFA
SHA256:33891CFA7215A945352233FC5E4575D2630EBCD7F90C135F576026E888BF2E64
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
27
DNS requests
16
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4200
msiexec.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEAJ8OQEMp1rDOrXuDVQO%2BeU%3D
US
binary
2.18 Kb
whitelisted
4200
msiexec.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBQVD%2BnGf79Hpedv3mhy6uKMVZkPCQQUDyrLIIcouOxvSK4rVKYpqhekzQwCEQC%2Bjh2FxdJSG20zN547hQGp
US
binary
638 b
whitelisted
1268
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
825 b
whitelisted
4700
dwr.exe
POST
200
85.239.53.66:80
http://85.239.53.66/api/kcehc
US
binary
148 b
unknown
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
NL
binary
814 b
whitelisted
2940
svchost.exe
GET
200
72.246.169.163:80
http://x1.c.lencr.org/
DE
binary
734 b
whitelisted
3540
backgroundTaskHost.exe
GET
200
184.50.179.49:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
TW
binary
471 b
whitelisted
4700
dwr.exe
POST
200
85.239.53.66:80
http://85.239.53.66/api/jgfnsfnuefcnegfnehjbfncejfh
US
binary
133 b
unknown
5288
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
NL
binary
813 b
whitelisted
5288
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
NL
binary
419 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4172
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4200
msiexec.exe
172.64.149.23:80
ocsp.usertrust.com
CLOUDFLARENET
US
whitelisted
4
System
192.168.100.255:138
whitelisted
4700
dwr.exe
85.239.53.66:80
BlueVPS OU
US
unknown
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 172.217.18.14
whitelisted
ocsp.usertrust.com
  • 172.64.149.23
whitelisted
ocsp.sectigo.com
  • 172.64.149.23
whitelisted
crl.microsoft.com
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
self.events.data.microsoft.com
  • 20.42.65.91
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
x1.c.lencr.org
  • 72.246.169.163
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info