File name:

GenP-v3.7.1.exe

Full analysis: https://app.any.run/tasks/aec607dc-9f32-4df1-8685-c9a9947a42c1
Verdict: Malicious activity
Analysis date: November 03, 2025, 09:01:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
upx
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 3 sections
MD5:

7E4F27D40A70D78FEDFE7E0EBFF28AE1

SHA1:

7CB6262C23830708DBD11BDCB1203DF130478553

SHA256:

797253ADD1F9FDE1ECDBC49B02F4529746AA1B6005FCBD3817ADDDCF3E295EB9

SSDEEP:

49152:HetKmupSfNHjl4ClQaig25jSHY7GvXiADpB/7mP9HhIHAI/KlNKYOJCTOB2U20wI:+tKDpSRjVKjg25j1Shp181hWOKYYCTOl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • GenP-v3.7.1.exe (PID: 7784)
  • INFO

    • The sample compiled with english language support

      • GenP-v3.7.1.exe (PID: 7784)
    • Create files in a temporary directory

      • GenP-v3.7.1.exe (PID: 7784)
    • Reads the computer name

      • GenP-v3.7.1.exe (PID: 7784)
    • Checks supported languages

      • GenP-v3.7.1.exe (PID: 7784)
    • Reads mouse settings

      • GenP-v3.7.1.exe (PID: 7784)
    • The process uses AutoIt

      • GenP-v3.7.1.exe (PID: 7784)
    • UPX packer has been detected

      • GenP-v3.7.1.exe (PID: 7784)
    • Checks proxy server information

      • slui.exe (PID: 6744)
    • Reads the software policy settings

      • slui.exe (PID: 6744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:10:31 02:27:30+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.16
CodeSize: 421888
InitializedDataSize: 1105920
UninitializedDataSize: 1740800
EntryPoint: 0x20fe70
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 3.7.1.0
ProductVersionNumber: 3.7.1.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
FileVersion: 3.7.1.0
Comments: GenP
FileDescription: GenP
ProductName: GenP
ProductVersion: 3.7.1
CompanyName: GenP
LegalCopyright: GenP 2025
LegalTradeMarks: GenP 2025
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start genp-v3.7.1.exe slui.exe genp-v3.7.1.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6744C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7624"C:\Users\admin\Desktop\GenP-v3.7.1.exe" C:\Users\admin\Desktop\GenP-v3.7.1.exeexplorer.exe
User:
admin
Company:
GenP
Integrity Level:
MEDIUM
Description:
GenP
Exit code:
3221226540
Version:
3.7.1.0
Modules
Images
c:\users\admin\desktop\genp-v3.7.1.exe
c:\windows\system32\ntdll.dll
7784"C:\Users\admin\Desktop\GenP-v3.7.1.exe" C:\Users\admin\Desktop\GenP-v3.7.1.exe
explorer.exe
User:
admin
Company:
GenP
Integrity Level:
HIGH
Description:
GenP
Version:
3.7.1.0
Modules
Images
c:\users\admin\desktop\genp-v3.7.1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
3 600
Read events
3 600
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7784GenP-v3.7.1.exeC:\Users\admin\Desktop\config.initext
MD5:A1C2977DBFD3343D1C2575E9967B532C
SHA256:49EB049A9C13F4C0A57F66CB1BE275D13A5AA3B5814C25E71DDF211B3A54BA79
7784GenP-v3.7.1.exeC:\Users\admin\AppData\Local\Temp\aut2E67.tmpbinary
MD5:4CA755DBF9F7EF7B7C651396508C6CF8
SHA256:14385A5E5B7F7E1047EE8A459A2A4EA06BD15C2692C6732196CAD48C66A8C188
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
42
DNS requests
16
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
20.165.94.63:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
compressed
29.1 Kb
unknown
POST
200
20.190.160.3:443
https://login.live.com/RST2.srf
US
xml
10.3 Kb
unknown
6456
svchost.exe
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
3356
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
DE
binary
471 b
whitelisted
5596
MoUsoCoreWorker.exe
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
POST
200
20.190.160.3:443
https://login.live.com/RST2.srf
US
xml
11.1 Kb
unknown
GET
200
52.165.164.15:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
unknown
3568
SIHClient.exe
GET
200
104.85.1.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl
NL
binary
813 b
whitelisted
3568
SIHClient.exe
GET
200
104.85.1.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
NL
binary
814 b
whitelisted
3568
SIHClient.exe
GET
200
104.85.1.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
NL
binary
419 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6456
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
5596
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3356
svchost.exe
20.190.160.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.19.195.131:443
www.bing.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5596
MoUsoCoreWorker.exe
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6456
svchost.exe
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
3356
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5596
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 51.104.136.2
whitelisted
login.live.com
  • 20.190.160.64
  • 40.126.32.74
  • 20.190.160.67
  • 20.190.160.66
  • 20.190.160.2
  • 40.126.32.138
  • 20.190.160.132
  • 20.190.160.65
whitelisted
www.bing.com
  • 2.19.195.131
  • 2.19.195.123
  • 2.19.195.136
  • 2.19.195.130
  • 2.19.195.122
  • 2.19.195.16
  • 2.19.195.10
  • 2.19.195.128
  • 2.19.195.137
whitelisted
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 95.101.78.32
  • 95.101.78.42
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 74.178.76.128
whitelisted
www.microsoft.com
  • 104.85.1.163
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info