File name:

main.exe

Full analysis: https://app.any.run/tasks/f3d874fa-35bb-4919-b4c1-67fe45d81c9a
Verdict: Malicious activity
Analysis date: June 02, 2025, 08:40:00
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 7 sections
MD5:

3E6FF94F3DE542BF127BD038BEC971D5

SHA1:

3583170EDE2552EC41DB5D487FBE3633B9915A4D

SHA256:

8C88D225ED289603AC71DD7373CD63E6107B52540115AD1E40D45103E81C49E0

SSDEEP:

98304:9/0CnjbSNAnYRO4Y6ZhkDQet54nHZUj0vNQLFZfQpyJoic3yjHFGZ+O2EwToSriH:wc881mwWE/kiiikh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • main.exe (PID: 5972)
    • Process drops python dynamic module

      • main.exe (PID: 5972)
    • Process drops legitimate windows executable

      • main.exe (PID: 5972)
    • Application launched itself

      • main.exe (PID: 5972)
    • Loads Python modules

      • main.exe (PID: 7316)
    • Executable content was dropped or overwritten

      • main.exe (PID: 5972)
    • Starts CMD.EXE for commands execution

      • main.exe (PID: 7316)
    • Windows service management via SC.EXE

      • sc.exe (PID: 5392)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 3124)
  • INFO

    • Checks supported languages

      • main.exe (PID: 5972)
      • main.exe (PID: 7316)
    • Create files in a temporary directory

      • main.exe (PID: 5972)
    • The sample compiled with english language support

      • main.exe (PID: 5972)
    • Reads the computer name

      • main.exe (PID: 5972)
      • main.exe (PID: 7316)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:02 08:07:58+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 178688
InitializedDataSize: 219136
UninitializedDataSize: -
EntryPoint: 0xc380
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start main.exe conhost.exe no specs main.exe no specs cmd.exe no specs sc.exe no specs main.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3124C:\WINDOWS\system32\cmd.exe /c "sc query "DbgSvc""C:\Windows\System32\cmd.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
4020"C:\Users\admin\AppData\Local\Temp\main.exe" C:\Users\admin\AppData\Local\Temp\main.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\main.exe
c:\windows\system32\ntdll.dll
5392sc query "DbgSvc"C:\Windows\System32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
5972"C:\Users\admin\AppData\Local\Temp\main.exe" C:\Users\admin\AppData\Local\Temp\main.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\main.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6032\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7316"C:\Users\admin\AppData\Local\Temp\main.exe" C:\Users\admin\AppData\Local\Temp\main.exemain.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\main.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
217
Read events
217
Write events
0
Delete events
0

Modification events

No data
Executable files
57
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\VCRUNTIME140.dllexecutable
MD5:32DA96115C9D783A0769312C0482A62D
SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\_ctypes.pydexecutable
MD5:29873384E13B0A78EE9857604161514B
SHA256:3CC8500A958CC125809B0467930EBCCE88A09DCC0CEDD7A45FACF3E332F7DB33
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\_decimal.pydexecutable
MD5:21FCB8E3D4310346A5DC1A216E7E23CA
SHA256:9A0E05274CAD8D90F6BA6BC594261B36BFBDDF4F5CA6846B6367FE6A4E2FDCE4
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\_hashlib.pydexecutable
MD5:3E540EF568215561590DF215801B0F59
SHA256:0ED7A6ED080499BC6C29D7113485A8A61BDBA93087B010FCA67D9B8289CBE6FA
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:FC009A82F0FAB71E2C8ADF7F60F489C8
SHA256:D2ADD358A45999E95F67D923F1B4F5A27F5A1A895225121909D716EDF5AE13E7
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\_socket.pydexecutable
MD5:566CB4D39B700C19DBD7175BD4F2B649
SHA256:77EBA293FE03253396D7BB6E575187CD026C80766D7A345EB72AD92F0BBBC3AA
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\_bz2.pydexecutable
MD5:684D656AADA9F7D74F5A5BDCF16D0EDB
SHA256:A5DFB4A663DEF3D2276B88866F6D220F6D30CC777B5D841CF6DBB15C6858017C
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\_lzma.pydexecutable
MD5:D63E2E743EA103626D33B3C1D882F419
SHA256:7C2D2030D5D246739C5D85F087FCF404BC36E1815E69A8AC7C9541267734FC28
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:B914966BC29D1C55A656071AD9E592AA
SHA256:35A8879678F63635E2D4D41DEC511B0E71AB8E5B8BF7F8B92AC615E4452D2AF8
5972main.exeC:\Users\admin\AppData\Local\Temp\_MEI59722\api-ms-win-core-heap-l1-1-0.dllexecutable
MD5:AC389B035DD1576C6BC69A36D6A38F29
SHA256:69D5A25D98F7636927543060E5629B3D1E5E3CC3B553C8CE10640421490142AE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
4
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4164
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6544
svchost.exe
20.190.159.23:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted

Threats

No threats detected
No debug info