File name:

IMPORTANT.exe

Full analysis: https://app.any.run/tasks/43573cd3-9012-44e6-8e57-264819755b60
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 17, 2025, 00:25:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
auto-reg
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 19 sections
MD5:

7C35E92F7DD769F3A25839736F3E69EF

SHA1:

734C8ECE6D0CE805F3EDD021DE9713A87C69F3DC

SHA256:

8D5B3E080F206250BAC7BDB17FFE9AF3E79411B2CCF519DF9A4436AADF299FAE

SSDEEP:

49152:g3YjBxoo6wO4cvHvNV3PyY6a6VUG5OIdTrC:g+aG5OIdTrC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • IMPORTANT.exe (PID: 1228)
      • IMPORTANT.exe (PID: 536)
      • IMPORTANT.exe (PID: 1020)
      • IMPORTANT.exe (PID: 4920)
      • IMPORTANT.exe (PID: 6244)
    • Create files in the Startup directory

      • IMPORTANT.exe (PID: 1228)
    • Actions looks like stealing of personal data

      • IMPORTANT.exe (PID: 1020)
      • IMPORTANT.exe (PID: 1228)
    • Modifies files in the Chrome extension folder

      • IMPORTANT.exe (PID: 1228)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • IMPORTANT.exe (PID: 5404)
    • Application launched itself

      • IMPORTANT.exe (PID: 5404)
      • IMPORTANT.exe (PID: 2908)
      • IMPORTANT.exe (PID: 1132)
    • Reads security settings of Internet Explorer

      • IMPORTANT.exe (PID: 5404)
    • Executable content was dropped or overwritten

      • IMPORTANT.exe (PID: 1228)
  • INFO

    • Reads the computer name

      • IMPORTANT.exe (PID: 5404)
      • IMPORTANT.exe (PID: 1228)
      • IMPORTANT.exe (PID: 536)
      • IMPORTANT.exe (PID: 1020)
      • IMPORTANT.exe (PID: 4920)
      • IMPORTANT.exe (PID: 6244)
    • Checks supported languages

      • IMPORTANT.exe (PID: 5404)
      • IMPORTANT.exe (PID: 1228)
      • IMPORTANT.exe (PID: 536)
      • IMPORTANT.exe (PID: 1020)
      • IMPORTANT.exe (PID: 4920)
      • IMPORTANT.exe (PID: 6244)
    • Auto-launch of the file from Startup directory

      • IMPORTANT.exe (PID: 1228)
    • Auto-launch of the file from Registry key

      • IMPORTANT.exe (PID: 1228)
      • IMPORTANT.exe (PID: 536)
      • IMPORTANT.exe (PID: 1020)
      • IMPORTANT.exe (PID: 4920)
      • IMPORTANT.exe (PID: 6244)
    • Creates files in the program directory

      • IMPORTANT.exe (PID: 1228)
      • IMPORTANT.exe (PID: 1020)
      • IMPORTANT.exe (PID: 4920)
      • IMPORTANT.exe (PID: 6244)
      • IMPORTANT.exe (PID: 536)
    • Process checks computer location settings

      • IMPORTANT.exe (PID: 5404)
    • Creates files or folders in the user directory

      • IMPORTANT.exe (PID: 1228)
      • IMPORTANT.exe (PID: 1020)
    • Manual execution by a user

      • IMPORTANT.exe (PID: 2908)
      • IMPORTANT.exe (PID: 1132)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:17 00:22:47+00:00
ImageFileCharacteristics: Executable, No line numbers, Large address aware
PEType: PE32+
LinkerVersion: 2.41
CodeSize: 854016
InitializedDataSize: 1077760
UninitializedDataSize: 3584
EntryPoint: 0x13e0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
364
Monitored processes
122
Malicious processes
3
Suspicious processes
3

Behavior graph

Click at the process to see the details
start important.exe no specs important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe no specs important.exe no specs important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe slui.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
536"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
632"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
672"C:\Users\admin\AppData\Roaming\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
776"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
872"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
904"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
924"C:\Users\admin\AppData\Roaming\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1020"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1088"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
12 912
Read events
12 901
Write events
11
Delete events
0

Modification events

(PID) Process:(1228) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(1020) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(4920) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(536) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(5024) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(6244) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(6744) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(6816) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(5964) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(2040) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
Executable files
2
Suspicious files
516
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1020IMPORTANT.exeC:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\DeploymentConfiguration.xml.encbinary
MD5:5BE769D0879613B1C90EC8F04FEA207A
SHA256:161A741DC9F5CB4C0781CB062B9D970AC5030912940F72B106D67EE3ED51DB51
1228IMPORTANT.exeC:\Users\admin\AppData\Local\ElevatedDiagnostics\3243677927\2021090614.001\ResultReport.xml.encbinary
MD5:51161AC568079864EE7B2DEF90980040
SHA256:78677C7DBB21E96AB170884BE2B729D3C406BA51E4CDF19C5BB4EDA12B9A77CC
1228IMPORTANT.exeC:\ProgramData\Microsoft\ClickToRun\DeploymentConfig.1.xml.encbinary
MD5:3D61EA3678B84BE7F7BCA0A1E1F4EC60
SHA256:815E6C871EA51293D02B1F241527F4034196A92413BFA440BF23881D5F1F228F
1228IMPORTANT.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt.enc
MD5:
SHA256:
1228IMPORTANT.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\craw_window.html.enc
MD5:
SHA256:
1228IMPORTANT.exeC:\Users\admin\AppData\Roaming\IMPORTANT.exeexecutable
MD5:7C35E92F7DD769F3A25839736F3E69EF
SHA256:8D5B3E080F206250BAC7BDB17FFE9AF3E79411B2CCF519DF9A4436AADF299FAE
1228IMPORTANT.exeC:\Users\admin\AppData\Local\ElevatedDiagnostics\3243677927\2021090614.000\ResultReport.xml.encbinary
MD5:B678C35922ECAECB21E6A8DDBE586C2B
SHA256:976D0EF1A1D8520A03A13A2C8AFBE2E9ABBFE81E6DFB2276F39B82F9419FDC30
1228IMPORTANT.exeC:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\brndlog.txt.encbinary
MD5:276C7C63E122936BF9F0EBC6268AC4BF
SHA256:79F83124C4624EBEEFBB80ECA1D25184B32B44B543F5F090F0CB835CAC4806D5
1228IMPORTANT.exeC:\Users\admin\AppData\Local\ElevatedDiagnostics\3243677927\2021090614.001\WindowsHideUnhide.debugreport.xml.encbinary
MD5:EA70CB0374FB4B9BC41C44AB61E8F679
SHA256:8A8454B55DCE5B29CA8104A971849475C59211FCC1E490C62CCD0A92F9ACCD19
1228IMPORTANT.exeC:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\IECompatData\iecompatdata.xml.encbinary
MD5:F5354D5A8BA6498294B4224B6BD745D7
SHA256:3BD84AF39C241BE5FC51F96D0C816D33F9E7FDAE8DB011A87B3D33D585868D4E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
32
DNS requests
21
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7804
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7804
SIHClient.exe
13.95.31.18:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3240
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.110
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
login.live.com
  • 20.190.160.3
  • 40.126.32.68
  • 20.190.160.14
  • 20.190.160.2
  • 20.190.160.4
  • 20.190.160.65
  • 40.126.32.140
  • 40.126.32.133
whitelisted

Threats

No threats detected
No debug info