File name:

Please run this file before installing.exe

Full analysis: https://app.any.run/tasks/15a3ce6a-bf1d-47c3-9953-056f6b85f06c
Verdict: Malicious activity
Analysis date: May 09, 2025, 07:21:07
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

C8D5DE938BCD0F346E50E0E13253DF2C

SHA1:

CB68BFB789C33C6E33A5DA100ECC858A869482E8

SHA256:

9B71C1B8C7B5BD2FC7C89A1590E9DF04B5338C48DD92EE25AC3ACF2B1647CFDF

SSDEEP:

196608:jN7mULFAV0Svcf5rkrzqAbvvxwx9CFDrbLZjKf:Js0kcfGLbnK3C1vLpKf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • x64.exe (PID: 7600)
      • x64.exe (PID: 7688)
      • install.exe (PID: 7716)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Please run this file before installing.exe (PID: 7384)
      • install.exe (PID: 7716)
    • Process drops legitimate windows executable

      • Please run this file before installing.exe (PID: 7384)
      • x64.exe (PID: 7688)
      • msiexec.exe (PID: 7944)
      • TiWorker.exe (PID: 7216)
    • Executable content was dropped or overwritten

      • Please run this file before installing.exe (PID: 7384)
      • x64.exe (PID: 7688)
      • TiWorker.exe (PID: 7216)
    • Starts a Microsoft application from unusual location

      • x64.exe (PID: 7600)
      • x64.exe (PID: 7688)
    • There is functionality for taking screenshot (YARA)

      • Please run this file before installing.exe (PID: 7384)
    • Reads the Windows owner or organization settings

      • install.exe (PID: 7716)
      • msiexec.exe (PID: 7944)
    • The process drops C-runtime libraries

      • TiWorker.exe (PID: 7216)
      • msiexec.exe (PID: 7944)
  • INFO

    • Checks supported languages

      • Please run this file before installing.exe (PID: 7384)
      • x64.exe (PID: 7688)
      • install.exe (PID: 7716)
      • msiexec.exe (PID: 7944)
    • The sample compiled with english language support

      • Please run this file before installing.exe (PID: 7384)
      • x64.exe (PID: 7688)
      • TiWorker.exe (PID: 7216)
      • msiexec.exe (PID: 7944)
    • Reads the computer name

      • Please run this file before installing.exe (PID: 7384)
      • x64.exe (PID: 7688)
      • install.exe (PID: 7716)
      • msiexec.exe (PID: 7944)
    • Create files in a temporary directory

      • Please run this file before installing.exe (PID: 7384)
      • install.exe (PID: 7716)
    • Process checks computer location settings

      • Please run this file before installing.exe (PID: 7384)
    • Reads the machine GUID from the registry

      • x64.exe (PID: 7688)
      • install.exe (PID: 7716)
      • msiexec.exe (PID: 7944)
    • The sample compiled with Italian language support

      • x64.exe (PID: 7688)
      • msiexec.exe (PID: 7944)
      • TiWorker.exe (PID: 7216)
    • The sample compiled with french language support

      • x64.exe (PID: 7688)
      • msiexec.exe (PID: 7944)
      • TiWorker.exe (PID: 7216)
    • The sample compiled with russian language support

      • x64.exe (PID: 7688)
      • TiWorker.exe (PID: 7216)
      • msiexec.exe (PID: 7944)
    • Reads the software policy settings

      • install.exe (PID: 7716)
      • msiexec.exe (PID: 7944)
      • TiWorker.exe (PID: 7216)
    • The sample compiled with spanish language support

      • x64.exe (PID: 7688)
      • msiexec.exe (PID: 7944)
      • TiWorker.exe (PID: 7216)
    • The sample compiled with chinese language support

      • x64.exe (PID: 7688)
      • msiexec.exe (PID: 7944)
      • TiWorker.exe (PID: 7216)
    • The sample compiled with japanese language support

      • x64.exe (PID: 7688)
      • TiWorker.exe (PID: 7216)
      • msiexec.exe (PID: 7944)
    • The sample compiled with korean language support

      • x64.exe (PID: 7688)
      • msiexec.exe (PID: 7944)
      • TiWorker.exe (PID: 7216)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7944)
    • The sample compiled with german language support

      • msiexec.exe (PID: 7944)
      • TiWorker.exe (PID: 7216)
    • Checks proxy server information

      • install.exe (PID: 7716)
    • Creates files or folders in the user directory

      • install.exe (PID: 7716)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 7944)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2007:11:20 21:12:45+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 7.1
CodeSize: 8192
InitializedDataSize: 15872
UninitializedDataSize: -
EntryPoint: 0x29aa
OSVersion: 4
ImageVersion: 4
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 10.3.0.250
ProductVersionNumber: 10.3.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: 游侠补丁网
FileDescription: MSYH_Install
FileVersion: -
LegalCopyright: Microsoft
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
6
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start please run this file before installing.exe x64.exe no specs x64.exe install.exe msiexec.exe tiworker.exe

Process information

PID
CMD
Path
Indicators
Parent process
7216C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -EmbeddingC:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Modules Installer Worker
Version:
10.0.19041.3989 (WinBuild.160101.0800)
Modules
Images
c:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\tiworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
7384"C:\Users\admin\AppData\Local\Temp\Please run this file before installing.exe" C:\Users\admin\AppData\Local\Temp\Please run this file before installing.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\please run this file before installing.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7600"C:\Users\admin\AppData\Local\Temp\x64.exe" C:\Users\admin\AppData\Local\Temp\x64.exePlease run this file before installing.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Visual C++ 2008 Redistributable Setup
Exit code:
3221226540
Version:
9.0.30729.17
Modules
Images
c:\users\admin\appdata\local\temp\x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7688"C:\Users\admin\AppData\Local\Temp\x64.exe" C:\Users\admin\AppData\Local\Temp\x64.exe
Please run this file before installing.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2008 Redistributable Setup
Exit code:
0
Version:
9.0.30729.17
Modules
Images
c:\users\admin\appdata\local\temp\x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7716c:\50af986a954f9f08c2\.\install.exeC:\50af986a954f9f08c2\install.exe
x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
External Installer
Exit code:
0
Version:
9.0.30729.1 built by: SP
Modules
Images
c:\50af986a954f9f08c2\install.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7944C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
12 729
Read events
12 283
Write events
376
Delete events
70

Modification events

(PID) Process:(7944) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
081F00007F20E7FFB2C0DB01
(PID) Process:(7944) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
E4FB56BD4C2365AA8DB5F4B0FFF40B9B7A2EBF8D3ED6AAA30D5B4551444E8BC4
(PID) Process:(7944) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(7944) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AA5D9C68C00F12943B2F6CA09FE28244
Operation:writeName:EFEE0228DC83E77358593193D847A0EC
Value:
22:\SOFTWARE\Microsoft\DevDiv\VC\Servicing\9.0\SP
(PID) Process:(7944) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DDA695F96EBE974FAAE0D63A6F7BE67
Operation:writeName:EFEE0228DC83E77358593193D847A0EC
Value:
22:\SOFTWARE\Microsoft\DevDiv\VC\Servicing\9.0\RED\1033\Install
(PID) Process:(7944) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
Operation:writeName:c:\Program Files\Common Files\Microsoft Shared\VC\msdia90.dll
Value:
1
(PID) Process:(7944) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E756C51681BDA34F86C2167896E312E
Operation:writeName:EFEE0228DC83E77358593193D847A0EC
Value:
c:\?Program Files\Common Files\Microsoft Shared\VC\msdia90.dll
(PID) Process:(7944) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CA0323ECE27EFDE3A87578CF1EFC6292
Operation:writeName:EFEE0228DC83E77358593193D847A0EC
Value:
>atl90.dll\Microsoft.VC90.ATL,version="9.0.30729.1",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64",type="win32"
(PID) Process:(7944) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BD393A1E6F641E435B2CF92FD5D23F0F
Operation:writeName:EFEE0228DC83E77358593193D847A0EC
Value:
(PID) Process:(7944) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8B5937E77E329E436AC4B32B7DF61A51
Operation:writeName:EFEE0228DC83E77358593193D847A0EC
Value:
Executable files
79
Suspicious files
60
Text files
93
Unknown types
6

Dropped files

PID
Process
Filename
Type
7688x64.exeC:\50af986a954f9f08c2\vc_red.cab
MD5:
SHA256:
7384Please run this file before installing.exeC:\Users\admin\AppData\Local\Temp\x64.exeexecutable
MD5:40395C175553CB14D2050888EFCCDF00
SHA256:55BF99AD3F063165C3EE1626787B5D4C2B65B5001FEF79DD58C3490369ED282F
7688x64.exeC:\50af986a954f9f08c2\install.exeexecutable
MD5:87603EA025623B19954E460ADD532048
SHA256:8D08136A1964C72B6B450B11D9BF2B3D3D289C26DFADFC9F021114EAC2CEA1CA
7688x64.exeC:\50af986a954f9f08c2\install.res.1042.dllexecutable
MD5:7F8F1D7116AE819F42690C360DFE1D9D
SHA256:E7DDDCB80D05B9F2D03384E073D994560E9D6229B0C3735285DA9679CF1E0AC7
7384Please run this file before installing.exeC:\Users\admin\AppData\Local\Temp\GLWBC00.tmptext
MD5:DB2F79B029F06645F3D73C06F872712D
SHA256:9C30C025E3BB44C36B3ED6378EF8E4D72D4B8F040306CF153B59FEB4C2719B6E
7688x64.exeC:\50af986a954f9f08c2\vc_red.msiexecutable
MD5:77A421C01414D744315F7B5C1D9E3150
SHA256:3E7C86E3DFDDC6D587CD0B1BAE0E73DCACCFD865962B3985C39009EC8926AE5F
7688x64.exeC:\50af986a954f9f08c2\install.res.1033.dllexecutable
MD5:644F7A3778DBA970902F59EF1217E383
SHA256:95FE2C2979E331D725825B30422DA1337266E7D4A029ED43E0312695F442DB36
7384Please run this file before installing.exeC:\Users\admin\AppData\Local\Temp\~GLH0000.TMPexecutable
MD5:40395C175553CB14D2050888EFCCDF00
SHA256:55BF99AD3F063165C3EE1626787B5D4C2B65B5001FEF79DD58C3490369ED282F
7688x64.exeC:\50af986a954f9f08c2\install.res.3082.dllexecutable
MD5:E07E419773EA85395E4AAEC8D1B617CD
SHA256:BF06314E611391E7329BB58F1BC6813E78D9CC152E22B5D4328FAD70A187E980
7688x64.exeC:\50af986a954f9f08c2\install.res.1041.dllexecutable
MD5:2BD1BF3C36436CBD3E065EB995B30ADB
SHA256:4E32F968065D2A2A05C19494BE5C08A538685E71FC97A981A6AF83475A544D8B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7716
install.exe
GET
200
2.16.164.130:80
http://crl.microsoft.com/pki/crl/products/CSPCA.crl
unknown
whitelisted
8040
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8040
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4784
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.147:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
40.126.31.1:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7716
install.exe
2.16.164.130:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.48.23.147
  • 23.48.23.164
  • 23.48.23.194
  • 23.48.23.166
  • 23.48.23.169
  • 23.48.23.145
  • 23.48.23.158
  • 23.48.23.141
  • 23.48.23.162
  • 2.16.164.130
  • 2.16.164.82
  • 2.16.164.89
  • 2.16.164.34
  • 2.16.164.32
  • 2.16.164.106
  • 2.16.164.27
  • 2.16.164.40
  • 2.16.164.91
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.31.1
  • 40.126.31.67
  • 20.190.159.73
  • 20.190.159.128
  • 40.126.31.3
  • 20.190.159.68
  • 40.126.31.131
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info