File name:

Technic Z1.1.exe

Full analysis: https://app.any.run/tasks/237d0bd1-f2d1-4f59-8fe2-49dbb3b5249d
Verdict: Malicious activity
Analysis date: June 03, 2025, 18:23:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
discord
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive, with extra data prepended
MD5:

8814E2C11C6D0ED36430C00C0DBDBD9B

SHA1:

062BD5999C0BDA1A717A65DB9C1345C401B9F238

SHA256:

9E3D23722F74AA253F651CD59C10F6DB19779DB4F5B8B6CBCEEE77F0ECCDC8E7

SSDEEP:

98304:ddIiA8SYLKmkWSQw+NOBXSGMisREThr6i4NZVvG2w2lor3H3gqUrbTZm4FOvi/xf:nYpz1JaZh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks for Java to be installed

      • Technic Z1.1.exe (PID: 5960)
      • Technic Z1.1.exe (PID: 6068)
    • Uses REG/REGEDIT.EXE to modify registry

      • javaw.exe (PID: 7380)
    • There is functionality for taking screenshot (YARA)

      • javaw.exe (PID: 7380)
  • INFO

    • Checks supported languages

      • Technic Z1.1.exe (PID: 5960)
      • javaw.exe (PID: 5968)
      • Technic Z1.1.exe (PID: 6068)
      • javaw.exe (PID: 7380)
      • java.exe (PID: 8116)
      • java.exe (PID: 7224)
      • java.exe (PID: 7676)
    • The sample compiled with english language support

      • Technic Z1.1.exe (PID: 5960)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 5968)
      • javaw.exe (PID: 7380)
    • Reads the computer name

      • javaw.exe (PID: 5968)
      • javaw.exe (PID: 7380)
    • Creates files in the program directory

      • javaw.exe (PID: 5968)
    • Creates files or folders in the user directory

      • javaw.exe (PID: 5968)
      • javaw.exe (PID: 7380)
    • Create files in a temporary directory

      • javaw.exe (PID: 5968)
      • javaw.exe (PID: 7380)
      • java.exe (PID: 8116)
      • java.exe (PID: 7224)
      • java.exe (PID: 7676)
    • Attempting to use instant messaging service

      • javaw.exe (PID: 7380)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:07:10 16:24:03+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: 2.22
CodeSize: 23040
InitializedDataSize: 31744
UninitializedDataSize: 36352
EntryPoint: 0x1590
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.0.0.757
ProductVersionNumber: 4.0.0.757
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: -
FileDescription: Technic Launcher
FileVersion: 4.0.0.757
InternalName: launcher
LegalCopyright: Syndicate, LLC, https://www.technicpack.net
LegalTrademarks: -
OriginalFileName: launcher.exe
ProductName: Technic Launcher
ProductVersion: 4.0.0.757
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
17
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start technic z1.1.exe no specs javaw.exe icacls.exe no specs conhost.exe no specs technic z1.1.exe no specs javaw.exe reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs java.exe no specs conhost.exe no specs java.exe no specs conhost.exe no specs java.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
856\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2236C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4008reg query HKEY_LOCAL_MACHINE\Software\JavaSoft\ /f Home /t REG_SZ /s /reg:64C:\Windows\System32\reg.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4272reg query HKEY_LOCAL_MACHINE\Software\JavaSoft\ /f Home /t REG_SZ /s /reg:32C:\Windows\System32\reg.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4560\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4620\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5116\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5960"C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exe" C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Technic Launcher
Exit code:
0
Version:
4.0.0.757
Modules
Images
c:\users\admin\appdata\local\temp\technic z1.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5968"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -Djava.net.preferIPv4Stack=true -Dawt.useSystemAAFontSettings=lcd -Dswing.aatext=true -classpath "C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exe;anything" net.technicpack.launcher.LauncherMainC:\Program Files\Java\jre1.8.0_271\bin\javaw.exe
Technic Z1.1.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6068"C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exe"C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exejavaw.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Technic Launcher
Exit code:
0
Version:
4.0.0.757
Modules
Images
c:\users\admin\appdata\local\temp\technic z1.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
1 893
Read events
1 893
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
443
Text files
954
Unknown types
19

Dropped files

PID
Process
Filename
Type
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio3761594829993350411.tmpimage
MD5:C525BBB493AA27FBDC70C8B1316F7720
SHA256:E3C3454EE06979CAC0516984A7291558D7E52F43C6E60367F9797287E2390C97
7380javaw.exeC:\Users\admin\AppData\Roaming\.technic\installedPacks.tmpbinary
MD5:5F3111AF06764BDC50D87306C843DD9A
SHA256:0A109C6CA8B45EC947FEE3304ABF11633608C2DC204E89194AE444DFB6FC56A5
7380javaw.exeC:\Users\admin\AppData\Roaming\.technic\assets\avatars\gravitar\Pyker.png
MD5:
SHA256:
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio1104081089140555926.tmpimage
MD5:C525BBB493AA27FBDC70C8B1316F7720
SHA256:E3C3454EE06979CAC0516984A7291558D7E52F43C6E60367F9797287E2390C97
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio28842161798625251.tmpimage
MD5:C525BBB493AA27FBDC70C8B1316F7720
SHA256:E3C3454EE06979CAC0516984A7291558D7E52F43C6E60367F9797287E2390C97
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio3944948022969576055.tmpimage
MD5:6141D4E01928FC4AC4E4BF44BDDCA402
SHA256:9C4D702F14D23F44F4A13BF45F64C5CABB689F1666815EA22F852DC84226BA50
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio3277023949019222056.tmpimage
MD5:AA8D19A7362F24852FAC677CEA2A44DB
SHA256:E741B27BD18381025F9EE2B9729032AABCF3C748E2C319B0653CD498239C3B1A
7380javaw.exeC:\Users\admin\AppData\Roaming\.technic\installedPacksbinary
MD5:5F3111AF06764BDC50D87306C843DD9A
SHA256:0A109C6CA8B45EC947FEE3304ABF11633608C2DC204E89194AE444DFB6FC56A5
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio4582259118991494566.tmpimage
MD5:D7139DA85852E45916F42EB7C0DF71C6
SHA256:3AB0DE5DEFAC72D3E7850470E111CC55CDBD300CDA1472789B5F39E36459B92A
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio1494226552823650902.tmpimage
MD5:C525BBB493AA27FBDC70C8B1316F7720
SHA256:E3C3454EE06979CAC0516984A7291558D7E52F43C6E60367F9797287E2390C97
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
77
DNS requests
33
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7344
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7344
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
8044
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
5496
MoUsoCoreWorker.exe
23.209.214.100:80
www.microsoft.com
PT. Telekomunikasi Selular
ID
whitelisted
5404
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5968
javaw.exe
172.217.16.142:443
www.google-analytics.com
GOOGLE
US
whitelisted
7380
javaw.exe
104.26.7.125:443
technicpack.net
CLOUDFLARENET
US
whitelisted
7380
javaw.exe
192.0.80.240:443
gravatar.com
AUTOMATTIC
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 23.209.214.100
  • 2.23.181.156
whitelisted
www.google-analytics.com
  • 172.217.16.142
whitelisted
minecraft.net
  • 13.107.253.44
whitelisted
session.minecraft.net
  • 13.107.253.45
whitelisted
textures.minecraft.net
  • 13.107.246.45
whitelisted
libraries.minecraft.net
  • 13.107.253.45
shared
authserver.mojang.com
whitelisted
account.mojang.com
  • 2.16.206.146
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
7380
javaw.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2196
svchost.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
7380
javaw.exe
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
No debug info