File name:

Technic Z1.1.exe

Full analysis: https://app.any.run/tasks/237d0bd1-f2d1-4f59-8fe2-49dbb3b5249d
Verdict: Malicious activity
Analysis date: June 03, 2025, 18:23:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
discord
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive, with extra data prepended
MD5:

8814E2C11C6D0ED36430C00C0DBDBD9B

SHA1:

062BD5999C0BDA1A717A65DB9C1345C401B9F238

SHA256:

9E3D23722F74AA253F651CD59C10F6DB19779DB4F5B8B6CBCEEE77F0ECCDC8E7

SSDEEP:

98304:ddIiA8SYLKmkWSQw+NOBXSGMisREThr6i4NZVvG2w2lor3H3gqUrbTZm4FOvi/xf:nYpz1JaZh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks for Java to be installed

      • Technic Z1.1.exe (PID: 5960)
      • Technic Z1.1.exe (PID: 6068)
    • Uses REG/REGEDIT.EXE to modify registry

      • javaw.exe (PID: 7380)
    • There is functionality for taking screenshot (YARA)

      • javaw.exe (PID: 7380)
  • INFO

    • Creates files in the program directory

      • javaw.exe (PID: 5968)
    • The sample compiled with english language support

      • Technic Z1.1.exe (PID: 5960)
    • Reads the computer name

      • javaw.exe (PID: 5968)
      • javaw.exe (PID: 7380)
    • Create files in a temporary directory

      • javaw.exe (PID: 5968)
      • javaw.exe (PID: 7380)
      • java.exe (PID: 8116)
      • java.exe (PID: 7224)
      • java.exe (PID: 7676)
    • Checks supported languages

      • javaw.exe (PID: 5968)
      • Technic Z1.1.exe (PID: 5960)
      • Technic Z1.1.exe (PID: 6068)
      • javaw.exe (PID: 7380)
      • java.exe (PID: 8116)
      • java.exe (PID: 7224)
      • java.exe (PID: 7676)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 5968)
      • javaw.exe (PID: 7380)
    • Creates files or folders in the user directory

      • javaw.exe (PID: 5968)
      • javaw.exe (PID: 7380)
    • Attempting to use instant messaging service

      • javaw.exe (PID: 7380)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:07:10 16:24:03+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: 2.22
CodeSize: 23040
InitializedDataSize: 31744
UninitializedDataSize: 36352
EntryPoint: 0x1590
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.0.0.757
ProductVersionNumber: 4.0.0.757
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: -
FileDescription: Technic Launcher
FileVersion: 4.0.0.757
InternalName: launcher
LegalCopyright: Syndicate, LLC, https://www.technicpack.net
LegalTrademarks: -
OriginalFileName: launcher.exe
ProductName: Technic Launcher
ProductVersion: 4.0.0.757
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
17
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start technic z1.1.exe no specs javaw.exe icacls.exe no specs conhost.exe no specs technic z1.1.exe no specs javaw.exe reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs java.exe no specs conhost.exe no specs java.exe no specs conhost.exe no specs java.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
856\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2236C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4008reg query HKEY_LOCAL_MACHINE\Software\JavaSoft\ /f Home /t REG_SZ /s /reg:64C:\Windows\System32\reg.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4272reg query HKEY_LOCAL_MACHINE\Software\JavaSoft\ /f Home /t REG_SZ /s /reg:32C:\Windows\System32\reg.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4560\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4620\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5116\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5960"C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exe" C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Technic Launcher
Exit code:
0
Version:
4.0.0.757
Modules
Images
c:\users\admin\appdata\local\temp\technic z1.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5968"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -Djava.net.preferIPv4Stack=true -Dawt.useSystemAAFontSettings=lcd -Dswing.aatext=true -classpath "C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exe;anything" net.technicpack.launcher.LauncherMainC:\Program Files\Java\jre1.8.0_271\bin\javaw.exe
Technic Z1.1.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6068"C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exe"C:\Users\admin\AppData\Local\Temp\Technic Z1.1.exejavaw.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Technic Launcher
Exit code:
0
Version:
4.0.0.757
Modules
Images
c:\users\admin\appdata\local\temp\technic z1.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
1 893
Read events
1 893
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
443
Text files
954
Unknown types
19

Dropped files

PID
Process
Filename
Type
5968javaw.exeC:\Users\admin\AppData\Roaming\.technic\settings.jsonbinary
MD5:B0293C01C9EF805A80E7FB9DF361C102
SHA256:B79F48EC48F33FD6890D7A3E27B4B7C0544CFF4FADA6DDCDE79FFDACE4DEC88D
7380javaw.exeC:\Users\admin\AppData\Roaming\.technic\logs\techniclauncher_2025-06-03.logtext
MD5:5E51288E996DEECDC43AA53FB566E658
SHA256:C6E121090F3EA8B4D6B3410FE5D38DCB2DCD5893A44F019E34C2D17F3C399931
7380javaw.exeC:\Users\admin\AppData\Roaming\.technic\assets\avatars\gravitar\Pyker.png
MD5:
SHA256:
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio3761594829993350411.tmpimage
MD5:C525BBB493AA27FBDC70C8B1316F7720
SHA256:E3C3454EE06979CAC0516984A7291558D7E52F43C6E60367F9797287E2390C97
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio28842161798625251.tmpimage
MD5:C525BBB493AA27FBDC70C8B1316F7720
SHA256:E3C3454EE06979CAC0516984A7291558D7E52F43C6E60367F9797287E2390C97
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio1104081089140555926.tmpimage
MD5:C525BBB493AA27FBDC70C8B1316F7720
SHA256:E3C3454EE06979CAC0516984A7291558D7E52F43C6E60367F9797287E2390C97
7380javaw.exeC:\Users\admin\AppData\Local\Temp\imageio6515045937468142364.tmpimage
MD5:0BBA5ABB1DC6C530B7AC07013D2AF13C
SHA256:CD42745BCD36ABC298E9C1E591E6F2770279AE9BE55768DDD0B467B5802DE0A1
5968javaw.exeC:\Users\admin\AppData\Local\Temp\imageio5028298480294986553.tmpimage
MD5:C525BBB493AA27FBDC70C8B1316F7720
SHA256:E3C3454EE06979CAC0516984A7291558D7E52F43C6E60367F9797287E2390C97
5968javaw.exeC:\ProgramData\Oracle\Java\.oracle_jre_usage\17dfc292991c8061.timestamptext
MD5:C63FC3407496501A9D7FECF39CDE6CE2
SHA256:20414038BA3E125B00041ECADAC7EFCC7C87EF337001927992C855E1AA2386CF
5968javaw.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\83aa4cc77f591dfc2374580bbd95f6ba_bb926e54-e3ca-40fd-ae90-2764341e7792dbf
MD5:C8366AE350E7019AEFC9D1E6E6A498C6
SHA256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
77
DNS requests
33
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7344
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7344
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
8044
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
5496
MoUsoCoreWorker.exe
23.209.214.100:80
www.microsoft.com
PT. Telekomunikasi Selular
ID
whitelisted
5404
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5968
javaw.exe
172.217.16.142:443
www.google-analytics.com
GOOGLE
US
whitelisted
7380
javaw.exe
104.26.7.125:443
technicpack.net
CLOUDFLARENET
US
whitelisted
7380
javaw.exe
192.0.80.240:443
gravatar.com
AUTOMATTIC
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 23.209.214.100
  • 2.23.181.156
whitelisted
www.google-analytics.com
  • 172.217.16.142
whitelisted
minecraft.net
  • 13.107.253.44
whitelisted
session.minecraft.net
  • 13.107.253.45
whitelisted
textures.minecraft.net
  • 13.107.246.45
whitelisted
libraries.minecraft.net
  • 13.107.253.45
shared
authserver.mojang.com
whitelisted
account.mojang.com
  • 2.16.206.146
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
7380
javaw.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2196
svchost.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
7380
javaw.exe
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
No debug info