File name:

a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15

Full analysis: https://app.any.run/tasks/dbe8a364-af37-478e-ab8f-29b12ec13417
Verdict: Malicious activity
Threats:

Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests.

Analysis date: June 21, 2025, 08:54:11
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealc
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

12C1842C3CCAFE7408C23EBF292EE3D9

SHA1:

4B1AF84CC11A8B1E290A18A4222A49526EEADD10

SHA256:

A040A0AF8697E30506218103074C7D6EA77A84BA3AC1EE5EFAE20F15530A19BB

SSDEEP:

6144:E5cdH53gHgJfEJI9a2owMw73I6fdpZDfqXZrVUt365Nq0Uj4:EIZQA1EYP4Q3DfWUyUj4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • STEALC mutex has been found

      • a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe (PID: 32)
    • STEALC has been detected

      • a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe (PID: 32)
  • SUSPICIOUS

    • Windows Defender mutex has been found

      • a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe (PID: 32)
    • Executes application which crashes

      • a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe (PID: 32)
  • INFO

    • Checks supported languages

      • a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe (PID: 32)
    • Reads the computer name

      • a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe (PID: 32)
    • Checks proxy server information

      • WerFault.exe (PID: 2696)
      • slui.exe (PID: 5628)
    • Reads the software policy settings

      • WerFault.exe (PID: 2696)
      • slui.exe (PID: 5628)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 2696)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (46.3)
.exe | Win64 Executable (generic) (41)
.exe | Win32 Executable (generic) (6.6)
.exe | Generic Win/DOS Executable (2.9)
.exe | DOS Executable Generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:09:28 17:40:46+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 240640
InitializedDataSize: 35049472
UninitializedDataSize: -
EntryPoint: 0x54bd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 91.0.0.0
ProductVersionNumber: 98.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Unknown (0294)
CharacterSet: Unknown (85B3)
FileVersions: 64.5.34.31
InternalName: Velectrelidat.exe
OriginalFileName: Hugidfgy.exe
ProductName: Hdfgodifjg
ProductVersion: 2.8.47.63
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #STEALC a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe werfault.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
32"C:\Users\admin\Desktop\a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe" C:\Users\admin\Desktop\a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225501
Modules
Images
c:\users\admin\desktop\a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2696C:\WINDOWS\SysWOW64\WerFault.exe -u -p 32 -s 384C:\Windows\SysWOW64\WerFault.exe
a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5628C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
9 574
Read events
9 574
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2696WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_a040a0af8697e305_ef2e23d25d2d6839ed0243619e1deeece81a33_de844655_b1ca1b6b-1c4b-4ef7-8e35-c39426141a4d\Report.wer
MD5:
SHA256:
2696WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6BFA.tmp.xmlxml
MD5:99E071BE5F4E571E079F6785218623F4
SHA256:82E644611B5E839305097329B8DA58E2189EBE65AA90B0249B563A208206CDD7
2696WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6BDA.tmp.WERInternalMetadata.xmlxml
MD5:7E8EAC8D13B53B153A1A9D6735BAA515
SHA256:808E450D1C05306D488CBC794CE8496D072EEC8D5947F88C9DBB811FD2601B8B
2696WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\a040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15530a19bba040a0af8697e30506218103074c7d6ea77a84ba3ac1ee5efae20f15.exe.32.dmpbinary
MD5:91F5AA1AD558A84BC7EEBF7F0DFA5E67
SHA256:EE687D6D91B191EAB11829F3B55E0D18812ECDA4BF93C8C9186E5F4D4BA9B9F3
2696WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6B9B.tmp.dmpbinary
MD5:0A62D64C4AAE1092DC88F68C1DF15213
SHA256:E14C2EAE6198C84BAEBB682B122EA8B7A9363E1F5565B6612937A9137747F04B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
30
TCP/UDP connections
42
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
184.24.77.17:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3732
RUXIMICS.exe
GET
200
184.24.77.17:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.24.77.17:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3732
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
40.126.32.76:443
https://login.live.com/RST2.srf
unknown
xml
1.24 Kb
whitelisted
POST
200
40.126.32.76:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
16.7 Kb
whitelisted
POST
200
40.126.32.133:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
POST
200
20.190.160.66:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3732
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
184.24.77.17:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3732
RUXIMICS.exe
184.24.77.17:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2696
WerFault.exe
20.189.173.22:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1268
svchost.exe
184.24.77.17:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 184.24.77.17
  • 184.24.77.18
  • 184.24.77.25
  • 184.24.77.12
  • 184.24.77.21
  • 184.24.77.28
  • 184.24.77.29
  • 184.24.77.15
  • 184.24.77.19
  • 184.24.77.22
  • 184.24.77.27
  • 184.24.77.23
  • 184.24.77.31
whitelisted
watson.events.data.microsoft.com
  • 20.189.173.22
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.130
  • 40.126.31.69
  • 40.126.31.71
  • 40.126.31.3
  • 20.190.159.64
  • 40.126.31.2
  • 20.190.159.130
  • 20.190.159.71
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info