File name:

remover.exe

Full analysis: https://app.any.run/tasks/698d828e-e01e-4080-bafd-3611760adca9
Verdict: Malicious activity
Analysis date: June 01, 2025, 08:17:59
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pyinstaller
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

C0F73739B27E74631D559D53CE352D84

SHA1:

DCC94DF4448AC0198B41F4F515D92DDDE62A48DE

SHA256:

A3BFC0780ADE271D462CE6F612EDC283B84E781D7AE6DBCA2018FB61AC5AE83C

SSDEEP:

196608:Lux7QC8ICteEroXxWVfEqlbkkwR7VTE548RmU/3ZlsPvu4DoDTvN8CXLNGO/639p:Qx8InEroXgfEqirRRo5tN3ZWu4DSTtLu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • remover.exe (PID: 7816)
    • Process drops python dynamic module

      • remover.exe (PID: 7816)
    • Executable content was dropped or overwritten

      • remover.exe (PID: 7816)
    • Process drops legitimate windows executable

      • remover.exe (PID: 7816)
    • There is functionality for taking screenshot (YARA)

      • remover.exe (PID: 7816)
      • remover.exe (PID: 3192)
    • Application launched itself

      • remover.exe (PID: 7816)
    • Loads Python modules

      • remover.exe (PID: 3192)
    • Starts CMD.EXE for commands execution

      • remover.exe (PID: 3192)
  • INFO

    • Checks supported languages

      • remover.exe (PID: 7816)
      • remover.exe (PID: 3192)
    • Reads the computer name

      • remover.exe (PID: 7816)
      • remover.exe (PID: 3192)
    • The sample compiled with english language support

      • remover.exe (PID: 7816)
    • Create files in a temporary directory

      • remover.exe (PID: 7816)
    • PyInstaller has been detected (YARA)

      • remover.exe (PID: 7816)
      • remover.exe (PID: 3192)
    • Reads the machine GUID from the registry

      • remover.exe (PID: 3192)
    • Reads the software policy settings

      • slui.exe (PID: 1812)
    • Checks operating system version

      • remover.exe (PID: 3192)
    • Checks proxy server information

      • slui.exe (PID: 1812)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2022:07:06 20:23:42+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.29
CodeSize: 144896
InitializedDataSize: 148480
UninitializedDataSize: -
EntryPoint: 0xa8c8
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
5
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start remover.exe remover.exe no specs cmd.exe no specs conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
644\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
672C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exeremover.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
1812C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3192"C:\Users\admin\Desktop\remover.exe" C:\Users\admin\Desktop\remover.exeremover.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\remover.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7816"C:\Users\admin\Desktop\remover.exe" C:\Users\admin\Desktop\remover.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\remover.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
4 030
Read events
4 030
Write events
0
Delete events
0

Modification events

No data
Executable files
22
Suspicious files
38
Text files
942
Unknown types
0

Dropped files

PID
Process
Filename
Type
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\_asyncio.pydexecutable
MD5:3510357B9885A59B08FA557E3BAED3CE
SHA256:3AD5F4BD4361DF0C077122A91D180DCF9B68B0249FC6B39EDDA5DD4ECE6F23F1
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\_decimal.pydexecutable
MD5:BB70FC3EB76B6801ED7228B6869017B2
SHA256:831E4CE99F469FA94567482444AF492891B7BF327853E92DD4BB2CE092021E74
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\_ctypes.pydexecutable
MD5:7AB242D7C026DAD5E5837B4579BD4EDA
SHA256:1548506345D220D68E9089B9A68B42A9D796141EB6236E600283951CB206EAA1
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\VCRUNTIME140.dllexecutable
MD5:11D9AC94E8CB17BD23DEA89F8E757F18
SHA256:E1D6F78A72836EA120BD27A33AE89CBDC3F3CA7D9D0231AAA3AAC91996D2FA4E
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\_lzma.pydexecutable
MD5:A77C9A75ED7D9F455E896B8FB09B494C
SHA256:4797AAF192EB56B32CA4FEBD1FAD5BE9E01A24E42BF6AF2D04FCDF74C8D36FA5
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\_multiprocessing.pydexecutable
MD5:090756C9D9317A92830E81A0493A1767
SHA256:A55C37779772A36BFB5811CC349DCDC2429EF1FBAB40FE4CFEA9D7FCD23173AB
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\_hashlib.pydexecutable
MD5:AE32A39887D7516223C1E7FFDC3B6911
SHA256:7936413BC24307F01B90CAC2D2CC19F38264D396C1AB8EDA180ABBA2F77162EB
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\_bz2.pydexecutable
MD5:124678D21D4B747EC6F1E77357393DD6
SHA256:9483C4853CA1DA3C5B2310DBDD3B835A44DF6066620278AA96B2E665C4B4E86B
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\libcrypto-1_1.dllexecutable
MD5:63C4F445B6998E63A1414F5765C18217
SHA256:664C3E52F914E351BB8A66CE2465EE0D40ACAB1D2A6B3167AE6ACF6F1D1724D2
7816remover.exeC:\Users\admin\AppData\Local\Temp\_MEI78162\_socket.pydexecutable
MD5:4B2F1FAAB9E55A65AFA05F407C92CAB4
SHA256:241DB349093604AB25405402BA8C4212016657C7E6A10EDD3110ABEB1CC2E1BA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
43
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4164
svchost.exe
GET
200
23.216.77.21:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8000
RUXIMICS.exe
GET
200
23.216.77.21:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4164
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
20.190.159.64:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
POST
200
20.190.159.71:443
https://login.live.com/RST2.srf
unknown
xml
11.0 Kb
whitelisted
8000
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
304
20.12.23.50:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
GET
200
20.12.23.50:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
2740
SIHClient.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
2740
SIHClient.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4164
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
8000
RUXIMICS.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4164
svchost.exe
23.216.77.21:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
8000
RUXIMICS.exe
23.216.77.21:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4164
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
8000
RUXIMICS.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4164
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 23.216.77.21
  • 23.216.77.22
  • 23.216.77.30
  • 23.216.77.35
  • 23.216.77.19
  • 23.216.77.37
  • 23.216.77.15
  • 23.216.77.36
  • 23.216.77.20
  • 2.20.245.137
  • 2.20.245.139
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.76
  • 20.190.160.67
  • 20.190.160.132
  • 20.190.160.128
  • 40.126.32.133
  • 20.190.160.66
  • 40.126.32.74
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 51.132.193.104
whitelisted

Threats

No threats detected
No debug info