File name:

tcmd1151x32_64.exe

Full analysis: https://app.any.run/tasks/b7db9363-6948-47d6-80c4-04ad0678ed66
Verdict: Malicious activity
Analysis date: March 19, 2025, 08:25:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive, 4 sections
MD5:

021F79E4B4C01A9CD6D028A265D07DA1

SHA1:

BE2097026DB89927EBE4DBD47426D4FEF154A797

SHA256:

A417157D9B5E988785AA27703CFDBB9D7EDBF58C6427D14EC0FB80AF69C4BED7

SSDEEP:

98304:h4UZGMwcRE+hzD4YCK5f5p99039qPcujlfsrKPJTRKGBdzgcr2yd5wFqwtxV9iRu:Qx/iM6rhhuMQfvU2QQFfMml

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • tcmd1151x32_64.exe (PID: 7412)
    • Drops a system driver (possible attempt to evade defenses)

      • tcmd1151x32_64.exe (PID: 7412)
    • The process creates files with name similar to system file names

      • tcmd1151x32_64.exe (PID: 7412)
    • Drops 7-zip archiver for unpacking

      • tcmd1151x32_64.exe (PID: 7412)
  • INFO

    • The sample compiled with english language support

      • tcmd1151x32_64.exe (PID: 7412)
    • Creates files or folders in the user directory

      • tcmd1151x32_64.exe (PID: 7412)
    • Creates files in the program directory

      • tcmd1151x32_64.exe (PID: 7412)
    • The sample compiled with german language support

      • tcmd1151x32_64.exe (PID: 7412)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (35.8)
.exe | Win64 Executable (generic) (31.7)
.scr | Windows screen saver (15)
.dll | Win32 Dynamic Link Library (generic) (7.5)
.exe | Win32 Executable (generic) (5.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:16 10:20:58+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 102400
InitializedDataSize: 61440
UninitializedDataSize: -
EntryPoint: 0x14378
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 11.51.0.0
ProductVersionNumber: 11.51.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: -
CompanyName: Ghisler Software GmbH
FileDescription: Total Commander Installer
FileVersion: 11.51
InternalName: INSTALL
LegalCopyright: Copyright © Ghisler Software GmbH 1993-2025
LegalTrademarks: -
OriginalFileName: install.exe
PrivateBuild: -
ProductName: Total Commander Installer
ProductVersion: 11.51
SpecialBuild: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start tcmd1151x32_64.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7388C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7412"C:\Users\admin\AppData\Local\Temp\tcmd1151x32_64.exe" C:\Users\admin\AppData\Local\Temp\tcmd1151x32_64.exe
explorer.exe
User:
admin
Company:
Ghisler Software GmbH
Integrity Level:
HIGH
Description:
Total Commander Installer
Version:
11.51
Modules
Images
c:\windows\syswow64\windows.storage.dll
c:\windows\syswow64\wldp.dll
c:\windows\syswow64\shlwapi.dll
c:\windows\syswow64\cfgmgr32.dll
c:\windows\syswow64\clbcatq.dll
c:\windows\syswow64\propsys.dll
c:\windows\syswow64\secur32.dll
c:\windows\syswow64\profapi.dll
c:\windows\syswow64\linkinfo.dll
c:\windows\syswow64\ntshrui.dll
Total events
273
Read events
253
Write events
20
Delete events
0

Modification events

(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_CURRENT_USER\SOFTWARE\Ghisler\Total Commander
Operation:writeName:IniFileName
Value:
%APPDATA%\GHISLER\wincmd.ini
(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_CURRENT_USER\SOFTWARE\Ghisler\Total Commander
Operation:writeName:FtpIniName
Value:
%APPDATA%\GHISLER\wcx_ftp.ini
(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_CURRENT_USER\SOFTWARE\Ghisler\Total Commander
Operation:writeName:InstallDir
Value:
C:\Program Files\totalcmd
(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ghisler\Total Commander
Operation:writeName:IniFileName
Value:
%APPDATA%\GHISLER\wincmd.ini
(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ghisler\Total Commander
Operation:writeName:FtpIniName
Value:
%APPDATA%\GHISLER\wcx_ftp.ini
(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ghisler\Total Commander
Operation:writeName:InstallDir
Value:
C:\Program Files\totalcmd
(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Ghisler\Total Commander
Operation:writeName:IniFileName
Value:
%APPDATA%\GHISLER\wincmd.ini
(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Ghisler\Total Commander
Operation:writeName:FtpIniName
Value:
%APPDATA%\GHISLER\wcx_ftp.ini
(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Ghisler\Total Commander
Operation:writeName:InstallDir
Value:
C:\Program Files\totalcmd
(PID) Process:(7412) tcmd1151x32_64.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Totalcmd64
Operation:writeName:DisplayName
Value:
Total Commander 64+32-bit (Remove or Repair)
Executable files
51
Suspicious files
8
Text files
68
Unknown types
0

Dropped files

PID
Process
Filename
Type
7412tcmd1151x32_64.exeC:\Users\admin\AppData\Roaming\GHISLER\wincmd.initext
MD5:8D158FF6C3D1872A17896CA8A116C9B1
SHA256:6F54122F094088382BACECFEE05210769EA957F5CDD35B6F4E1E69EA6851EBE8
7412tcmd1151x32_64.exeC:\Program Files\totalcmd\LANGUAGE\WCMD_DAN.LNGtext
MD5:7F92BD8D248E18D1126A0361FB482905
SHA256:5C0677EE3E149909B77CB367368970B677306AF204BAA5F2B252C4DF1572283F
7412tcmd1151x32_64.exeC:\Program Files\totalcmd\TOTALCMD.CHMbinary
MD5:8AAA1D6C0FBB86F703A7E5DCAE006FD3
SHA256:A3E720451A160E7DF616C37BA7FAE23D7F6FA2FD4FA412702FB8308CF9AC7936
7412tcmd1151x32_64.exeC:\Program Files\totalcmd\LANGUAGE\WCMD_CZ.MNUtext
MD5:274B975F020BCA432F36F940DBE1F079
SHA256:3F2DCEB5678A39E6A301AABA1FAF02D5D2C06FDC6AEFF4C7ABF2E4A89936E6BE
7412tcmd1151x32_64.exeC:\Program Files\totalcmd\LANGUAGE\WCMD_CZ.INCtext
MD5:EA550941F843D1023B0E6F5521C9F753
SHA256:730F98D3B8ED2578E43B9A9C855A8CA243F433B4C3F413F9245DBAC3368F0065
7412tcmd1151x32_64.exeC:\Program Files\totalcmd\KEYBOARD.TXTtext
MD5:D182D9DFE03704BEC3CDED09CF11B8BF
SHA256:CFEDDACEC4BC2E94FADD55E3C650D41D51B7DACF910D1245252DFC57788D7B39
7412tcmd1151x32_64.exeC:\Program Files\totalcmd\LANGUAGE\WCMD_DEU.LNGtext
MD5:FE76B84E1CED7571308F65B4A58FBB0B
SHA256:97F3E37BCB855716B1DE87546EC49F76F9EACDAA3427F25D0F4F4133A9CFE519
7412tcmd1151x32_64.exeC:\Program Files\totalcmd\LANGUAGE\WCMD_DEU.INCtext
MD5:50A46BF22DEFE1C1CBDFC54B692460AD
SHA256:670BC80E0742E2FA7934FBFDEBE4C18729C421B986BC6E9450523AED0C7727EC
7412tcmd1151x32_64.exeC:\Program Files\totalcmd\LANGUAGE\WCMD_DUT.INCtext
MD5:555CEBDB73EDFF3133AB276C9A843D02
SHA256:2A6A93A16C54A1589E1083AFDA0A9AE927224DD0CFCF91B2ABFFCB1C1B9B1BC1
7412tcmd1151x32_64.exeC:\Program Files\totalcmd\LANGUAGE\WCMD_DUT.MNUtext
MD5:1516BD5547BB3B8E03633DF84BFD0EDF
SHA256:D4E5F155A38FF16B504A779ED6B416F8B04BBAF10665CAB5873EB186736D10D6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6436
backgroundTaskHost.exe
GET
200
23.40.158.218:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.72:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6436
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.72
  • 2.16.164.49
  • 2.16.164.106
whitelisted
google.com
  • 172.217.16.206
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.159.130
  • 40.126.31.2
  • 40.126.31.1
  • 20.190.159.129
  • 40.126.31.130
  • 40.126.31.71
  • 20.190.159.2
  • 20.190.159.0
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 23.40.158.218
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info