File name:

aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590

Full analysis: https://app.any.run/tasks/951caac0-7d23-48a4-a698-768f257d2738
Verdict: Malicious activity
Analysis date: May 16, 2025, 02:44:39
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

053782171A6401D3325C60570727A88F

SHA1:

2E4CED6D2C99FBCAA721303CFFA7DB6537D09DD4

SHA256:

AA3AAABBE78BA16A203B436FCE46BAB9E9E72BB7E2D4CE66D846A56494FCC590

SSDEEP:

196608:O6YU9T7EV3XdSBvOGTP/0G/jDaZCu+nUQx:jT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts CMD.EXE for self-deleting

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
    • Executable content was dropped or overwritten

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
    • Starts itself from another location

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
    • Starts CMD.EXE for commands execution

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
    • Hides command output

      • cmd.exe (PID: 7424)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 7424)
    • Executes application which crashes

      • Carolee Corty.exe (PID: 7356)
  • INFO

    • Checks supported languages

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
      • Carolee Corty.exe (PID: 7356)
    • Reads the machine GUID from the registry

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
      • Carolee Corty.exe (PID: 7356)
    • Reads the computer name

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
      • Carolee Corty.exe (PID: 7356)
    • Disables trace logs

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
      • Carolee Corty.exe (PID: 7356)
    • Checks proxy server information

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
      • Carolee Corty.exe (PID: 7356)
    • Create files in a temporary directory

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
    • Process checks computer location settings

      • aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe (PID: 5308)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 8016)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2040:08:01 19:27:28+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 5726720
InitializedDataSize: 5120
UninitializedDataSize: -
EntryPoint: 0x57818e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: XSTCDVEBC
FileVersion: 1.0.0.0
InternalName: TUMNW.exe
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: TUMNW.exe
ProductName: XSTCDVEBC
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
9
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe sppextcomobj.exe no specs slui.exe no specs carolee corty.exe cmd.exe no specs conhost.exe no specs ping.exe no specs werfault.exe no specs aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4024"C:\Users\admin\AppData\Local\Temp\aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe" C:\Users\admin\AppData\Local\Temp\aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
XSTCDVEBC
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5308"C:\Users\admin\AppData\Local\Temp\aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe" C:\Users\admin\AppData\Local\Temp\aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
XSTCDVEBC
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7264C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7308"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7356"C:\Users\admin\AppData\Local\Temp\Carolee Corty.exe" C:\Users\admin\AppData\Local\Temp\Carolee Corty.exe
aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe
User:
admin
Integrity Level:
HIGH
Description:
AEUYSEYZI
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\carolee corty.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7424"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\admin\AppData\Local\Temp\aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe"C:\Windows\SysWOW64\cmd.exeaa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7516ping 1.1.1.1 -n 1 -w 3000 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8016C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7356 -s 2340C:\Windows\SysWOW64\WerFault.exeCarolee Corty.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
4 239
Read events
4 186
Write events
50
Delete events
3

Modification events

(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5308) aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
8016WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Carolee Corty.ex_cf2ca182e9d79eba6ee975b7b33f5d82050cdf9_1bc8ea89_8bae218f-92d4-41a9-8586-6db3baff156e\Report.wer
MD5:
SHA256:
8016WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Carolee Corty.exe.7356.dmp
MD5:
SHA256:
8016WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER2191.tmp.xmlxml
MD5:3B3A42FCC37240C27BD5E8F06C756676
SHA256:DA02D9BD9C392D349926AA01B89E4DE0F35FD6B128DAFC76E86E3D433BB42CF4
8016WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER2161.tmp.WERInternalMetadata.xmlbinary
MD5:37163A0FD86D2841FA940BD4F4877CDC
SHA256:24AB0A3D82218F647B982D894CD4686540C2080F27E3BF6C9D96DC638EF9EE72
5308aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exeC:\Users\admin\AppData\Local\Temp\Carolee Corty.exeexecutable
MD5:053782171A6401D3325C60570727A88F
SHA256:AA3AAABBE78BA16A203B436FCE46BAB9E9E72BB7E2D4CE66D846A56494FCC590
8016WerFault.exeC:\Windows\appcompat\Programs\Amcache.hvebinary
MD5:AAB0483D52CCB058CE88A187DD6AE0C0
SHA256:DDC8C205468B019102B5F06572DDF7B628BAD2B777F01519BFC7AA595D112D38
8016WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER1F1E.tmp.dmpbinary
MD5:85A8F8729D48E6F5BDA607BAFCE94E75
SHA256:6E9EB1B186B4B1BE298159074C1EF0C74FC18EEBA9F9CCCEA84BDFAA19726D8A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
20
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5308
aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe
GET
200
84.32.84.32:80
http://gamerbooster.net/download/pubg/version
unknown
unknown
7356
Carolee Corty.exe
GET
200
84.32.84.32:80
http://gamerbooster.net/download/pubg/version
unknown
unknown
7356
Carolee Corty.exe
GET
204
142.250.186.46:80
http://google.com/generate_204
unknown
whitelisted
8044
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8044
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5308
aa3aaabbe78ba16a203b436fce46bab9e9e72bb7e2d4ce66d846a56494fcc590.exe
84.32.84.32:80
gamerbooster.net
LT
unknown
7356
Carolee Corty.exe
84.32.84.32:80
gamerbooster.net
LT
unknown
6544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.20.245.139
  • 2.20.245.137
whitelisted
google.com
  • 142.250.186.46
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
gamerbooster.net
  • 84.32.84.32
unknown
login.live.com
  • 20.190.159.0
  • 20.190.159.130
  • 40.126.31.131
  • 40.126.31.129
  • 20.190.159.23
  • 40.126.31.2
  • 20.190.159.129
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted

Threats

No threats detected
No debug info