File name:

RuntimeBroker.exe

Full analysis: https://app.any.run/tasks/877d8786-0d26-4ac8-9fdc-661fdeee0826
Verdict: Malicious activity
Analysis date: July 17, 2025, 14:27:11
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

A5866C018192D944C652D8F1259B1EF1

SHA1:

C2BE04E0C789B8D858C1886AC7E366E0ED2B621E

SHA256:

B2DB33FDCB12889BF6F6BD8CE829CFFF53261CF5F6F3CB294096708C4C507941

SSDEEP:

49152:R+o7RPY2uikNeRyd72MlsLDil92m3GjNsz/3DgZyFWtEhI/fsbWbzqhLoGdGIHHP:62uiieRyd72QsLDil92m3GJEDgqWu7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • RuntimeBroker.exe (PID: 3832)
      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
      • Runtime Broker.exe (PID: 4052)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • RuntimeBroker.exe (PID: 3832)
    • Starts itself from another location

      • RuntimeBroker.exe (PID: 3832)
    • Reads the date of Windows installation

      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
    • Reads security settings of Internet Explorer

      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
      • Runtime Broker.exe (PID: 4052)
    • Executing commands from a ".bat" file

      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
    • Starts CMD.EXE for commands execution

      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2504)
      • cmd.exe (PID: 3740)
      • cmd.exe (PID: 1352)
      • cmd.exe (PID: 6664)
      • cmd.exe (PID: 4264)
      • cmd.exe (PID: 5988)
      • cmd.exe (PID: 2064)
      • cmd.exe (PID: 5768)
      • cmd.exe (PID: 5780)
      • cmd.exe (PID: 6812)
      • cmd.exe (PID: 4748)
      • cmd.exe (PID: 4512)
      • cmd.exe (PID: 5244)
      • cmd.exe (PID: 5348)
      • cmd.exe (PID: 1568)
      • cmd.exe (PID: 3936)
      • cmd.exe (PID: 4080)
      • cmd.exe (PID: 1660)
      • cmd.exe (PID: 640)
      • cmd.exe (PID: 4412)
      • cmd.exe (PID: 6312)
      • cmd.exe (PID: 6860)
      • cmd.exe (PID: 6820)
      • cmd.exe (PID: 6664)
      • cmd.exe (PID: 5988)
      • cmd.exe (PID: 6388)
      • cmd.exe (PID: 1056)
      • cmd.exe (PID: 6472)
      • cmd.exe (PID: 7056)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 2504)
      • cmd.exe (PID: 3740)
      • cmd.exe (PID: 1352)
      • cmd.exe (PID: 4264)
      • cmd.exe (PID: 6664)
      • cmd.exe (PID: 5988)
      • cmd.exe (PID: 2064)
      • cmd.exe (PID: 5768)
      • cmd.exe (PID: 5780)
      • cmd.exe (PID: 6812)
      • cmd.exe (PID: 4748)
      • cmd.exe (PID: 4512)
      • cmd.exe (PID: 5244)
      • cmd.exe (PID: 5348)
      • cmd.exe (PID: 1568)
      • cmd.exe (PID: 3936)
      • cmd.exe (PID: 4080)
      • cmd.exe (PID: 1660)
      • cmd.exe (PID: 640)
      • cmd.exe (PID: 4412)
      • cmd.exe (PID: 6312)
      • cmd.exe (PID: 6860)
      • cmd.exe (PID: 6820)
      • cmd.exe (PID: 6664)
      • cmd.exe (PID: 5988)
      • cmd.exe (PID: 6388)
      • cmd.exe (PID: 1056)
      • cmd.exe (PID: 6472)
      • cmd.exe (PID: 7056)
    • The executable file from the user directory is run by the CMD process

      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
      • Runtime Broker.exe (PID: 4052)
  • INFO

    • Reads the machine GUID from the registry

      • RuntimeBroker.exe (PID: 3832)
      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
      • Runtime Broker.exe (PID: 4052)
    • Reads Environment values

      • RuntimeBroker.exe (PID: 3832)
      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
      • Runtime Broker.exe (PID: 4052)
    • Reads the computer name

      • RuntimeBroker.exe (PID: 3832)
      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
      • Runtime Broker.exe (PID: 4052)
    • Checks supported languages

      • RuntimeBroker.exe (PID: 3832)
      • Runtime Broker.exe (PID: 7080)
      • chcp.com (PID: 6236)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • chcp.com (PID: 4320)
      • chcp.com (PID: 4460)
      • Runtime Broker.exe (PID: 5708)
      • chcp.com (PID: 1740)
      • chcp.com (PID: 4984)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • chcp.com (PID: 1336)
      • Runtime Broker.exe (PID: 4788)
      • chcp.com (PID: 1936)
      • Runtime Broker.exe (PID: 2192)
      • chcp.com (PID: 5140)
      • chcp.com (PID: 5904)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • chcp.com (PID: 4572)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • chcp.com (PID: 4172)
      • chcp.com (PID: 5616)
      • Runtime Broker.exe (PID: 5188)
      • chcp.com (PID: 2552)
      • Runtime Broker.exe (PID: 4692)
      • chcp.com (PID: 864)
      • Runtime Broker.exe (PID: 6360)
      • chcp.com (PID: 3112)
      • Runtime Broker.exe (PID: 6676)
      • chcp.com (PID: 2388)
      • Runtime Broker.exe (PID: 1604)
      • chcp.com (PID: 4916)
      • chcp.com (PID: 1336)
      • Runtime Broker.exe (PID: 512)
      • chcp.com (PID: 1944)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • chcp.com (PID: 864)
      • Runtime Broker.exe (PID: 6384)
      • chcp.com (PID: 4104)
      • Runtime Broker.exe (PID: 7124)
      • chcp.com (PID: 6732)
      • chcp.com (PID: 6524)
      • Runtime Broker.exe (PID: 1244)
      • chcp.com (PID: 3460)
      • Runtime Broker.exe (PID: 1740)
      • chcp.com (PID: 2596)
      • Runtime Broker.exe (PID: 4724)
      • chcp.com (PID: 5684)
      • chcp.com (PID: 6600)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • chcp.com (PID: 3932)
      • Runtime Broker.exe (PID: 5240)
      • Runtime Broker.exe (PID: 4052)
      • chcp.com (PID: 5060)
    • Creates files or folders in the user directory

      • RuntimeBroker.exe (PID: 3832)
    • Launching a file from a Registry key

      • RuntimeBroker.exe (PID: 3832)
      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
      • Runtime Broker.exe (PID: 4052)
    • Create files in a temporary directory

      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
    • Process checks computer location settings

      • Runtime Broker.exe (PID: 7080)
      • Runtime Broker.exe (PID: 4664)
      • Runtime Broker.exe (PID: 3160)
      • Runtime Broker.exe (PID: 5708)
      • Runtime Broker.exe (PID: 1212)
      • Runtime Broker.exe (PID: 2292)
      • Runtime Broker.exe (PID: 4788)
      • Runtime Broker.exe (PID: 2192)
      • Runtime Broker.exe (PID: 3148)
      • Runtime Broker.exe (PID: 4024)
      • Runtime Broker.exe (PID: 1216)
      • Runtime Broker.exe (PID: 4400)
      • Runtime Broker.exe (PID: 5188)
      • Runtime Broker.exe (PID: 4692)
      • Runtime Broker.exe (PID: 6360)
      • Runtime Broker.exe (PID: 6676)
      • Runtime Broker.exe (PID: 1604)
      • Runtime Broker.exe (PID: 512)
      • Runtime Broker.exe (PID: 1704)
      • Runtime Broker.exe (PID: 5576)
      • Runtime Broker.exe (PID: 5300)
      • Runtime Broker.exe (PID: 6384)
      • Runtime Broker.exe (PID: 7124)
      • Runtime Broker.exe (PID: 1244)
      • Runtime Broker.exe (PID: 1740)
      • Runtime Broker.exe (PID: 4724)
      • Runtime Broker.exe (PID: 6264)
      • Runtime Broker.exe (PID: 236)
      • Runtime Broker.exe (PID: 5240)
    • Manual execution by a user

      • Runtime Broker.exe (PID: 4664)
    • Changes the display of characters in the console

      • cmd.exe (PID: 2504)
      • cmd.exe (PID: 3740)
      • cmd.exe (PID: 1352)
      • cmd.exe (PID: 6664)
      • cmd.exe (PID: 4264)
      • cmd.exe (PID: 5988)
      • cmd.exe (PID: 2064)
      • cmd.exe (PID: 5768)
      • cmd.exe (PID: 5780)
      • cmd.exe (PID: 6812)
      • cmd.exe (PID: 4748)
      • cmd.exe (PID: 4512)
      • cmd.exe (PID: 5244)
      • cmd.exe (PID: 5348)
      • cmd.exe (PID: 1568)
      • cmd.exe (PID: 3936)
      • cmd.exe (PID: 4080)
      • cmd.exe (PID: 1660)
      • cmd.exe (PID: 640)
      • cmd.exe (PID: 4412)
      • cmd.exe (PID: 6312)
      • cmd.exe (PID: 6860)
      • cmd.exe (PID: 6820)
      • cmd.exe (PID: 6664)
      • cmd.exe (PID: 5988)
      • cmd.exe (PID: 6388)
      • cmd.exe (PID: 1056)
      • cmd.exe (PID: 6472)
      • cmd.exe (PID: 7056)
    • Checks proxy server information

      • slui.exe (PID: 4552)
    • Reads the software policy settings

      • slui.exe (PID: 4552)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:03:12 16:16:39+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 3261952
InitializedDataSize: 3584
UninitializedDataSize: -
EntryPoint: 0x31e41e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.1.1.1
ProductVersionNumber: 1.1.1.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: RuntimeBroker
FileVersion: 1.1.1.1
InternalName: -
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: -
ProductName: -
ProductVersion: 1.1.1.1
AssemblyVersion: 1.1.1.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
279
Monitored processes
148
Malicious processes
50
Suspicious processes
5

Behavior graph

Click at the process to see the details
start runtimebroker.exe runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe slui.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs runtime broker.exe

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe" C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
RuntimeBroker
Exit code:
0
Version:
1.1.1.1
Modules
Images
c:\users\admin\appdata\roaming\subdir\runtime broker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
512"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe" C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
RuntimeBroker
Exit code:
0
Version:
1.1.1.1
Modules
Images
c:\users\admin\appdata\roaming\subdir\runtime broker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
640C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\otOmI9XKrvE4.bat" "C:\Windows\System32\cmd.exeRuntime Broker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
864chcp 65001C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
864chcp 65001C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
1036ping -n 10 localhost C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\mswsock.dll
1056\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1056C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\R3dNmq426O2S.bat" "C:\Windows\System32\cmd.exeRuntime Broker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
1204\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1212"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe" C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
RuntimeBroker
Exit code:
0
Version:
1.1.1.1
Modules
Images
c:\users\admin\appdata\roaming\subdir\runtime broker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
37 140
Read events
37 109
Write events
31
Delete events
0

Modification events

(PID) Process:(3832) RuntimeBroker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
(PID) Process:(7080) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
(PID) Process:(4664) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
(PID) Process:(3160) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
(PID) Process:(5708) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
(PID) Process:(1212) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
(PID) Process:(2292) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
(PID) Process:(4788) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
(PID) Process:(2192) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
(PID) Process:(3148) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:RuntimeBroker
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exe"
Executable files
1
Suspicious files
0
Text files
29
Unknown types
0

Dropped files

PID
Process
Filename
Type
7080Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\DycfSvpgj9n4.battext
MD5:405E81B4047B0DDE6A1E9A9637E01BE4
SHA256:18AB44CB381F47B5C390C0B967E342B148C86119117BDA4807580E57BD92E8CE
3832RuntimeBroker.exeC:\Users\admin\AppData\Roaming\SubDir\Runtime Broker.exeexecutable
MD5:A5866C018192D944C652D8F1259B1EF1
SHA256:B2DB33FDCB12889BF6F6BD8CE829CFFF53261CF5F6F3CB294096708C4C507941
5188Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\b0fsZmUs3eZV.battext
MD5:ED0C23F184DB28EB305CE08416DD104F
SHA256:31DAA28DBD9D8D88516AD2495BFC3F56788EAD766953BE2D24E3B3406C86AF38
1216Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\JUCVa9r2vkWC.battext
MD5:9426FD36A74B7533FCCCB88DA4E6FB85
SHA256:1F4CFEA26020652568F8F74EF883010E932E13D9A08BCA4BCE01EFBE1ABC8082
6676Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\UxbR6lzKM3pr.battext
MD5:DCC284B626F8EAD78725815D295A5667
SHA256:184CB3ACCDB342E375384F93D194F862AECD0DBBE221129AE1A8FE70FDB01EC0
3148Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\clGHuTSPGw0j.battext
MD5:4A37E4D6D112FB99A59264698A1D6BAE
SHA256:CD3976B572D82D7777F72C970EE3D2970F17A912E46EF98C232E58DBF809756B
2192Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\aZ01oZ2L18sm.battext
MD5:E3F50CCD94869452BECD1008EE544FA9
SHA256:C8FC9CF4754D5E95B48907922DE845A12BC17E0940067025937D57BDA6711174
4692Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\46t5yhYLTc7e.battext
MD5:A1CD0D5B0264462A17D4F1E5DBE1B0B0
SHA256:D4FF9DC503786025D1420FE41C1A81FFBA4F504E33E395E219D7E1F26745022B
4400Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\yOEc62ty7QX6.battext
MD5:FC79FAB6B994217DED98AD9AB8016634
SHA256:984B8C8078DA0DC91ECAB8068ED240277C3BD886690216ADC32E5246D3446B5F
512Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\8tdOjfRfrjAS.battext
MD5:B392E42AE5A1871E53D0F11F594A3B74
SHA256:D51AD2967219CDA579840E93DDB6C232B0C94B369E5099334CE9BBFD87B12A93
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
22
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.55.110.211:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.55.110.211:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5348
RUXIMICS.exe
GET
200
23.55.110.211:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5348
RUXIMICS.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
20.72.205.209:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:137
whitelisted
5348
RUXIMICS.exe
20.72.205.209:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
1268
svchost.exe
20.72.205.209:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
23.55.110.211:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.55.110.211:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5348
RUXIMICS.exe
23.55.110.211:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
5348
RUXIMICS.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 23.55.110.211
  • 23.55.110.193
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
settings-win.data.microsoft.com
  • 52.167.17.97
whitelisted
self.events.data.microsoft.com
  • 13.89.179.11
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info