File name:

VencordInstaller.exe

Full analysis: https://app.any.run/tasks/1a56d2ba-ff64-4e22-b5dc-cb0511e70587
Verdict: Malicious activity
Analysis date: May 31, 2025, 21:32:10
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pyinstaller
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

30196D4F1493801360063DF8E559B9AF

SHA1:

5C39EFD1F530A661D885776A6419F5CB001628CC

SHA256:

C9AE4FD7A83F9F517F4A63F099BA4D7A3EF9C218F3629EF616F73EA1285F5DCA

SSDEEP:

786432:S7y4PEqBDrn7mgllaPefh2mcUKrxYAwEB+1KHGhakFjbkZ:gPJNjePqwmcNqAw91kGgkpkZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • VencordInstaller.exe (PID: 5064)
    • Process drops python dynamic module

      • VencordInstaller.exe (PID: 5064)
    • Executable content was dropped or overwritten

      • VencordInstaller.exe (PID: 5064)
    • There is functionality for taking screenshot (YARA)

      • VencordInstaller.exe (PID: 5064)
      • VencordInstaller.exe (PID: 4016)
    • The process drops C-runtime libraries

      • VencordInstaller.exe (PID: 5064)
    • Application launched itself

      • VencordInstaller.exe (PID: 5064)
    • Loads Python modules

      • VencordInstaller.exe (PID: 4016)
  • INFO

    • Checks supported languages

      • VencordInstaller.exe (PID: 5064)
      • VencordInstaller.exe (PID: 4016)
    • Reads the computer name

      • VencordInstaller.exe (PID: 5064)
      • VencordInstaller.exe (PID: 4016)
    • The sample compiled with english language support

      • VencordInstaller.exe (PID: 5064)
    • Create files in a temporary directory

      • VencordInstaller.exe (PID: 5064)
    • PyInstaller has been detected (YARA)

      • VencordInstaller.exe (PID: 5064)
      • VencordInstaller.exe (PID: 4016)
    • Reads the software policy settings

      • slui.exe (PID: 1472)
    • Checks proxy server information

      • slui.exe (PID: 1472)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:13 13:29:54+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 173568
InitializedDataSize: 144384
UninitializedDataSize: -
EntryPoint: 0xce30
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
3
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start vencordinstaller.exe slui.exe vencordinstaller.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1472C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4016"C:\Users\admin\Desktop\VencordInstaller.exe" C:\Users\admin\Desktop\VencordInstaller.exeVencordInstaller.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\vencordinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5064"C:\Users\admin\Desktop\VencordInstaller.exe" C:\Users\admin\Desktop\VencordInstaller.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\vencordinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
3 661
Read events
3 661
Write events
0
Delete events
0

Modification events

No data
Executable files
95
Suspicious files
83
Text files
961
Unknown types
0

Dropped files

PID
Process
Filename
Type
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PIL\_imagingcms.cp313-win_amd64.pydexecutable
MD5:9E1C5CC1597928921DC88652279FD297
SHA256:B02A8C0342C51CFEB9BF8A79C79744E791A14F4A21A1A8B4046A7171D4620629
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PIL\_imaging.cp313-win_amd64.pydexecutable
MD5:A487E7AD30ED2DE466A8590A24D745E7
SHA256:31621E7BB62091C2AA80CAC5F5C929132AF3EC568A061680564DC073F2630357
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PIL\_imagingtk.cp313-win_amd64.pydexecutable
MD5:2CC0C18F26989042CDAD77EFE3CCF3FB
SHA256:A3183192C1CDC7B2D8331B6B78EED6826A0A0594FE45B06FD0E9809414AD6A53
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PIL\_imagingft.cp313-win_amd64.pydexecutable
MD5:7C4535BCE5A9CCA4E8CCAF301577E411
SHA256:00CAB5720F58B1CCCC7200CC84942139F286CAA7CA7FF2D04628159AE44EA419
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PyQt5\Qt5\bin\MSVCP140.dllexecutable
MD5:01B946A2EDC5CC166DE018DBB754B69C
SHA256:88F55D86B50B0A7E55E71AD2D8F7552146BA26E927230DAF2E26AD3A971973C5
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PyQt5\Qt5\bin\Qt5Core.dllexecutable
MD5:817520432A42EFA345B2D97F5C24510E
SHA256:8D2FF4CE9096DDCCC4F4CD62C2E41FC854CFD1B0D6E8D296645A7F5FD4AE565A
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PyQt5\Qt5\bin\MSVCP140_1.dllexecutable
MD5:0FE6D52EB94C848FE258DC0EC9FF4C11
SHA256:446C48C1224C289BD3080087FE15D6759416D64F4136ADDF30086ABD5415D83F
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PyQt5\Qt5\bin\Qt5Widgets.dllexecutable
MD5:4CD1F8FDCD617932DB131C3688845EA8
SHA256:3788C669D4B645E5A576DE9FC77FCA776BF516D43C89143DC2CA28291BA14358
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PyQt5\Qt5\bin\Qt5WebSockets.dllexecutable
MD5:A016545F963548E0F37885E07EF945C7
SHA256:6B56F77DA6F17880A42D2F9D2EC8B426248F7AB2196A0F55D37ADE39E3878BC6
5064VencordInstaller.exeC:\Users\admin\AppData\Local\Temp\_MEI50642\PyQt5\Qt5\bin\VCRUNTIME140_1.dllexecutable
MD5:6BC084255A5E9EB8DF2BCD75B4CD0777
SHA256:1F0F5F2CE671E0F68CF96176721DF0E5E6F527C8CA9CFA98AA875B5A3816D460
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
48
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
POST
200
20.190.160.130:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
POST
200
20.190.160.130:443
https://login.live.com/RST2.srf
unknown
xml
11.0 Kb
whitelisted
POST
200
20.190.160.130:443
https://login.live.com/RST2.srf
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
200
20.190.160.130:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5236
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
GET
304
4.175.87.197:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
unknown
GET
200
4.175.87.197:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
compressed
23.9 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5236
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.32.136
  • 20.190.160.130
  • 20.190.160.20
  • 40.126.32.76
  • 20.190.160.3
  • 20.190.160.5
  • 20.190.160.132
  • 20.190.160.131
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.78
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info