File name:

Fleasion NT.exe

Full analysis: https://app.any.run/tasks/1d3c1a25-4367-47d5-ae3d-a4ab07892f86
Verdict: Malicious activity
Analysis date: February 06, 2026, 17:15:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pyinstaller
windivert-sys
mal-driver
python
github
rust
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

E51C6B85494B3B94E37BCEADB1BB6036

SHA1:

3DA50162BC86E54794047554E7D5E2EDCCA86E9E

SHA256:

D16B8D98ADF20F23761FF4D3E7EA516B299EA6D9D0B26E8ACEDE7E96DF67ADC9

SSDEEP:

393216:Of+U+acjKjW2wvNs3jbTy/67WylNUfZGOKU4l45BCrvxXjX:OmPqJkojdWygGe4pvN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Malicious driver has been detected

      • Fleasion NT.exe (PID: 8388)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Fleasion NT.exe (PID: 8388)
    • Process drops python dynamic module

      • Fleasion NT.exe (PID: 8388)
    • The process drops C-runtime libraries

      • Fleasion NT.exe (PID: 8388)
    • Process drops legitimate windows executable

      • Fleasion NT.exe (PID: 8388)
    • Drops a system driver (possible attempt to evade defenses)

      • Fleasion NT.exe (PID: 8388)
    • Application launched itself

      • Fleasion NT.exe (PID: 8388)
    • Loads Python modules

      • Fleasion NT.exe (PID: 4088)
    • Get information on the list of running processes

      • Fleasion NT.exe (PID: 4088)
    • Reads the date of Windows installation

      • Fleasion NT.exe (PID: 4088)
    • Named pipe usage

      • windows-redirector.exe (PID: 8240)
  • INFO

    • Checks supported languages

      • Fleasion NT.exe (PID: 8388)
      • Fleasion NT.exe (PID: 4088)
      • windows-redirector.exe (PID: 8240)
    • Reads the computer name

      • Fleasion NT.exe (PID: 8388)
      • Fleasion NT.exe (PID: 4088)
      • windows-redirector.exe (PID: 8240)
    • Create files in a temporary directory

      • Fleasion NT.exe (PID: 8388)
      • Fleasion NT.exe (PID: 4088)
    • The sample compiled with english language support

      • Fleasion NT.exe (PID: 8388)
    • Drops script file

      • Fleasion NT.exe (PID: 8388)
      • Fleasion NT.exe (PID: 4088)
    • There is functionality for taking screenshot (YARA)

      • Fleasion NT.exe (PID: 8388)
      • Fleasion NT.exe (PID: 4088)
    • PyInstaller has been detected (YARA)

      • Fleasion NT.exe (PID: 8388)
      • Fleasion NT.exe (PID: 4088)
    • Checks proxy server information

      • Fleasion NT.exe (PID: 4088)
      • slui.exe (PID: 8584)
    • Creates files or folders in the user directory

      • Fleasion NT.exe (PID: 4088)
    • Reads security settings of Internet Explorer

      • Fleasion NT.exe (PID: 4088)
    • Process checks computer location settings

      • Fleasion NT.exe (PID: 4088)
    • Application based on Rust

      • windows-redirector.exe (PID: 8240)
      • Fleasion NT.exe (PID: 4088)
    • Reads the machine GUID from the registry

      • Fleasion NT.exe (PID: 4088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2026:01:16 21:40:14+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.44
CodeSize: 181760
InitializedDataSize: 102912
UninitializedDataSize: -
EntryPoint: 0xdfa0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
154
Monitored processes
7
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start THREAT fleasion nt.exe slui.exe fleasion nt.exe tasklist.exe no specs conhost.exe no specs windows-redirector.exe conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2284tasklist /FI "IMAGENAME eq RobloxPlayerBeta.exe"C:\Windows\System32\tasklist.exeFleasion NT.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2424\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetasklist.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3624\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exewindows-redirector.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4088"C:\Users\admin\AppData\Local\Temp\Fleasion NT.exe" C:\Users\admin\AppData\Local\Temp\Fleasion NT.exe
Fleasion NT.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\fleasion nt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
8240"C:\Users\admin\AppData\Local\Temp\_MEI83882\mitmproxy_windows\windows-redirector.exe" \\.\pipe\mitmproxy-transparent-proxy-4088C:\Users\admin\AppData\Local\Temp\_MEI83882\mitmproxy_windows\windows-redirector.exe
Fleasion NT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\_mei83882\mitmproxy_windows\windows-redirector.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
8388"C:\Users\admin\AppData\Local\Temp\Fleasion NT.exe" C:\Users\admin\AppData\Local\Temp\Fleasion NT.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\fleasion nt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
8584C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
7 134
Read events
7 132
Write events
2
Delete events
0

Modification events

(PID) Process:(8240) windows-redirector.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\WinDivert
Operation:writeName:EventMessageFile
Value:
C:\Users\admin\AppData\Local\Temp\_MEI83882\mitmproxy_windows\WinDivert64.sys
(PID) Process:(8240) windows-redirector.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\WinDivert
Operation:writeName:TypesSupported
Value:
7
Executable files
98
Suspicious files
10
Text files
1 295
Unknown types
0

Dropped files

PID
Process
Filename
Type
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\VCRUNTIME140.dllexecutable
MD5:862F820C3251E4CA6FC0AC00E4092239
SHA256:36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\_asyncio.pydexecutable
MD5:70DEC3CE00E5CAF45246736B53EA3AD0
SHA256:8CEF0CD8333F88A9F9E52FA0D151B5F661D452EFBCFC507DC28A46259B82596C
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\VCRUNTIME140_1.dllexecutable
MD5:68156F41AE9A04D89BB6625A5CD222D4
SHA256:82A2F9AE1E6146AE3CB0F4BC5A62B7227E0384209D9B1AEF86BBCC105912F7CD
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\_bz2.pydexecutable
MD5:057325E89B4DB46E6B18A52D1A691CAA
SHA256:5BA872CAA7FCEE0F4FB81C6E0201CEED9BD92A3624F16828DD316144D292A869
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\_ctypes.pydexecutable
MD5:2185849BC0423F6641EE30804F475478
SHA256:199CD8D7DB743C316771EF7BBF414BA9A9CDAE1F974E90DA6103563B2023538D
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\_decimal.pydexecutable
MD5:F465C15E7BACEAC920DC58A5FB922C1C
SHA256:F4A486A0CA6A53659159A404614C7E7EDCCB6BFBCDEB844F6CEE544436A826CB
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\_cffi_backend.cp313-win_amd64.pydexecutable
MD5:F2EFF52A9B6ED2534F84CC7B77379649
SHA256:D5B09DA2E726B4E90CF0EDAD5D2A0EC52F369DFD060E14D3807A32B2205031FA
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\PIL\_imagingmath.cp313-win_amd64.pydexecutable
MD5:8E6549AA0C2D4F6FA5295A1D99E46EE7
SHA256:F1AB775BAD05260C123B2A3232BF74F6C3BDBE2BD20CA73747B83B2D8756BD03
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\PIL\_webp.cp313-win_amd64.pydexecutable
MD5:293783C2B33D359E5A8644044336AF58
SHA256:AAD5F6DD25C23FB497C37905FE8A11517995177700A13169AF266160FEDD324A
8388Fleasion NT.exeC:\Users\admin\AppData\Local\Temp\_MEI83882\PIL\_imagingcms.cp313-win_amd64.pydexecutable
MD5:A0687E26AADFE45EE22D58009D52FA7A
SHA256:7E19FE243F99B4CBDEC0A2A8256000AD84C8FFF8C9901587C59F3F4EC7162F5C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
52
DNS requests
22
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6768
MoUsoCoreWorker.exe
GET
304
51.104.136.2:443
https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop
US
whitelisted
4468
svchost.exe
GET
304
51.104.136.2:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
whitelisted
8048
SIHClient.exe
GET
304
74.179.77.204:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
8048
SIHClient.exe
GET
200
20.242.39.171:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
whitelisted
8048
SIHClient.exe
GET
200
74.179.77.204:443
https://slscr.update.microsoft.com/sls/ping
US
whitelisted
8048
SIHClient.exe
GET
304
74.179.77.204:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAjTxtAB8my1oj8MfWpz%2F7Y%3D
US
binary
313 b
whitelisted
GET
200
204.79.197.203:80
http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBQ3L3%2F%2Fa6ADK8NraY2GXzVaYrHG4AQUb6t%2B2v%2BXQ3LsO2d33oJhNYhHQoUCEzMAAAAGb6JMMcOVb6sAAAAAAAY%3D
US
binary
958 b
whitelisted
4468
svchost.exe
GET
200
20.73.194.208:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/WaaSAssessment?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&ring=Retail&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=10.0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=WaaSAssessment&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&ServicingBranch=CB&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&HonorWUfBDeferrals=0&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
text
5.63 Kb
whitelisted
356
svchost.exe
POST
200
20.190.159.131:443
https://login.live.com/RST2.srf
US
xml
10.3 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
4468
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4876
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
184.86.103.81:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
5568
SearchApp.exe
184.86.103.94:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
204.79.197.203:80
oneocsp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5568
SearchApp.exe
184.86.103.81:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
www.bing.com
  • 184.86.103.81
  • 184.86.103.69
  • 184.86.103.74
  • 184.86.103.75
  • 184.86.103.71
  • 184.86.103.94
  • 184.86.103.77
  • 184.86.103.72
  • 184.86.103.78
whitelisted
th.bing.com
  • 184.86.103.94
  • 184.86.103.91
  • 184.86.103.87
  • 184.86.103.89
  • 184.86.103.71
  • 184.86.103.93
  • 184.86.103.90
  • 184.86.103.69
  • 184.86.103.92
whitelisted
google.com
  • 142.250.201.174
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
oneocsp.microsoft.com
  • 204.79.197.203
whitelisted
self.events.data.microsoft.com
  • 20.189.173.2
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.131
  • 20.190.159.75
  • 20.190.159.2
  • 40.126.31.2
  • 20.190.159.23
  • 20.190.159.71
  • 20.190.159.128
  • 40.126.31.67
whitelisted
crl.microsoft.com
  • 2.18.64.196
  • 2.18.64.210
whitelisted

Threats

PID
Process
Class
Message
4468
svchost.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2292
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info