File name:

prõventionskurs formular muster.exe

Full analysis: https://app.any.run/tasks/4d0e40a2-3f6f-4167-a458-b35f0017b998
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 14, 2025, 16:01:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
MD5:

1DB751E863E140D397F0263DC290A1ED

SHA1:

069F547F2BCA626797B71639CBCB5C11637E9DA0

SHA256:

D4D77E0A17AAF281673730D3DBF08E69F1F4B8DA4D4AE47B02AFE4F8C74FEDC8

SSDEEP:

98304:elhRG84fyIhbk6wpKXB/yvgcMFnVvtzqBSKDuF6hJQCgKZ7RWwZEwgifTgmxLx0K:nY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • prõventionskurs formular muster.exe (PID: 6028)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • prõventionskurs formular muster.exe (PID: 6028)
  • INFO

    • Disables trace logs

      • prõventionskurs formular muster.exe (PID: 6028)
    • Create files in a temporary directory

      • prõventionskurs formular muster.exe (PID: 6028)
    • Checks proxy server information

      • prõventionskurs formular muster.exe (PID: 6028)
    • Reads Environment values

      • prõventionskurs formular muster.exe (PID: 6028)
    • Reads the computer name

      • prõventionskurs formular muster.exe (PID: 6028)
    • Reads the machine GUID from the registry

      • prõventionskurs formular muster.exe (PID: 6028)
    • Checks supported languages

      • prõventionskurs formular muster.exe (PID: 6028)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2064:11:02 15:58:06+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 2163200
InitializedDataSize: 147456
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 4.0.0.74
ProductVersionNumber: 4.0.0.74
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: MyPdfManager
FileVersion: 4.0.0.74
InternalName: MyPdfManager.exe
LegalCopyright: © 2023 Shahaf Gate Ltd. All rights reserved.
LegalTrademarks: -
OriginalFileName: MyPdfManager.exe
ProductName: MyPdfManager
ProductVersion: 4.0.0.74
AssemblyVersion: 4.0.0.74
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start prõventionskurs formular muster.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1072"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6028"C:\Users\admin\AppData\Local\Temp\prõventionskurs formular muster.exe" C:\Users\admin\AppData\Local\Temp\prõventionskurs formular muster.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MyPdfManager
Exit code:
0
Version:
4.0.0.74
Modules
Images
c:\users\admin\appdata\local\temp\prõventionskurs formular muster.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6404C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
1 815
Read events
1 801
Write events
14
Delete events
0

Modification events

(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6028) prõventionskurs formular muster.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\prõventionskurs formular muster_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
6
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6028prõventionskurs formular muster.exeC:\Users\admin\AppData\Local\Temp\MyPdfManager\jsonuideclinewindow.jsonbinary
MD5:1832881A920E58881BF24DD4FECD11EA
SHA256:ED30D678898EB9413FEF5F66636B927B4DC3192AEAB077CC86B6B1726F9116F1
6028prõventionskurs formular muster.exeC:\Users\admin\AppData\Local\Temp\MyPdfManager\jsonuiclosewindow.jsonbinary
MD5:F13E812B7D03FB57416C53CA815C738A
SHA256:B01AA23148BFCED36883A0B5FBFD314C380108BE89A8B55578C53D423753499C
6028prõventionskurs formular muster.exeC:\Users\admin\AppData\Local\Temp\MyPdfManager\installing.gifimage
MD5:FFF4A1A16F676D60E8EC741CFBF60CDB
SHA256:2C40ADFBAB0CB5D2C2B4DA514AEC9406821B80E5D782ECCA9EB62EE8A0DDEAF7
6028prõventionskurs formular muster.exeC:\Users\admin\AppData\Local\Temp\MyPdfManager\jsonassets.jsonbinary
MD5:1F6E9FF29CD2B15B8D5378C39AA72224
SHA256:FD923E2C5226465639EEEED5BAE304F0FFF311B7E80CD7153B68410498F75DB1
6028prõventionskurs formular muster.exeC:\Users\admin\AppData\Local\Temp\MyPdfManager\jsonuifirstscreen.jsonbinary
MD5:6BA769F6A4D15080319626EDF31C539A
SHA256:8AB193F28E4CDD2B5552059A786F71A796339EBE03C795BFC9E7A6F8920AB185
6028prõventionskurs formular muster.exeC:\Users\admin\AppData\Local\Temp\MyPdfManager\jsonuisecondscreen.jsonbinary
MD5:A189385E4896E628E4A141E0720BDC56
SHA256:0251A506DCC80D00C0D533AE66F1E05281CA09E988418F0675B55948F4BC7457
6028prõventionskurs formular muster.exeC:\Users\admin\AppData\Local\Temp\MyPdfManager\jsonuithirdscreen.jsonbinary
MD5:908B000A9C67329B5705030BC2945B38
SHA256:FD548002074BA2D5FD7F5786F1103CCD81C05FBB530D5C4673E83CA9F8916D1A
6028prõventionskurs formular muster.exeC:\Users\admin\AppData\Local\Temp\MyPdfManager\favicon.icoimage
MD5:CD8AE7D95BDAB619DA11BA689A4FD736
SHA256:C607132BC9C02ED3978A8E6A81B02766B8A219A7A29967CD850D1A6DEC83867E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.146:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5800
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5800
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.146:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6028
prõventionskurs formular muster.exe
5.161.122.190:443
aad.mypdfcli.com
Hetzner Online GmbH
US
unknown
6544
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5800
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 23.48.23.146
  • 23.48.23.150
  • 23.48.23.158
  • 23.48.23.162
  • 23.48.23.164
  • 23.48.23.153
  • 23.48.23.166
  • 23.48.23.159
  • 23.48.23.161
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
aad.mypdfcli.com
  • 5.161.122.190
unknown
login.live.com
  • 20.190.160.131
  • 20.190.160.66
  • 20.190.160.17
  • 20.190.160.67
  • 20.190.160.65
  • 40.126.32.138
  • 40.126.32.140
  • 20.190.160.132
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 23.219.150.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info