File name:

VolcanoUpdater.exe

Full analysis: https://app.any.run/tasks/4d02b7fd-0221-4949-8877-27ef566c2591
Verdict: Malicious activity
Analysis date: July 16, 2025, 21:02:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-scr
arch-html
xor-url
generic
themida
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 14 sections
MD5:

690B0BE88351C438FF24DBC67E50AE96

SHA1:

562C1AE7E92574FE1E73B1A9734ABF9F2CEF866B

SHA256:

D7907E93B9EE8ED2AC0B4C4F5C20A961A1A0BEE0000FBBD3A57E87ECBC846899

SSDEEP:

98304:Y5dEtqUtUK7HfktQ62o7fa3/q4lODvNn2deEUdnf+XCNlmKSyF/JylQZcvBL4j+5:RjRa4O92lbK/iF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XORed URL has been found (YARA)

      • VolcanoUI.exe (PID: 5708)
  • SUSPICIOUS

    • Reads the BIOS version

      • VolcanoUpdater.exe (PID: 1816)
      • VolcanoUI.exe (PID: 5708)
    • Executable content was dropped or overwritten

      • VolcanoUpdater.exe (PID: 1816)
      • VolcanoUI.exe (PID: 5708)
    • Reads security settings of Internet Explorer

      • VolcanoUpdater.exe (PID: 1816)
    • Reads the date of Windows installation

      • VolcanoUpdater.exe (PID: 1816)
    • Process drops legitimate windows executable

      • VolcanoUI.exe (PID: 5708)
  • INFO

    • Checks supported languages

      • VolcanoUpdater.exe (PID: 1816)
      • VolcanoUI.exe (PID: 5708)
    • Create files in a temporary directory

      • VolcanoUpdater.exe (PID: 1816)
      • VolcanoUI.exe (PID: 5708)
    • Reads the computer name

      • VolcanoUpdater.exe (PID: 1816)
      • VolcanoUI.exe (PID: 5708)
    • Process checks computer location settings

      • VolcanoUpdater.exe (PID: 1816)
    • The sample compiled with english language support

      • VolcanoUI.exe (PID: 5708)
    • Themida protector has been detected

      • VolcanoUI.exe (PID: 5708)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(5708) VolcanoUI.exe
Decrypted-URLs (2)https://file.volcano.wtf/versioR
https://key.vol2
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:07:09 16:37:47+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.38
CodeSize: 801280
InitializedDataSize: 262656
UninitializedDataSize: -
EntryPoint: 0x7e3058
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start volcanoupdater.exe conhost.exe no specs #XOR-URL volcanoui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1816"C:\Users\admin\AppData\Local\Temp\VolcanoUpdater.exe" C:\Users\admin\AppData\Local\Temp\VolcanoUpdater.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\volcanoupdater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
2228\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeVolcanoUpdater.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5708"C:\Users\admin\AppData\Local\Temp\VolcanoUI.exe" C:\Users\admin\AppData\Local\Temp\VolcanoUI.exe
VolcanoUpdater.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\volcanoui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
xor-url
(PID) Process(5708) VolcanoUI.exe
Decrypted-URLs (2)https://file.volcano.wtf/versioR
https://key.vol2
Total events
1 293
Read events
1 293
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
16
Text files
74
Unknown types
1

Dropped files

PID
Process
Filename
Type
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\apex-DyP6w7ZV.jstext
MD5:EEA817DCF104C3F416EB86054E4AB065
SHA256:9E6D5B433394FC90B3A7C58514AB58C6BB49E740EF03E146928A3FD0095AEB68
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\version.txttext
MD5:1DC1419EF6633168D11B35145603542A
SHA256:EB9A85E89A8FDD648D786C01932438404FF906C6C8F389572ECB4315D573AFFF
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\cypher-DrQuvNYM.jstext
MD5:EE63F453BC7BA3157DB257900B3C4815
SHA256:8620DDBCFBCA9DBD8A3D28DF6C60848432DBCEEFBE1EF7C798860F92644FDEC4
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\clojure-DTECt2xU.jstext
MD5:CBE50C2D87AFFE61EE11FAADF2F57252
SHA256:C897D061A0F39FABC5B9204E0EA8F78FA12C37C4BE45A2749BD1119D2CBCBF68
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\cameligo-BFG1Mk7z.jstext
MD5:E9D40B956B6BEC8A5BFFD0D94552B2F8
SHA256:CC50FE6B6738380FDC2D31D1A2FE210EA67CB19A5F6ABBF91E0AD3A08491A1E5
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\bicep-BfEKNvv3.jstext
MD5:D57E65CA5EB6CAF649C5393DC167CB6D
SHA256:9DE9B6AD69CBF4B0D3DA56D87E5F33BF0DD5ECBB1DA2B3DEC999F6AEDA197246
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\cpp-CLLBncYj.jstext
MD5:0F3FCC7CA8691D6CF4FF68B8347D18DD
SHA256:A5FB8F0E4EBFC61B3865C092BD6434A36D24EE6E62477D4ADD55A1D796CD88B4
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\cssMode-wuhyQlOf.jsbinary
MD5:B63088DC9449EDE74B283708F401FC0F
SHA256:019BE82D233F42BEE2CFA76DD31E3AA42D73C2F6276C7A576677BC7B005D7A38
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\csharp-dUCx_-0o.jstext
MD5:5616EF1623A707EDDFB5641341DB735E
SHA256:DE87D1D2BDCEC69C9A9AB2CE355B9BC638BAC7E4078D303DF89DADCB85F58846
1816VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\css-D3h14YRZ.jstext
MD5:387BF345843B2BE9BA90A6FBA1DE584E
SHA256:55CD0C924635240191C8189F4A500720E61EEE267EB2093474BF686AE5820EA6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
26
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
764
lsass.exe
GET
200
142.250.181.227:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
764
lsass.exe
GET
200
142.250.181.227:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
6756
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.41:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
512
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
512
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4916
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1816
VolcanoUpdater.exe
104.21.56.14:443
file.volcano.wtf
CLOUDFLARENET
malicious
764
lsass.exe
142.250.181.227:80
c.pki.goog
GOOGLE
US
whitelisted
4
System
192.168.100.255:138
whitelisted
5708
VolcanoUI.exe
104.21.56.14:443
file.volcano.wtf
CLOUDFLARENET
malicious
6756
svchost.exe
40.126.31.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6756
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 142.250.74.206
whitelisted
file.volcano.wtf
  • 104.21.56.14
  • 172.67.175.175
malicious
c.pki.goog
  • 142.250.181.227
whitelisted
login.live.com
  • 40.126.31.3
  • 20.190.159.130
  • 40.126.31.129
  • 20.190.159.73
  • 40.126.31.131
  • 20.190.159.4
  • 20.190.159.129
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 23.216.77.41
  • 23.216.77.31
  • 23.216.77.35
  • 23.216.77.32
  • 23.216.77.37
  • 23.216.77.36
  • 23.216.77.43
  • 23.216.77.38
  • 23.216.77.33
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
Process
Message
VolcanoUI.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
VolcanoUI.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.