File name:

e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493

Full analysis: https://app.any.run/tasks/d2b2d932-c6aa-4d30-98bb-19d00e850c35
Verdict: Malicious activity
Analysis date: June 21, 2025, 20:16:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

F35F105A9DD6F04121A3140E762A4FA8

SHA1:

E14EB03975331E3504711F768CA5E93E00554E7C

SHA256:

E96ADCA327189CE6BC024C284AC5A72FF112907FCE3BE212969A059FBB965493

SSDEEP:

98304:lKZLdjXFkq+vIzIJ3fzneuivBfHFbHRX0HngzS/Soc:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe (PID: 2580)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe (PID: 1136)
  • INFO

    • Checks supported languages

      • e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe (PID: 1136)
    • Reads the computer name

      • e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe (PID: 1136)
    • Checks proxy server information

      • e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe (PID: 1136)
      • slui.exe (PID: 2388)
    • Reads the machine GUID from the registry

      • e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe (PID: 1136)
    • Reads the software policy settings

      • e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe (PID: 1136)
      • slui.exe (PID: 2388)
    • Disables trace logs

      • e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe (PID: 1136)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2098:04:02 23:36:55+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 2258432
InitializedDataSize: 228864
UninitializedDataSize: -
EntryPoint: 0x229506
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 3.0.0.0
ProductVersionNumber: 3.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: MacPaw Way LTD
FileDescription: WebInstaller
FileVersion: 3.0.0.0
InternalName: SetupClearVPN.exe
LegalCopyright: ©2024 MacPaw Way LTD, All Rights Reserved
LegalTrademarks: MacPaw Way LTD
OriginalFileName: SetupClearVPN.exe
ProductName: ClearVPN
ProductVersion: 3.0.0.0
AssemblyVersion: 3.0.0.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
3
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe slui.exe e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1136"C:\Users\admin\Desktop\e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe" C:\Users\admin\Desktop\e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe
explorer.exe
User:
admin
Company:
MacPaw Way LTD
Integrity Level:
HIGH
Description:
WebInstaller
Exit code:
4294967295
Version:
3.0.0.0
Modules
Images
c:\users\admin\desktop\e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2388C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2580"C:\Users\admin\Desktop\e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe" C:\Users\admin\Desktop\e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeexplorer.exe
User:
admin
Company:
MacPaw Way LTD
Integrity Level:
MEDIUM
Description:
WebInstaller
Exit code:
3221226540
Version:
3.0.0.0
Modules
Images
c:\users\admin\desktop\e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
8 055
Read events
8 041
Write events
14
Delete events
0

Modification events

(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1136) e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
20
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
410
13.107.246.45:443
https://api.appcenter.ms/v0.1/public/sdk/apps/d917e66f-1cc2-49fd-beb9-f10138d1b346/distribution_groups/3a67b527-92c1-45b2-af52-1723d61f92d4/releases/latest
unknown
binary
85 b
5944
MoUsoCoreWorker.exe
GET
200
184.24.77.16:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3800
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3800
RUXIMICS.exe
GET
200
184.24.77.16:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.24.77.16:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3800
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
184.24.77.16:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
184.24.77.16:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3800
RUXIMICS.exe
184.24.77.16:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1136
e96adca327189ce6bc024c284ac5a72ff112907fce3be212969a059fbb965493.exe
13.107.253.45:443
api.appcenter.ms
MICROSOFT-CORP-MSN-AS-BLOCK
US
suspicious
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 184.24.77.16
  • 184.24.77.9
  • 184.24.77.29
  • 184.24.77.4
  • 184.24.77.23
  • 184.24.77.18
  • 184.24.77.7
  • 184.24.77.14
  • 184.24.77.11
whitelisted
api.appcenter.ms
  • 13.107.253.45
unknown
www.microsoft.com
  • 23.35.229.160
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 52.182.143.210
whitelisted

Threats

No threats detected
No debug info