File name:

VolcanoUpdater.exe

Full analysis: https://app.any.run/tasks/92fa6871-001e-40d2-9099-4086ad9f954e
Verdict: Malicious activity
Analysis date: June 20, 2025, 21:44:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-scr
arch-html
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 14 sections
MD5:

BA317846710D02A8CACEDFE474ED781A

SHA1:

F9E425C55B5DB03CBE4F726C10563EF4952E8D50

SHA256:

F2C84F5BA3B30EE992E63129721BC22C0FED27FCACE7D19AD7C9887E4C1B7821

SSDEEP:

98304:ryOfn7B1giIdckwirGiCqyFqwbxMqbMuZQQDuw/pYIJUZst8XJ3wAMic5fh2DF8P:2kZ+K75MmH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • VolcanoUpdater.exe (PID: 2952)
      • VolcanoUI.exe (PID: 5172)
    • Reads the BIOS version

      • VolcanoUpdater.exe (PID: 2952)
      • VolcanoUI.exe (PID: 5172)
    • Reads security settings of Internet Explorer

      • VolcanoUpdater.exe (PID: 2952)
    • Reads the date of Windows installation

      • VolcanoUpdater.exe (PID: 2952)
    • Process drops legitimate windows executable

      • VolcanoUI.exe (PID: 5172)
  • INFO

    • Checks supported languages

      • VolcanoUpdater.exe (PID: 2952)
      • VolcanoUI.exe (PID: 5172)
    • Reads the computer name

      • VolcanoUpdater.exe (PID: 2952)
      • VolcanoUI.exe (PID: 5172)
    • Create files in a temporary directory

      • VolcanoUpdater.exe (PID: 2952)
      • VolcanoUI.exe (PID: 5172)
    • Process checks computer location settings

      • VolcanoUpdater.exe (PID: 2952)
    • The sample compiled with english language support

      • VolcanoUI.exe (PID: 5172)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:14 20:29:47+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.38
CodeSize: 801280
InitializedDataSize: 262656
UninitializedDataSize: -
EntryPoint: 0x7e3058
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start volcanoupdater.exe conhost.exe no specs volcanoui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2076\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeVolcanoUpdater.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2952"C:\Users\admin\AppData\Local\Temp\VolcanoUpdater.exe" C:\Users\admin\AppData\Local\Temp\VolcanoUpdater.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\volcanoupdater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
3908C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5172"C:\Users\admin\AppData\Local\Temp\VolcanoUI.exe" C:\Users\admin\AppData\Local\Temp\VolcanoUI.exe
VolcanoUpdater.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\volcanoui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
Total events
1 409
Read events
1 409
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
17
Text files
74
Unknown types
0

Dropped files

PID
Process
Filename
Type
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\tempcompressed
MD5:7B1404540216225719A9809D1DC1B3FD
SHA256:89A5A492CB17B569004F49E9C5D5CCDDDFA8E42A8BE28B1A9E77FF0DE0306386
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\version.txttext
MD5:8F6D1A270C210B60B2C51A047E38AA2F
SHA256:CF6904D097FEAE108600FB178F207044BEF6E89CB92B637D1A76345B5C1932E0
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\bicep-BfEKNvv3.jstext
MD5:D57E65CA5EB6CAF649C5393DC167CB6D
SHA256:9DE9B6AD69CBF4B0D3DA56D87E5F33BF0DD5ECBB1DA2B3DEC999F6AEDA197246
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\abap-BrgZPUOV.jstext
MD5:5E0865606680E6D5AB5FAAE672097932
SHA256:A3E2A241DA83C7AA80836ACE9FB3B2A242F458FF917DF9F19363F2E6430DD059
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\luau-lifter.exeexecutable
MD5:F1246A49C8183FCFAC4D7669A6C50881
SHA256:F5AD37B2293814CE33149CA8D8BF1D673AE0C8F3CB025D7B83954EB0E68E631D
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\csharp-dUCx_-0o.jstext
MD5:5616EF1623A707EDDFB5641341DB735E
SHA256:DE87D1D2BDCEC69C9A9AB2CE355B9BC638BAC7E4078D303DF89DADCB85F58846
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\cpp-CLLBncYj.jstext
MD5:0F3FCC7CA8691D6CF4FF68B8347D18DD
SHA256:A5FB8F0E4EBFC61B3865C092BD6434A36D24EE6E62477D4ADD55A1D796CD88B4
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\dockerfile-Zznr-cwX.jstext
MD5:815119FF2639236322B197B6BB800328
SHA256:FD257677714DF6F0D9C4D861BA3423BE7707768CCD87B58A17CDC59C692C50FD
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\clojure-DTECt2xU.jstext
MD5:CBE50C2D87AFFE61EE11FAADF2F57252
SHA256:C897D061A0F39FABC5B9204E0EA8F78FA12C37C4BE45A2749BD1119D2CBCBF68
2952VolcanoUpdater.exeC:\Users\admin\AppData\Local\Temp\bin\page\assets\css-D3h14YRZ.jstext
MD5:387BF345843B2BE9BA90A6FBA1DE584E
SHA256:55CD0C924635240191C8189F4A500720E61EEE267EB2093474BF686AE5820EA6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
25
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
764
lsass.exe
GET
200
142.250.181.227:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
764
lsass.exe
GET
200
142.250.181.227:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.24.77.4:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2532
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2532
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7008
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7072
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2952
VolcanoUpdater.exe
104.21.32.1:443
file.volcano.best
CLOUDFLARENET
malicious
4
System
192.168.100.255:138
whitelisted
764
lsass.exe
142.250.181.227:80
c.pki.goog
GOOGLE
US
whitelisted
5172
VolcanoUI.exe
104.21.32.1:443
file.volcano.best
CLOUDFLARENET
malicious
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
184.24.77.4:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.174
whitelisted
file.volcano.best
  • 104.21.32.1
  • 104.21.112.1
  • 104.21.48.1
  • 104.21.80.1
  • 104.21.96.1
  • 104.21.16.1
  • 104.21.64.1
malicious
c.pki.goog
  • 142.250.181.227
whitelisted
crl.microsoft.com
  • 184.24.77.4
  • 184.24.77.17
  • 184.24.77.6
  • 184.24.77.22
  • 184.24.77.7
  • 184.24.77.12
  • 184.24.77.19
  • 184.24.77.24
  • 184.24.77.11
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
login.live.com
  • 40.126.32.72
  • 20.190.160.64
  • 40.126.32.68
  • 20.190.160.17
  • 20.190.160.66
  • 20.190.160.131
  • 20.190.160.2
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted

Threats

No threats detected
Process
Message
VolcanoUI.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
VolcanoUI.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.