File name:

InformaalFrog Vanguards v0.29.11.7z

Full analysis: https://app.any.run/tasks/39c3a745-619a-4e03-8542-8f1081396308
Verdict: Malicious activity
Analysis date: June 09, 2025, 18:24:08
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
xor-url
generic
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

DD64FD3E50BE58EF950109BA35D1EB27

SHA1:

6DEC7490EF19CF27162C5D03B7BD9862C0A98DD2

SHA256:

00026C955155E73DEC0BEABA490897020F08B8AF9ADBF59F6CD4677D2C6BD4D8

SSDEEP:

24576:ozHxTZ6B0RDcFE54hoZBhJIIF5CLXBS07z8fXw5+:ozHxTgB0lcFE54hoZBhJIIF5CLXBS07y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7796)
    • Executing a file with an untrusted certificate

      • Main.exe (PID: 7484)
      • Main2.exe (PID: 3124)
      • Main3.exe (PID: 7264)
      • Main4.exe (PID: 8172)
    • XORed URL has been found (YARA)

      • Main2.exe (PID: 3124)
      • Main.exe (PID: 7484)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • Main.exe (PID: 7484)
      • Main2.exe (PID: 3124)
      • Main3.exe (PID: 7264)
      • Main4.exe (PID: 8172)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7796)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 7796)
    • Manual execution by a user

      • Main.exe (PID: 7484)
      • Main2.exe (PID: 3124)
      • Main3.exe (PID: 7264)
      • Main4.exe (PID: 8172)
    • Reads the computer name

      • Main.exe (PID: 7484)
      • Main2.exe (PID: 3124)
      • Main3.exe (PID: 7264)
      • Main4.exe (PID: 8172)
    • Checks proxy server information

      • slui.exe (PID: 8092)
    • Reads the software policy settings

      • slui.exe (PID: 8092)
      • slui.exe (PID: 4892)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2025:06:08 05:14:34+00:00
ArchivedFileName: Main.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
8
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe #XOR-URL main.exe no specs #XOR-URL main2.exe main3.exe slui.exe main4.exe

Process information

PID
CMD
Path
Indicators
Parent process
2084C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3124"C:\Users\admin\Desktop\Main2.exe" C:\Users\admin\Desktop\Main2.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Informaal Software
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\desktop\main2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4892"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7264"C:\Users\admin\Desktop\Main3.exe" C:\Users\admin\Desktop\Main3.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Informaal Software
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\desktop\main3.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7484"C:\Users\admin\Desktop\Main.exe" C:\Users\admin\Desktop\Main.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Informaal Software
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\desktop\main.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7796"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\InformaalFrog Vanguards v0.29.11.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
8092C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8172"C:\Users\admin\Desktop\Main4.exe" C:\Users\admin\Desktop\Main4.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Informaal Software
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\desktop\main4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
5 731
Read events
5 711
Write events
20
Delete events
0

Modification events

(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\InformaalFrog Vanguards v0.29.11.7z
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
4
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7796.26855\Main.exeexecutable
MD5:4B10B3C6517BE5397B4F637FCB030115
SHA256:9C2525AA06373560F964BE01D728290B514F5CB1AFB609866EA953F203F659AC
7796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7796.26855\Main2.exeexecutable
MD5:8134668AAD67AA3EDAA022980B8085D0
SHA256:64A8CD2791592571428B204CC2CA3C666E26AC0FAC00F7AE252A513E1FCF2505
8172Main4.exeC:\Users\admin\Documents\NInformaalValidationFiletext
MD5:FB5130118E650D734835EA8826799C8C
SHA256:E0E274B2DEE90FDCC0DEA633D137A4284C7D9A3C320A058B7B2B38C4B20A84F0
7796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7796.26855\Main3.exeexecutable
MD5:D5669B9FC01343F5A1D6FEBCDFF6E54F
SHA256:08F35CC2F5EEE088FB12A93E1EA90B3FFD4E008E55D6A8CDEC2245EDB361CD5C
7796WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7796.26855\Main4.exeexecutable
MD5:D1D348C08F6A19C99C6D03BDB8278981
SHA256:C373DB2109654BBBE6EC3C0D4348FE96BEECEA93EF185882897264D6E00B419E
7264Main3.exeC:\Users\admin\Documents\NInformaalValidationFiletext
MD5:FB5130118E650D734835EA8826799C8C
SHA256:E0E274B2DEE90FDCC0DEA633D137A4284C7D9A3C320A058B7B2B38C4B20A84F0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
756
lsass.exe
GET
200
142.250.185.163:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
756
lsass.exe
GET
200
142.250.185.163:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6192
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6192
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
7600
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6544
svchost.exe
20.190.160.131:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
5496
MoUsoCoreWorker.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
4
System
192.168.100.255:138
whitelisted
3124
Main2.exe
188.114.96.3:443
api.informaal.com
CLOUDFLARENET
NL
unknown
756
lsass.exe
142.250.185.163:80
c.pki.goog
GOOGLE
US
whitelisted
6544
svchost.exe
20.190.160.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 95.101.149.131
whitelisted
api.informaal.com
  • 188.114.96.3
  • 188.114.97.3
unknown
c.pki.goog
  • 142.250.185.163
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 4.231.128.59
  • 51.124.78.146
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info