File name:

111.zip

Full analysis: https://app.any.run/tasks/388ed1c1-ce57-4a11-9707-73635090e362
Verdict: Malicious activity
Analysis date: June 03, 2025, 15:01:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
python
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

9AC45E4D9CBFB27C7519E09F5346E3B5

SHA1:

C94E91265AC3376BE8D16D39F3A3B4577BADAA40

SHA256:

0B951AFD224376E159F41C9FAE1067273AC3D54714D736D5DFBEE4321D0A4E12

SSDEEP:

98304:RhTUKsdQSJwJ9eFTceBvl7AWWEC0oqUUR0W3YH/YK61O497+JYpvAPc53ge/hxvn:RKBBgWWVdxcO9j1lgbcWDzskS0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • SteamSetup.exe (PID: 4528)
      • HandymanLegendUpdate.exe (PID: 7268)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • SteamSetup.exe (PID: 4528)
    • Process drops python dynamic module

      • WinRAR.exe (PID: 3124)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 3124)
    • Creates a software uninstall entry

      • SteamSetup.exe (PID: 4528)
    • The process creates files with name similar to system file names

      • SteamSetup.exe (PID: 4528)
    • Executable content was dropped or overwritten

      • SteamSetup.exe (PID: 4528)
      • SteamService.exe (PID: 7840)
    • There is functionality for taking screenshot (YARA)

      • SteamSetup.exe (PID: 4528)
      • Steam.exe (PID: 2268)
    • Loads Python modules

      • HandymanLegendUpdate.exe (PID: 7268)
    • Get information on the list of running processes

      • cmd.exe (PID: 8140)
      • cmd.exe (PID: 8004)
      • cmd.exe (PID: 4468)
      • cmd.exe (PID: 2892)
      • cmd.exe (PID: 5596)
      • cmd.exe (PID: 7952)
      • cmd.exe (PID: 2800)
      • cmd.exe (PID: 8020)
      • cmd.exe (PID: 8044)
      • cmd.exe (PID: 4272)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 5212)
      • HandymanLegendUpdate.exe (PID: 7268)
      • cmd.exe (PID: 8160)
      • cmd.exe (PID: 7896)
      • cmd.exe (PID: 5956)
      • cmd.exe (PID: 7736)
      • cmd.exe (PID: 132)
      • cmd.exe (PID: 1184)
      • cmd.exe (PID: 7816)
      • cmd.exe (PID: 7516)
      • cmd.exe (PID: 7796)
      • HandymanLegendUpdate.exe (PID: 7512)
      • cmd.exe (PID: 5116)
      • cmd.exe (PID: 1284)
      • cmd.exe (PID: 8044)
      • cmd.exe (PID: 7464)
      • cmd.exe (PID: 1164)
      • cmd.exe (PID: 5180)
      • cmd.exe (PID: 472)
      • cmd.exe (PID: 3012)
      • cmd.exe (PID: 6940)
      • cmd.exe (PID: 7712)
      • cmd.exe (PID: 7460)
      • cmd.exe (PID: 5416)
      • cmd.exe (PID: 4648)
      • cmd.exe (PID: 1204)
      • cmd.exe (PID: 3384)
      • cmd.exe (PID: 7896)
      • cmd.exe (PID: 7260)
      • cmd.exe (PID: 6908)
      • cmd.exe (PID: 2740)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 7692)
      • cmd.exe (PID: 4776)
      • cmd.exe (PID: 5056)
      • cmd.exe (PID: 6632)
      • cmd.exe (PID: 3968)
      • cmd.exe (PID: 800)
      • cmd.exe (PID: 6792)
      • cmd.exe (PID: 8160)
      • cmd.exe (PID: 2908)
      • cmd.exe (PID: 7868)
      • cmd.exe (PID: 7184)
      • cmd.exe (PID: 7924)
      • cmd.exe (PID: 7708)
      • cmd.exe (PID: 7132)
      • cmd.exe (PID: 6560)
      • cmd.exe (PID: 5980)
      • cmd.exe (PID: 540)
      • cmd.exe (PID: 5800)
      • cmd.exe (PID: 7288)
      • cmd.exe (PID: 2812)
      • cmd.exe (PID: 5552)
      • cmd.exe (PID: 2192)
      • cmd.exe (PID: 7480)
      • cmd.exe (PID: 4284)
      • cmd.exe (PID: 5364)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 8140)
      • cmd.exe (PID: 8004)
      • cmd.exe (PID: 2892)
      • cmd.exe (PID: 7952)
      • cmd.exe (PID: 4468)
      • cmd.exe (PID: 2800)
      • cmd.exe (PID: 5212)
      • cmd.exe (PID: 8020)
      • cmd.exe (PID: 8044)
      • cmd.exe (PID: 4272)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 8160)
      • cmd.exe (PID: 7896)
      • cmd.exe (PID: 5956)
      • cmd.exe (PID: 7796)
      • cmd.exe (PID: 132)
      • cmd.exe (PID: 7816)
      • cmd.exe (PID: 7516)
      • cmd.exe (PID: 7736)
      • cmd.exe (PID: 1164)
      • cmd.exe (PID: 7464)
      • cmd.exe (PID: 1284)
      • cmd.exe (PID: 1184)
      • cmd.exe (PID: 8044)
      • cmd.exe (PID: 5180)
      • cmd.exe (PID: 472)
      • cmd.exe (PID: 6940)
      • cmd.exe (PID: 6908)
      • cmd.exe (PID: 3012)
      • cmd.exe (PID: 7712)
      • cmd.exe (PID: 7260)
      • cmd.exe (PID: 3384)
      • cmd.exe (PID: 7460)
      • cmd.exe (PID: 7896)
      • cmd.exe (PID: 6632)
      • cmd.exe (PID: 4648)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 5056)
      • cmd.exe (PID: 2740)
      • cmd.exe (PID: 3968)
      • cmd.exe (PID: 5416)
      • cmd.exe (PID: 7692)
      • cmd.exe (PID: 1204)
      • cmd.exe (PID: 4776)
      • cmd.exe (PID: 800)
      • cmd.exe (PID: 6792)
      • cmd.exe (PID: 8160)
      • cmd.exe (PID: 2908)
      • cmd.exe (PID: 7868)
      • cmd.exe (PID: 7184)
      • cmd.exe (PID: 7924)
      • cmd.exe (PID: 6560)
      • cmd.exe (PID: 540)
      • cmd.exe (PID: 5800)
      • cmd.exe (PID: 5980)
      • cmd.exe (PID: 7708)
      • cmd.exe (PID: 7288)
      • cmd.exe (PID: 2812)
      • cmd.exe (PID: 7132)
      • cmd.exe (PID: 5552)
      • cmd.exe (PID: 2192)
      • cmd.exe (PID: 7480)
      • cmd.exe (PID: 4284)
      • cmd.exe (PID: 5364)
    • Starts CMD.EXE for commands execution

      • HandymanLegendUpdate.exe (PID: 7268)
      • HandymanLegendUpdate.exe (PID: 7512)
  • INFO

    • Manual execution by a user

      • SteamSetup.exe (PID: 4528)
      • SteamSetup.exe (PID: 4188)
      • HandymanLegendUpdate.exe (PID: 7268)
      • Steam.exe (PID: 2268)
      • HandymanLegendUpdate.exe (PID: 7512)
    • Checks supported languages

      • SteamSetup.exe (PID: 4528)
      • SteamService.exe (PID: 7840)
      • HandymanLegendUpdate.exe (PID: 7268)
      • Steam.exe (PID: 2268)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 3124)
      • SteamSetup.exe (PID: 4528)
      • SteamService.exe (PID: 7840)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3124)
    • The sample compiled with bulgarian language support

      • SteamSetup.exe (PID: 4528)
    • Creates files in the program directory

      • SteamSetup.exe (PID: 4528)
      • SteamService.exe (PID: 7840)
      • Steam.exe (PID: 2268)
    • Launching a file from a Registry key

      • SteamSetup.exe (PID: 4528)
      • HandymanLegendUpdate.exe (PID: 7268)
    • Reads the computer name

      • SteamSetup.exe (PID: 4528)
      • SteamService.exe (PID: 7840)
      • Steam.exe (PID: 2268)
    • Create files in a temporary directory

      • SteamSetup.exe (PID: 4528)
      • HandymanLegendUpdate.exe (PID: 7268)
    • Reads the software policy settings

      • Steam.exe (PID: 2268)
      • slui.exe (PID: 1328)
    • Reads the machine GUID from the registry

      • Steam.exe (PID: 2268)
      • HandymanLegendUpdate.exe (PID: 7268)
    • Checks proxy server information

      • Steam.exe (PID: 2268)
      • slui.exe (PID: 1328)
    • Reads CPU info

      • Steam.exe (PID: 2268)
    • Creates files or folders in the user directory

      • Steam.exe (PID: 2268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:01:18 07:51:56
ZipCRC: 0xcb46f36f
ZipCompressedSize: 140778
ZipUncompressedSize: 322672
ZipFileName: concrt140.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
398
Monitored processes
272
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs steamsetup.exe no specs steamsetup.exe slui.exe steamservice.exe conhost.exe no specs steam.exe handymanlegendupdate.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs handymanlegendupdate.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
132C:\WINDOWS\system32\cmd.exe /c "tasklist | findstr steam.exe"C:\Windows\System32\cmd.exeHandymanLegendUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
236findstr steam.exeC:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
448tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
472C:\WINDOWS\system32\cmd.exe /c "tasklist | findstr steam.exe"C:\Windows\System32\cmd.exeHandymanLegendUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
540C:\WINDOWS\system32\cmd.exe /c "tasklist | findstr steam.exe"C:\Windows\System32\cmd.exeHandymanLegendUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
656tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
656findstr steam.exeC:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
660findstr steam.exeC:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
Total events
14 361
Read events
14 312
Write events
47
Delete events
2

Modification events

(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\111.zip
(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEB000000AF000000AA04000098020000
(PID) Process:(3124) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
58
Suspicious files
178
Text files
2 314
Unknown types
656

Dropped files

PID
Process
Filename
Type
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\charset_normalizer.md__mypyc.cp39-win_amd64.pydexecutable
MD5:450C214E625A6C9B43561397BF9DD807
SHA256:F26CD4385CB1233DB1F358B9893037EB65C08EDF250845F12493A1B9F1308AD9
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\mfc140u.dllexecutable
MD5:84B82C149B450D3C8E0D06F09A416B5D
SHA256:1EC2A31A1302E720C799BAD2FD90CF3457C6B2A375C4B41FAEFEE1A91D92F3E0
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\library.zipcompressed
MD5:110244E4352119EDD8F24AD71B4D30AE
SHA256:24E37AFE6C226DE021BB4344BD6833C8D1B6A6BA3B7BAE882D5B65C5B7610298
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\libssl-1_1.dllexecutable
MD5:BC778F33480148EFA5D62B2EC85AAA7D
SHA256:9D4CF1C03629F92662FC8D7E3F1094A7FC93CB41634994464B853DF8036AF843
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\win32event.pydexecutable
MD5:FF663CE8C59771D7AF879D41DA0CBEA2
SHA256:D9E03F7497927F955FEB510BF81DCA4AFB0E41B397D4315002202F0736283E61
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\win32crypt.pydexecutable
MD5:D4450ACC55391B1954DFAA035CEB2AB9
SHA256:E1BECC5A803E2E0DBC611BE918EADD76011318BC2CCCC9559B6DDB9336400A22
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\win32api.pydexecutable
MD5:7C48930F322772DBDF64BA70B865E094
SHA256:5A7D45508D5099D8F62D27693B441C521771B2A383E84499AB1E4587A9510F72
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\pywintypes39.dllexecutable
MD5:D60C74EF808BD1DDCC5D5CFD32A9AA38
SHA256:0C0832EA78678728667F0E84583378AA01A10C21AEF5E6E4A9E903F798D09FB0
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\zstandard.backend_c.cp39-win_amd64.pydexecutable
MD5:2DCEE3AED139B2FE36BEAAC7EF702FD7
SHA256:C14DBEDC05695C70C75E98368FB01ED898131D104E1E4C006D5A57E1294177E6
3124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3124.24371\lib\win32ui.pydexecutable
MD5:B9AA0A31B7CE4EBAD8811C0E982E91CD
SHA256:4A79035AEB25A643C60E4D198A65D71C31E37060869B9FF7725406AB6FF4DB27
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
27
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
472
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
472
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6920
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6920
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2268
Steam.exe
GET
200
2.16.168.117:80
http://r10.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgVw5xnQmeqtCTivokpVYwIezw%3D%3D
unknown
whitelisted
2268
Steam.exe
GET
200
23.56.253.135:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
472
svchost.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
8044
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
472
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
6544
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
login.live.com
  • 20.190.160.5
  • 20.190.160.2
  • 40.126.32.68
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.72
  • 40.126.32.134
  • 20.190.160.128
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
cdn.steamstatic.com
  • 151.101.195.52
  • 151.101.67.52
  • 151.101.131.52
  • 151.101.3.52
whitelisted

Threats

No threats detected
No debug info