File name:

57releaseversion.zip

Full analysis: https://app.any.run/tasks/8ba5e54b-f3f7-4941-8321-8744914d1fbf
Verdict: Malicious activity
Analysis date: July 31, 2025, 20:28:30
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
python
pyinstaller
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

2FCDDC4603979A9B877F37C9B627BC53

SHA1:

8DB75D0907793E59232DBFB9A3532921F78334DD

SHA256:

0D67E7BD97C870A2477AE3CD0C769267536707310112D85C69454AF892741A68

SSDEEP:

98304:R8k13Er/CbuScsXXnV/9EhAZE9Gq1Kklvm1Li5Zn/0lcUXI3+rl8OcPEZVItSv1D:5qcggDACD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 4724)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 57ReleaseVersion.exe (PID: 6224)
    • Process drops python dynamic module

      • 57ReleaseVersion.exe (PID: 6224)
    • Executable content was dropped or overwritten

      • 57ReleaseVersion.exe (PID: 6224)
    • Application launched itself

      • 57ReleaseVersion.exe (PID: 6224)
    • The process drops C-runtime libraries

      • 57ReleaseVersion.exe (PID: 6224)
    • Loads Python modules

      • 57ReleaseVersion.exe (PID: 5248)
  • INFO

    • Checks supported languages

      • 57ReleaseVersion.exe (PID: 6224)
      • 57ReleaseVersion.exe (PID: 5248)
    • Manual execution by a user

      • 57ReleaseVersion.exe (PID: 6224)
    • Reads the computer name

      • 57ReleaseVersion.exe (PID: 6224)
    • The sample compiled with english language support

      • 57ReleaseVersion.exe (PID: 6224)
    • Create files in a temporary directory

      • 57ReleaseVersion.exe (PID: 6224)
    • PyInstaller has been detected (YARA)

      • 57ReleaseVersion.exe (PID: 6224)
      • 57ReleaseVersion.exe (PID: 5248)
    • Checks proxy server information

      • slui.exe (PID: 4160)
    • Reads the software policy settings

      • slui.exe (PID: 4160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:06:21 00:58:44
ZipCRC: 0x3370587f
ZipCompressedSize: 8987548
ZipUncompressedSize: 9227286
ZipFileName: 57ReleaseVersion.exe
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs 57releaseversion.exe conhost.exe no specs 57releaseversion.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
4160C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4724"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\57releaseversion.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5248"C:\Users\admin\Desktop\57ReleaseVersion.exe" C:\Users\admin\Desktop\57ReleaseVersion.exe57ReleaseVersion.exe
User:
admin
Company:
AGMG Discord
Integrity Level:
MEDIUM
Description:
GI Mods Fixer
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\57releaseversion.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6224"C:\Users\admin\Desktop\57ReleaseVersion.exe" C:\Users\admin\Desktop\57ReleaseVersion.exe
explorer.exe
User:
admin
Company:
AGMG Discord
Integrity Level:
MEDIUM
Description:
GI Mods Fixer
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\57releaseversion.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6668\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe57ReleaseVersion.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 974
Read events
4 966
Write events
8
Delete events
0

Modification events

(PID) Process:(4724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\57releaseversion.zip
(PID) Process:(4724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4724) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
57
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\_decimal.pydexecutable
MD5:3055EDF761508190B576E9BF904003AA
SHA256:E4104E47399D3F635A14D649F61250E9FD37F7E65C81FFE11F099923F8532577
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\VCRUNTIME140.dllexecutable
MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
SHA256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\_bz2.pydexecutable
MD5:223FD6748CAE86E8C2D5618085C768AC
SHA256:F81DC49EAC5ECC528E628175ADD2FF6BDA695A93EA76671D7187155AA6326ABB
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\_queue.pydexecutable
MD5:6E0CB85DC94E351474D7625F63E49B22
SHA256:3F57F29ABD86D4DC8F4CA6C3F190EBB57D429143D98F0636FF5117E08ED81F9B
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\_ctypes.pydexecutable
MD5:BBD5533FC875A4A075097A7C6ABA865E
SHA256:BE9828A877E412B48D75ADDC4553D2D2A60AE762A3551F9731B50CAE7D65B570
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:A538B281F8E84CECDAC507C73A43D744
SHA256:45AFAF08D1CD7E43AC5DED47ED5FD708B86E835A9470C81E8130ED6955B84DB8
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:8AD4771E23185CB7672F71EC16C580CF
SHA256:B153FF5D667C8297776F21C5F440CFF28C3E3A5B1F748FD4700306E1FB283ED8
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:7DC2026ABEDAA10841EAE4129EF1A9AE
SHA256:E83D5E5EB772070999F34A214EBFFCF0A6068EBC1C4B4F1991188448F323808D
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:1DC5B99C16502D75DD924EEDA562461C
SHA256:4E08856FF5203592C27F943F5586D2214B7C5DACDE1B1EF75C2316590AB788C9
622457ReleaseVersion.exeC:\Users\admin\AppData\Local\Temp\_MEI62242\_ssl.pydexecutable
MD5:5B9B3F978D07E5A9D701F832463FC29D
SHA256:D568B3C99BF0FC35A1F3C5F66B4A9D3B67E23A1D3CF0A4D30499D924D805F5AA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
37
TCP/UDP connections
51
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.216.77.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5368
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5968
RUXIMICS.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
40.126.32.76:443
https://login.live.com/RST2.srf
unknown
xml
1.24 Kb
whitelisted
POST
200
20.190.159.128:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
POST
200
20.190.159.128:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
16.7 Kb
whitelisted
POST
400
40.126.31.67:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5968
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.216.77.32:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.216.77.32:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5968
RUXIMICS.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.238
whitelisted
crl.microsoft.com
  • 23.216.77.32
  • 23.216.77.29
  • 23.216.77.27
  • 23.216.77.35
  • 23.216.77.38
  • 23.216.77.31
  • 23.216.77.30
  • 23.216.77.37
  • 23.216.77.39
  • 23.216.77.36
  • 23.216.77.43
  • 23.216.77.41
  • 23.216.77.28
  • 23.216.77.33
whitelisted
www.microsoft.com
  • 69.192.161.161
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.130
  • 20.190.160.2
  • 20.190.160.66
  • 20.190.160.5
  • 20.190.160.22
  • 20.190.160.20
  • 40.126.32.134
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
self.events.data.microsoft.com
  • 20.189.173.26
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info