File name:

609a53_DbSchema-841-Cr.zip

Full analysis: https://app.any.run/tasks/b930273c-cde5-400b-8c70-52ad954b8ec9
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 16, 2025, 09:56:41
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
autoit
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

9A5F5356A2D11E824968D32F26CE214F

SHA1:

F52560F3DD6F587F4674926BBC8AE113F42D9D64

SHA256:

20EE4314D5B78AD67B4E0549ED126252E9B4B20680B6837B92E05C1873BB6380

SSDEEP:

98304:PSATp3JVoDCuKBElsZWrxk1sKX3mMrA+IcrSYQLw8rTZwXoe4DxUQCoUfdAYlIpL:4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • main_setup_x86x64.exe (PID: 3900)
    • Actions looks like stealing of personal data

      • Gote.exe.com (PID: 5988)
    • Steals credentials from Web Browsers

      • Gote.exe.com (PID: 5988)
    • Starts CMD.EXE for self-deleting

      • Gote.exe.com (PID: 5988)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5308)
      • main_setup_x86x64.exe (PID: 3900)
    • Generic archive extractor

      • WinRAR.exe (PID: 7556)
    • Starts CMD.EXE for commands execution

      • main_setup_x86x64.exe (PID: 3900)
      • Gote.exe.com (PID: 5988)
      • cmd.exe (PID: 7336)
    • The executable file from the user directory is run by the CMD process

      • Gote.exe.com (PID: 2432)
    • Application launched itself

      • cmd.exe (PID: 7336)
      • Gote.exe.com (PID: 2432)
    • Starts application with an unusual extension

      • Gote.exe.com (PID: 2432)
      • cmd.exe (PID: 1312)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 1312)
      • Gote.exe.com (PID: 2432)
    • There is functionality for taking screenshot (YARA)

      • main_setup_x86x64.exe (PID: 3900)
      • Gote.exe.com (PID: 5988)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 1312)
    • Searches for installed software

      • Gote.exe.com (PID: 5988)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 5244)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1312)
  • INFO

    • Checks supported languages

      • main_setup_x86x64.exe (PID: 3900)
      • Gote.exe.com (PID: 5988)
      • Gote.exe.com (PID: 2432)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5308)
    • Manual execution by a user

      • WinRAR.exe (PID: 5308)
    • Reads the computer name

      • main_setup_x86x64.exe (PID: 3900)
      • Gote.exe.com (PID: 5988)
    • Reads mouse settings

      • Gote.exe.com (PID: 2432)
      • Gote.exe.com (PID: 5988)
    • Reads the software policy settings

      • slui.exe (PID: 7724)
    • Reads product name

      • Gote.exe.com (PID: 5988)
    • Create files in a temporary directory

      • Gote.exe.com (PID: 5988)
      • main_setup_x86x64.exe (PID: 3900)
    • Reads CPU info

      • Gote.exe.com (PID: 5988)
    • Reads Environment values

      • Gote.exe.com (PID: 5988)
    • Process checks computer location settings

      • main_setup_x86x64.exe (PID: 3900)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2021:05:11 09:51:04
ZipCRC: 0x35ad8377
ZipCompressedSize: 1738368
ZipUncompressedSize: 1738104
ZipFileName: DbSchema-841-Crack-With-Activation-Key-Download-2021/609a5389a055960_setup_v18.2.9.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
196
Monitored processes
66
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe rundll32.exe no specs winrar.exe main_setup_x86x64.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs findstr.exe no specs gote.exe.com no specs ping.exe no specs gote.exe.com slui.exe svchost.exe cmd.exe no specs conhost.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632"C:\Windows\System32\cmd.exe" /c uWPXDaWHSCROIeNtzQWEAimC:\Windows\SysWOW64\cmd.exemain_setup_x86x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
732\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
736\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
924\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1228"C:\Windows\System32\cmd.exe" /c UCcXBZzkBjTOvUNQzmqgSaDhBLBtQhnciUcIgfKIAZBPTzvCiVHXIcJCZicQbgxhNbGBntBrOsOTQNxigYXVGAC:\Windows\SysWOW64\cmd.exemain_setup_x86x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1228timeout 3 C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
1312C:\WINDOWS\system32\cmd C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1532"C:\Windows\System32\cmd.exe" /c ivHuWaNQiXHTlYBGMIpecEqJEXYCgVtSbdkKjjHUlrwMoSvUMqbIKC:\Windows\SysWOW64\cmd.exemain_setup_x86x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1628\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1672"C:\Windows\System32\cmd.exe" /c ANsYNRDMVaHkEdIZZdUFCPxiiDpXUAgkFzOWuayZnxffldoFMEKFTpPLalC:\Windows\SysWOW64\cmd.exemain_setup_x86x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
7 639
Read events
7 593
Write events
33
Delete events
13

Modification events

(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\609a53_DbSchema-841-Cr.zip
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(7556) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
1
Suspicious files
12
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
7556WinRAR.exeC:\Users\admin\Desktop\DbSchema-841-Crack-With-Activation-Key-Download-2021\609a5389a055960-Passw0rd.txttext
MD5:55DE787F780E4782E039994F59568A8B
SHA256:647AEF463EDAA1C50E3F244C9D1574A6F372EFF2E30BEADB94869C47E6C56E58
5308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb5308.25451\main_setup_x86x64.exeexecutable
MD5:19E71970DDE0C76C54572A5C5DF5F503
SHA256:D44C0887E87644CD49D77163B5344A371713077AA0A3E07269F48BC7D80075EB
7556WinRAR.exeC:\Users\admin\Desktop\DbSchema-841-Crack-With-Activation-Key-Download-2021\609a5389a055960_setup_v18.2.9.zipcompressed
MD5:9B9788AB895A43A2AD29E62E76B6E8F3
SHA256:DA28CEBDD2A5057329E34A499AF3BA54A267F4DCD806614631B27C3B446DB4BB
5988Gote.exe.comC:\Users\admin\AppData\Local\Temp\aXUvBJVO\fehS8.tmpbinary
MD5:1E1F96F03DCB32CBEDE6A33AF67A44A7
SHA256:B6DCEC10039FBA99019A6DE818D433847EFAD62FAE59851E328EC42396DFD9CB
1312cmd.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Gote.exe.comtext
MD5:AC6AD5D9B99757C3A878F2D275ACE198
SHA256:9B8DB510EF42B8ED54A3712636FDA55A4F8CFCD5493E20B74AB00CD4F3979F2D
1312cmd.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Utext
MD5:ACF88C5609AD14CBAB025785EE4210CE
SHA256:23B90A8AFBEB4982A02D3E4187C4E04F4A386D95A852E1B8C2D59C5BA8D10B4E
5988Gote.exe.comC:\Users\admin\AppData\Local\Temp\Xruiyyn.txttext
MD5:A656A56632BAD6788B4A5B80C6FBB8D0
SHA256:BBC7EBEAE4FBC8190F702AF489BA09653F1303E3C10B47F3C0096CCF545008E9
3900main_setup_x86x64.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\Mutevole.bmptext
MD5:ACF88C5609AD14CBAB025785EE4210CE
SHA256:23B90A8AFBEB4982A02D3E4187C4E04F4A386D95A852E1B8C2D59C5BA8D10B4E
5988Gote.exe.comC:\Users\admin\AppData\Local\Temp\aXUvBJVO\files_\passwords.txttext
MD5:03733B318543805C1049BEBDD56666FD
SHA256:72A2B2674523E6A782620467976922E78A55F495635523E56BE88E43736B14EA
5988Gote.exe.comC:\Users\admin\AppData\Local\Temp\aXUvBJVO\files_\system_info.txtbinary
MD5:0526534A58AE26DB60E38315B5399DF6
SHA256:E28CAEF7BC30D5C1E48D0975497FBC0E5F3FF99ED585005108DE07A283F9CEF9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
26
DNS requests
21
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.8:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8180
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8180
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.8:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 23.216.77.8
  • 23.216.77.17
  • 23.216.77.12
  • 23.216.77.10
  • 23.216.77.19
  • 23.216.77.4
  • 23.216.77.18
  • 23.216.77.34
  • 23.216.77.42
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.32.74
  • 20.190.160.132
  • 20.190.160.17
  • 20.190.160.4
  • 20.190.160.131
  • 20.190.160.64
  • 40.126.32.76
  • 20.190.160.65
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
AUbdvMIsgXQhVvSuJCLz.AUbdvMIsgXQhVvSuJCLz
unknown

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
No debug info