File name:

rlm_16.1BL1_windows_x64.zip

Full analysis: https://app.any.run/tasks/e921dbdc-d11f-4fc4-8b89-44a0a04cd799
Verdict: Malicious activity
Analysis date: April 15, 2025, 19:20:43
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

7811FECA96018E493A65223EA9F5ABCF

SHA1:

8664783B33B5DBE9F903FDD4288CB986F616FF05

SHA256:

310CA41F6E7547A2DBD8B396369039260852E9A1AC2A39DC2E0DF4EE31FBA5B5

SSDEEP:

98304:NOXZjLutxqclcxmjxtoN8FMag5Uzeyd1tG7zuHRsKKHEoHRYre7inTyGMtA0khz2:MZJ9xyXelCAdVJ+BE1iNvDu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • rlmtests.exe (PID: 8028)
      • rlmtests.exe (PID: 3100)
    • Detected use of alternative data streams (AltDS)

      • rlm.exe (PID: 8172)
      • rlm.exe (PID: 4008)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 4776)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4776)
    • Creates files in the program directory

      • rlm.exe (PID: 7552)
      • rlm.exe (PID: 8172)
      • rlm.exe (PID: 4008)
      • rlmutil.exe (PID: 1132)
    • Manual execution by a user

      • rlm.exe (PID: 7552)
      • rlmtests.exe (PID: 8028)
      • rlmutil.exe (PID: 1132)
      • rlmanon.exe (PID: 1164)
      • rlmtests.exe (PID: 3100)
      • rlmutil.exe (PID: 1328)
    • Reads the computer name

      • rlm.exe (PID: 7552)
      • rlmtests.exe (PID: 8028)
      • rlm.exe (PID: 8172)
      • rlmtests.exe (PID: 3100)
      • rlmutil.exe (PID: 1328)
      • rlmutil.exe (PID: 1132)
    • Checks supported languages

      • rlm.exe (PID: 7552)
      • rlmtests.exe (PID: 8028)
      • rlm.exe (PID: 8172)
      • rlmutil.exe (PID: 1132)
      • rlmanon.exe (PID: 1164)
      • rlmtests.exe (PID: 3100)
      • rlmutil.exe (PID: 1328)
    • Reads the machine GUID from the registry

      • rlm.exe (PID: 7552)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:11:21 06:01:44
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: rlm_16.1BL1_windows_x64/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
26
Malicious processes
0
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs rlm.exe no specs conhost.exe no specs rlmtests.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs rlm.exe no specs rlmutil.exe no specs conhost.exe no specs rlmanon.exe no specs conhost.exe no specs rlmtests.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs rlm.exe no specs rlmutil.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
672C:\WINDOWS\system32\cmd.exe /c del *.ts_lic *.ts_opt *.opt "C:\ProgramData\Reprise\demo"\*.lic > c:\devnullC:\Windows\System32\cmd.exerlmtests.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
1132"C:\Users\admin\Desktop\rlm_16.1BL1_windows_x64\rlmutil.exe" C:\Users\admin\Desktop\rlm_16.1BL1_windows_x64\rlmutil.exeexplorer.exe
User:
admin
Company:
Reprise Software Inc.
Integrity Level:
MEDIUM
Exit code:
0
Version:
16, 1, 1, 0
Modules
Images
c:\users\admin\desktop\rlm_16.1bl1_windows_x64\rlmutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
1164"C:\Users\admin\Desktop\rlm_16.1BL1_windows_x64\rlmanon.exe" C:\Users\admin\Desktop\rlm_16.1BL1_windows_x64\rlmanon.exeexplorer.exe
User:
admin
Company:
Reprise Software Inc.
Integrity Level:
MEDIUM
Exit code:
1
Version:
16, 1, 1, 0
Modules
Images
c:\users\admin\desktop\rlm_16.1bl1_windows_x64\rlmanon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\advapi32.dll
1272\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerlmutil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1328"C:\Users\admin\Desktop\rlm_16.1BL1_windows_x64\rlmutil.exe" C:\Users\admin\Desktop\rlm_16.1BL1_windows_x64\rlmutil.exeexplorer.exe
User:
admin
Company:
Reprise Software Inc.
Integrity Level:
MEDIUM
Exit code:
0
Version:
16, 1, 1, 0
Modules
Images
c:\users\admin\desktop\rlm_16.1bl1_windows_x64\rlmutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
2236\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerlmanon.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2268\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerlmutil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3100"C:\Users\admin\Desktop\rlm_16.1BL1_windows_x64\rlmtests.exe" C:\Users\admin\Desktop\rlm_16.1BL1_windows_x64\rlmtests.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\rlm_16.1bl1_windows_x64\rlmtests.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
3140\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerlmtests.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3192C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
4 045
Read events
4 037
Write events
8
Delete events
0

Modification events

(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\rlm_16.1BL1_windows_x64.zip
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
4
Suspicious files
5
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
4776WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4776.17147\rlm_16.1BL1_windows_x64\rlmanon.exeexecutable
MD5:D6D5DD95C73F86116C9D1989BCC36A4A
SHA256:81504E7EB58EED9976194FA6B69564D900A2DE994F206D30023BEBBB6EF1D515
4776WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4776.17147\rlm_16.1BL1_windows_x64\READMEtext
MD5:49FB8AB7A6FA9EF3FA270EECC3E3D82E
SHA256:D0BBCFE3487CABC52A56EEDD7017C4A8430B1493C1059E9C96F3D509160351B3
4776WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4776.17147\rlm_16.1BL1_windows_x64\rlmtests.exeexecutable
MD5:17CF87662A0A469D6B77C7B81BE81F04
SHA256:22D9036156461E741E60B8EC18ACEC3DAD70A5645198E925C34DF199DC448C2F
4776WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4776.17147\rlm_16.1BL1_windows_x64\rlmutil.exeexecutable
MD5:09D9EAA205A65397C44FA8A0765A163F
SHA256:6FDD47600D446A38B3069B82A9F89048894476A6A09A1287268CA35C0009C7D7
4776WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4776.17147\rlm_16.1BL1_windows_x64\rlm.exeexecutable
MD5:930E8E008A66031B6A75943245DCF2FC
SHA256:9082E9ED21A1C6EE811A19BB8F7C638DDDEA14D87FEC82B5775A87EB5A1B95A0
7552rlm.exeC:\ProgramData\Reprise\.rlmdbbinary
MD5:F9B2A96B556C940E9C2C181E23F643FD
SHA256:59DE799D01FF24FE1322185D08BD4A10AB08C4611AC3091E7AF8C333DB416E59
7552rlm.exeC:\ProgramData\Reprise\rlminfo.5053text
MD5:FEA636B615B0483B11BF35A2C69B278D
SHA256:AB84F9B1F234B446B62B24CCEC271270C92F349FA1A0E9693F11976923AF5F26
8172rlm.exeC:\ProgramData\Reprise\rlminfo.30000text
MD5:D0D664D17B4361974C47C6CD6B53633A
SHA256:AE2FFA52B7D461B03740F55A9835D18ECC9CE9AA17C53FED47E31BCE918F3D7E
8028rlmtests.exeC:\Users\admin\Desktop\rlm_16.1BL1_windows_x64\rlmtests.ts_lictext
MD5:8F74C370B36F48BCE1C0426B028B7B49
SHA256:329D2BA7CAAB768CA9CCCE68B4EEA16E11ABC2F0AD8CC34FCDDAE406D205D1DC
4008rlm.exeC:\ProgramData\Reprise\rlminfo.30000text
MD5:1588322BC0D6EA33C7F463DB19B86D4A
SHA256:614724EF6F1572F3B4D8E7190C63BDDDB208F022E468589B5CF9D45FFA30684D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
19
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7840
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7840
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4
System
192.168.100.255:137
whitelisted
6544
svchost.exe
20.190.159.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 184.24.77.37
  • 184.24.77.35
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.131
  • 20.190.159.64
  • 20.190.159.23
  • 40.126.31.3
  • 20.190.159.129
  • 20.190.159.0
  • 40.126.31.131
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info