File name:

zapret-discord-roblox-1.9.6.rar

Full analysis: https://app.any.run/tasks/3dbf1c45-79cf-460b-b942-025bb94c7a50
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: February 15, 2026, 12:57:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
windivert-sys
mal-driver
salatstealer
stealer
susp-powershell
golang
upx
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

24489034D252113B7B9296BE125806D8

SHA1:

C3AE37D304583403ADE64177570DB9270C59BA32

SHA256:

32866AEF8C58F978AABB678B6FEB077D5296969620BC73CF390047203391772C

SSDEEP:

98304:X6Bna156kdu6lMjeC13PvIrToZnslNnEMswkDxgURdPPhetF3MxQ6QfKE2ulXyPg:eH+pHtRKpGszVPMD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Detects Cygwin installation

      • WinRAR.exe (PID: 8196)
    • Malicious driver has been detected

      • WinRAR.exe (PID: 8196)
    • SALATSTEALER mutex has been found

      • RobloxFix.exe (PID: 476)
      • RobloxFix.exe (PID: 8788)
      • ApplicationFrameHost.exe (PID: 8544)
    • SALATSTEALER has been detected (SURICATA)

      • RobloxFix.exe (PID: 476)
      • ApplicationFrameHost.exe (PID: 8544)
    • SALATSTEALER has been detected (YARA)

      • RobloxFix.exe (PID: 476)
  • SUSPICIOUS

    • Drops a system driver (possible attempt to evade defenses)

      • WinRAR.exe (PID: 8196)
    • Application launched itself

      • RobloxFix.exe (PID: 6924)
    • Multiple wallet extension IDs have been found

      • RobloxFix.exe (PID: 476)
    • The process creates files with name similar to system file names

      • RobloxFix.exe (PID: 476)
    • Starts itself from another location

      • RobloxFix.exe (PID: 476)
  • INFO

    • Drops script file

      • WinRAR.exe (PID: 8196)
    • Manual execution by a user

      • RobloxFix.exe (PID: 6924)
      • RobloxFix.exe (PID: 8788)
    • Checks supported languages

      • RobloxFix.exe (PID: 6924)
      • RobloxFix.exe (PID: 476)
      • RobloxFix.exe (PID: 8788)
      • ApplicationFrameHost.exe (PID: 8544)
    • Creates files in the program directory

      • RobloxFix.exe (PID: 6924)
      • RobloxFix.exe (PID: 476)
    • Reads the computer name

      • RobloxFix.exe (PID: 6924)
      • RobloxFix.exe (PID: 476)
      • ApplicationFrameHost.exe (PID: 8544)
    • Reads security settings of Internet Explorer

      • RobloxFix.exe (PID: 6924)
    • Process checks computer location settings

      • RobloxFix.exe (PID: 6924)
    • Reads the machine GUID from the registry

      • RobloxFix.exe (PID: 476)
      • RobloxFix.exe (PID: 8788)
      • ApplicationFrameHost.exe (PID: 8544)
    • There is functionality for taking screenshot (YARA)

      • RobloxFix.exe (PID: 476)
    • Detects GO elliptic curve encryption (YARA)

      • RobloxFix.exe (PID: 476)
    • Application based on Golang

      • RobloxFix.exe (PID: 476)
    • Found Base64 encoded access to Windows Defender via PowerShell (YARA)

      • RobloxFix.exe (PID: 476)
    • Found Base64 encoded file access via PowerShell (YARA)

      • RobloxFix.exe (PID: 476)
    • UPX packer has been detected

      • RobloxFix.exe (PID: 476)
    • Found Base64 encoded access to environment variables via PowerShell (YARA)

      • RobloxFix.exe (PID: 476)
    • Creates files or folders in the user directory

      • RobloxFix.exe (PID: 476)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
153
Monitored processes
5
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT winrar.exe no specs robloxfix.exe no specs #SALATSTEALER robloxfix.exe #SALATSTEALER robloxfix.exe #SALATSTEALER applicationframehost.exe

Process information

PID
CMD
Path
Indicators
Parent process
476"C:\Users\admin\Desktop\1234\RobloxFix.exe" C:\Users\admin\Desktop\1234\RobloxFix.exe
RobloxFix.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\1234\robloxfix.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6924"C:\Users\admin\Desktop\1234\RobloxFix.exe" C:\Users\admin\Desktop\1234\RobloxFix.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\1234\robloxfix.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8196"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\zapret-discord-roblox-1.9.6.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
8544C:\Users\admin\AppData\Local\PackageManagement\ApplicationFrameHost.exeC:\Users\admin\AppData\Local\PackageManagement\ApplicationFrameHost.exe
RobloxFix.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\packagemanagement\applicationframehost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8788"C:\Users\admin\Desktop\1234\RobloxFix.exe" C:\Users\admin\Desktop\1234\RobloxFix.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\desktop\1234\robloxfix.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
2 978
Read events
2 959
Write events
19
Delete events
0

Modification events

(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Downloads\chromium_build 1.zip
(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\zapret-discord-roblox-1.9.6.rar
(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(8196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
0
Suspicious files
0
Text files
0
Unknown types
42

Dropped files

PID
Process
Filename
Type
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\bin\WinDivert.dllbinary
MD5:B2014D33EE645112D5DC16FE9D9FCBFF
SHA256:C1E060EE19444A259B2162F8AF0F3FE8C4428A1C6F694DCE20DE194AC8D7D9A2
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\general (ALT5).batbinary
MD5:BCD9A37C8EF0E03FD5B516D781E36A3D
SHA256:61B7C5AF0359492D6CD5252956C17104F17DF66A1E01982EE7AB55C4B490E3CD
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\bin\cygwin1.dllbinary
MD5:A1C82ED072DC079DD7851F82D9AA7678
SHA256:103104A52E5293CE418944725DF19E2BF81AD9269B9A120D71D39028E821499B
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\bin\tls_clienthello_4pda_to.binbinary
MD5:E6D649DE132C3C10CB62531EF74F5B73
SHA256:EEFEAF09DDE8D69B1F176212541F63C68B314A33A335ECED99A8A29F17254DA8
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\bin\quic_initial_www_google_com.binbinary
MD5:312526D39958D89B1F8AB67789AB985F
SHA256:F4589C57749F956BB30538197A521D7005F8B0A8723B4707E72405E51DDAC50A
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\bin\tls_clienthello_max_ru.binbinary
MD5:B2B3E684CE449B60F0BC5A9028221A08
SHA256:4EE0870ABE0A0128600B0095189987BA1D210DAE8BF963BC725AFF49CF922624
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\bin\WinDivert64.sysbinary
MD5:89ED5BE7EA83C01D0DE33D3519944AA5
SHA256:8DA085332782708D8767BCACE5327A6EC7283C17CFB85E40B03CD2323A90DDC2
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\bin\tls_clienthello_www_google_com.binbinary
MD5:41E47557F16690DF1781F67C8712714E
SHA256:F966351AE376963DFFBCB5B94256872649B9CDAAB8C5175025936FA50E07DC19
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\general (ALT).batbinary
MD5:1A1F04F870821ED6A42560D2E2C66A90
SHA256:B146C8D744C288491D7761E9F2D5D6E471B864ACC08C04689456AA60BECDCCC2
8196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8196.37512\1234\general (ALT11).batbinary
MD5:CBCBD536C02E282FD2D75C4173A3B140
SHA256:B42C0CA732055F2EBACBE29C251A2298155F084ECB30E7EB250B497277B82AA3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
34
DNS requests
19
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6768
MoUsoCoreWorker.exe
GET
304
20.73.194.208:443
https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop
US
whitelisted
9088
svchost.exe
GET
304
20.73.194.208:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
whitelisted
3996
SIHClient.exe
GET
304
135.232.92.137:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
3996
SIHClient.exe
GET
200
135.233.95.135:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
whitelisted
3996
SIHClient.exe
GET
200
135.232.92.137:443
https://slscr.update.microsoft.com/sls/ping
US
whitelisted
3996
SIHClient.exe
GET
304
135.232.92.137:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
356
svchost.exe
POST
200
20.190.160.5:443
https://login.live.com/RST2.srf
US
binary
11.1 Kb
whitelisted
356
svchost.exe
GET
200
172.66.2.5:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
binary
471 b
whitelisted
9088
svchost.exe
GET
200
2.18.244.211:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
356
svchost.exe
POST
200
20.190.160.5:443
https://login.live.com/RST2.srf
US
10.3 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
8124
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2.16.241.222:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
162.159.142.9:80
ocsp.digicert.com
CLOUDFLARENET
US
whitelisted
204.79.197.203:80
oneocsp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
9088
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
356
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
self.events.data.microsoft.com
  • 20.42.73.30
whitelisted
www.bing.com
  • 2.16.241.222
  • 2.16.241.218
  • 2.16.241.205
  • 2.16.241.207
whitelisted
ocsp.digicert.com
  • 162.159.142.9
  • 172.66.2.5
whitelisted
google.com
  • 142.251.141.142
whitelisted
oneocsp.microsoft.com
  • 204.79.197.203
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.5
  • 40.126.32.74
  • 20.190.160.20
  • 40.126.32.134
  • 20.190.160.130
  • 20.190.160.67
  • 20.190.160.131
  • 20.190.160.64
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.18.244.211
  • 2.18.244.216
whitelisted
dns.google
  • 8.8.8.8
  • 8.8.4.4
whitelisted

Threats

PID
Process
Class
Message
9088
svchost.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2292
svchost.exe
Misc activity
INFO [ANY.RUN] Google DNS-over-HTTPS service requested (dns. google)
476
RobloxFix.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Salatstealer JA3 hash observed
476
RobloxFix.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Salatstealer JA3 hash observed
2292
svchost.exe
Misc activity
INFO [ANY.RUN] Cloudflare DNS-over-HTTPS service requested (cloudflare-dns .com)
476
RobloxFix.exe
Misc activity
ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)
476
RobloxFix.exe
Misc activity
ET INFO Observed Google DNS over HTTPS Domain (dns .google in TLS SNI)
8544
ApplicationFrameHost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Salatstealer JA3 hash observed
8544
ApplicationFrameHost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Win32/Salatstealer JA3 hash observed
No debug info