download:

/a/7z2500.exe

Full analysis: https://app.any.run/tasks/eec845d1-a18e-443a-af50-5a9dcb259ef6
Verdict: Malicious activity
Analysis date: July 05, 2025, 22:21:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

33140969AE4757AC2A23815581FD3696

SHA1:

BE42A1295F5BE0EF7CCE0C8A9ED74338925679EC

SHA256:

3B7DCD86A17A2C4DEBAE0417DD98BB7467A69184357A23F6A3EE052356219720

SSDEEP:

49152:WPHtcOHyP4Rdkd2XMixIU8P8K1lGEfmvzxEq4SMHwzTVGHQB5JMczCJLdJeozEzI:WftcdWK2XMgqkKbt4aSMQzTc45JiL1Q8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • 7z2500.exe (PID: 2136)
    • Creates a software uninstall entry

      • 7z2500.exe (PID: 2136)
    • Creates/Modifies COM task schedule object

      • 7z2500.exe (PID: 2136)
    • Executable content was dropped or overwritten

      • 7z2500.exe (PID: 2136)
  • INFO

    • Checks supported languages

      • 7z2500.exe (PID: 2136)
      • SearchApp.exe (PID: 5328)
      • 7zFM.exe (PID: 4760)
    • The sample compiled with english language support

      • 7z2500.exe (PID: 2136)
    • Creates files in the program directory

      • 7z2500.exe (PID: 2136)
    • Reads the computer name

      • 7z2500.exe (PID: 2136)
      • 7zFM.exe (PID: 4760)
    • The sample compiled with russian language support

      • 7z2500.exe (PID: 2136)
    • Process checks computer location settings

      • SearchApp.exe (PID: 5328)
    • Reads the machine GUID from the registry

      • SearchApp.exe (PID: 5328)
    • Reads the software policy settings

      • SearchApp.exe (PID: 5328)
    • Manual execution by a user

      • 7zFM.exe (PID: 4760)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:07:05 12:00:00+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26112
InitializedDataSize: 24064
UninitializedDataSize: -
EntryPoint: 0x7144
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 25.0.0.0
ProductVersionNumber: 25.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Igor Pavlov
FileDescription: 7-Zip Installer
FileVersion: 25
InternalName: 7zipInstall
LegalCopyright: Copyright (c) 1999-2025 Igor Pavlov
OriginalFileName: 7zipInstall.exe
ProductName: 7-Zip
ProductVersion: 25
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 7z2500.exe 7zfm.exe no specs 7z2500.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
2136"C:\Users\admin\Desktop\7z2500.exe" C:\Users\admin\Desktop\7z2500.exe
explorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7-Zip Installer
Exit code:
0
Version:
25.00
Modules
Images
c:\users\admin\desktop\7z2500.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
3832"C:\Users\admin\Desktop\7z2500.exe" C:\Users\admin\Desktop\7z2500.exeexplorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Installer
Exit code:
3221226540
Version:
25.00
Modules
Images
c:\users\admin\desktop\7z2500.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4760"C:\Program Files (x86)\7-Zip\7zFM.exe" C:\Program Files (x86)\7-Zip\7zFM.exeexplorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip File Manager
Version:
25.00
Modules
Images
c:\program files (x86)\7-zip\7zfm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
5328"C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mcaC:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Search application
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\microsoft.windows.search_cw5n1h2txyewy\searchapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\combase.dll
Total events
4 005
Read events
3 938
Write events
63
Delete events
4

Modification events

(PID) Process:(2136) 7z2500.exeKey:HKEY_CURRENT_USER\SOFTWARE\7-Zip
Operation:writeName:Path32
Value:
C:\Program Files (x86)\7-Zip\
(PID) Process:(2136) 7z2500.exeKey:HKEY_CURRENT_USER\SOFTWARE\7-Zip
Operation:writeName:Path
Value:
C:\Program Files (x86)\7-Zip\
(PID) Process:(2136) 7z2500.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\7-Zip
Operation:writeName:Path32
Value:
C:\Program Files (x86)\7-Zip\
(PID) Process:(2136) 7z2500.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\7-Zip
Operation:writeName:Path
Value:
C:\Program Files (x86)\7-Zip\
(PID) Process:(2136) 7z2500.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(2136) 7z2500.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
Operation:writeName:{23170F69-40C1-278A-1000-000100020000}
Value:
7-Zip Shell Extension
(PID) Process:(2136) 7z2500.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\7zFM.exe
Operation:writeName:Path
Value:
C:\Program Files (x86)\7-Zip\
(PID) Process:(2136) 7z2500.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip
Operation:writeName:DisplayName
Value:
7-Zip 25.00
(PID) Process:(2136) 7z2500.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip
Operation:writeName:DisplayVersion
Value:
25.00
(PID) Process:(2136) 7z2500.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\7-Zip\7zFM.exe
Executable files
12
Suspicious files
13
Text files
106
Unknown types
0

Dropped files

PID
Process
Filename
Type
21367z2500.exeC:\Program Files (x86)\7-Zip\descript.iontext
MD5:EB7E322BDC62614E49DED60E0FB23845
SHA256:1DA513F5A4E8018B9AE143884EB3EAF72454B606FD51F2401B7CFD9BE4DBBF4F
21367z2500.exeC:\Program Files (x86)\7-Zip\Lang\an.txttext
MD5:F16218139E027338A16C3199091D0600
SHA256:3AB9F7AACD38C4CDE814F86BC37EEC2B9DF8D0DDDB95FC1D09A5F5BCB11F0EEB
21367z2500.exeC:\Program Files (x86)\7-Zip\Lang\ast.txttext
MD5:1CF6411FF9154A34AFB512901BA3EE02
SHA256:F5F2174DAF36E65790C7F0E9A4496B12E14816DAD2EE5B1D48A52307076BE35F
21367z2500.exeC:\Program Files (x86)\7-Zip\Lang\ar.txttext
MD5:5747381DC970306051432B18FB2236F2
SHA256:85A26C7B59D6D9932F71518CCD03ECEEBA42043CB1707719B72BFC348C1C1D72
21367z2500.exeC:\Program Files (x86)\7-Zip\History.txttext
MD5:D0B8877E2887EBB5ED1C743536DAB79A
SHA256:9C92C646E66AC7C8F200659AE3153785E7D6C07EFDE95C81EC131EA4BBCC394E
21367z2500.exeC:\Program Files (x86)\7-Zip\7-zip.chmbinary
MD5:22AB036830DE22E7E63C8E700EF5583C
SHA256:07BA58F647B1C56FC96129EC1FE8B892E824BD3F996255F33F396E76B1EFA90C
21367z2500.exeC:\Program Files (x86)\7-Zip\Lang\br.txttext
MD5:07504A4EDAB058C2F67C8BCB95C605DD
SHA256:432BDB3EAA9953B084EE14EEE8FE0ABBC1B384CBDD984CCF35F0415D45AABBA8
21367z2500.exeC:\Program Files (x86)\7-Zip\Lang\cs.txttext
MD5:1130ABF0E51093DC7EDD2C0C334BE5D8
SHA256:DA788D30AA74B3F8B3D920E98C535E4544756E9E4E235ED0221654F3177D3D2A
21367z2500.exeC:\Program Files (x86)\7-Zip\Lang\cy.txttext
MD5:6BDF25354B531370754506223B146600
SHA256:470EAF5E67F5EAD5B8C3ECC1B5B21B29D16C73591EB0047B681660346E25B3FB
21367z2500.exeC:\Program Files (x86)\7-Zip\Lang\el.txttext
MD5:5894A446DF1321FBDDA52A11FF402295
SHA256:2DD2130F94D31262B12680C080C96B38AD55C1007F9E610EC8473D4BB13D2908
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
26
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2612
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5328
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2220
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2220
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5328
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2664
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2612
svchost.exe
40.126.31.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2612
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
login.live.com
  • 40.126.31.3
  • 20.190.159.73
  • 40.126.31.67
  • 20.190.159.23
  • 20.190.159.71
  • 20.190.159.129
  • 40.126.31.1
  • 40.126.31.0
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.29
whitelisted
www.bing.com
  • 2.16.241.218
  • 2.16.241.201
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info