File name:

EDRW Patch v1.1 & Activator 2.1 - yaschir.zip

Full analysis: https://app.any.run/tasks/6974fbfe-43e5-417c-ad66-97fab44cb3d9
Verdict: Malicious activity
Analysis date: April 04, 2025, 08:37:18
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

92DE5DBC76CA5302D92B725B0F7FC9C2

SHA1:

52B42EF3C9B86334133F9B916C1BB934822BBD72

SHA256:

4B929EFE2753988A399F16C24A26A9610FB9EEFFA05D641FDAAE8213E907AA9D

SSDEEP:

49152:4l/8zqTyaZifBml/8zLpwlYu/32enMkJZCYuO8EZF7vuAh1BT+MVmczBfanu5nLt:4R8zqTyjgR8zLYYY32yMVSH7f1BT+MVh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5668)
    • Executable content was dropped or overwritten

      • (32-Bit) EDRW Patcher v1.1.exe (PID: 6744)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 4608)
      • WinRAR.exe (PID: 5668)
      • wscript.exe (PID: 6640)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 6640)
      • cmd.exe (PID: 4608)
      • WinRAR.exe (PID: 5668)
    • Application launched itself

      • cmd.exe (PID: 4608)
    • The process executes VB scripts

      • cmd.exe (PID: 4608)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6640)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 1512)
    • Modifies hosts file to alter network resolution

      • cmd.exe (PID: 1512)
    • Process uses IPCONFIG to clear DNS cache

      • cmd.exe (PID: 1512)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 1512)
  • INFO

    • Create files in a temporary directory

      • (32-Bit) EDRW Patcher v1.1.exe (PID: 6744)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 5668)
    • Checks supported languages

      • (32-Bit) EDRW Patcher v1.1.exe (PID: 6744)
    • Reads the computer name

      • (32-Bit) EDRW Patcher v1.1.exe (PID: 6744)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2021:08:16 00:00:12
ZipCRC: 0x5137c7e0
ZipCompressedSize: 1187
ZipUncompressedSize: 3327
ZipFileName: ReadMe (EDRW).txt
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
161
Monitored processes
33
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs (32-bit) edrw patcher v1.1.exe no specs (32-bit) edrw patcher v1.1.exe cmd.exe no specs conhost.exe no specs fltmc.exe no specs cmd.exe no specs wscript.exe no specs cmd.exe conhost.exe no specs fltmc.exe no specs icacls.exe no specs attrib.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs ipconfig.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
728"C:\Users\admin\AppData\Local\Temp\Rar$EXa5668.16658\2- Patcher\(32-Bit) EDRW Patcher v1.1.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa5668.16658\2- Patcher\(32-Bit) EDRW Patcher v1.1.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa5668.16658\2- patcher\(32-bit) edrw patcher v1.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1088FIND /C /I "buy.easeus.com" C:\WINDOWS\system32\drivers\etc\hostsC:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
1180"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1512"C:\Windows\System32\cmd.exe" /k cd "C:\Users\admin\AppData\Local\Temp\Rar$DIa5668.17705\" && "C:\Users\admin\AppData\Local\Temp\Rar$DIa5668.17705\EaseUS hosts blocker.bat" ""C:\Windows\System32\cmd.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
1628C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
1660FIND /C /I "api.easeus.com" C:\WINDOWS\system32\drivers\etc\hostsC:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
2088FIND /C /I "www.easeus.com.cn" C:\WINDOWS\system32\drivers\etc\hostsC:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
2236FIND /C /I "order.easeus.com" C:\WINDOWS\system32\drivers\etc\hostsC:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
2268fltmc C:\Windows\System32\fltMC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Filter Manager Control Program
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fltmc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\fltlib.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2616cmd /u /c echo Set UAC = CreateObject("Shell.Application") : UAC.ShellExecute "cmd.exe", "/k cd ""C:\Users\admin\AppData\Local\Temp\Rar$DIa5668.17705\"" && ""C:\Users\admin\AppData\Local\Temp\Rar$DIa5668.17705\EaseUS hosts blocker.bat"" """"", "", "runas", 1 C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 923
Read events
4 904
Write events
19
Delete events
0

Modification events

(PID) Process:(5668) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5668) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5668) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5668) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\EDRW Patch v1.1 & Activator 2.1 - yaschir.zip
(PID) Process:(5668) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5668) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5668) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5668) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4608) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(5668) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE401000033000000A40500001C020000
Executable files
6
Suspicious files
1
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
5668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5668.16111\2- Patcher\(64-Bit) EDRW Patcher v1.1.exeexecutable
MD5:087406E501B283F538D66C98B7EA1991
SHA256:04491956A8B8993E031D632304FF57667BC4C77885DA153E75454FF2E25DBC1D
5668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5668.16658\3- KeyGen (Activator)\EDRW v13 Activator v2.1 - De!.exeexecutable
MD5:284182F0388FE891ED6B6A1DA5B4196E
SHA256:10BADD3B49C88AC87CE720C47CCD79F0DB4F8125D63B52D328E554FB549C44A8
1512cmd.exeC:\Windows\System32\drivers\etc\hoststext
MD5:078B0F8CC026E5BB715635A381EE7162
SHA256:601F072B9C254B59FD67AEAE39B32E78928F3DA48C49BD8EAFEA84FBFBAA3FD1
5668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5668.16658\ReadMe (EDRW).txttext
MD5:5590D164C5A5933C6D76CB7C51EC3C61
SHA256:D95DD67969972258D255169D95F5EB948494C8E1C092E1FCFD69DDA1C5CE98FE
5668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5668.16658\2- Patcher\(32-Bit) EDRW Patcher v1.1.exeexecutable
MD5:D0D44869D0B87FD8E960951687417CC9
SHA256:8A66E54EB6A022EEB9063BF8182D3D1DEE11AA6990742E25CCD64CC5B7DBE3B0
5668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5668.16658\1- Hosts blocker\EaseUS hosts blocker.battext
MD5:A20BEF352C605997B09E2DA7BCA1F16E
SHA256:0124F42AC03A8F0CCACB35CF2E57D8CE96A323D66FBE4EBE06AD1DEF2E4D3B20
5668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa5668.17705\EaseUS hosts blocker.battext
MD5:A20BEF352C605997B09E2DA7BCA1F16E
SHA256:0124F42AC03A8F0CCACB35CF2E57D8CE96A323D66FBE4EBE06AD1DEF2E4D3B20
6744(32-Bit) EDRW Patcher v1.1.exeC:\Users\admin\AppData\Local\Temp\dup2patcher.dllexecutable
MD5:4D9AB4032AFF2644CE0D1E54D3DE1D7D
SHA256:F9585DE5B2442E841FABB7F4A61DFAFE28849FBECE57A372A9110137ECC4A6F8
4608cmd.exeC:\Users\admin\AppData\Local\Temp\GetAdmin.vbsbinary
MD5:693F2E8FB39643680DF883D41E535C5F
SHA256:E4EF22ABD7867272706F0BFDC59000DA06309B34CFF2F65429CB8DF3C2CC7759
5668WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5668.17248\3- KeyGen (Activator)\EDRW v13 Activator v2.1 - De!.exeexecutable
MD5:284182F0388FE891ED6B6A1DA5B4196E
SHA256:10BADD3B49C88AC87CE720C47CCD79F0DB4F8125D63B52D328E554FB549C44A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.158:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.158:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
960
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
960
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.158:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.158:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
20.10.31.115:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
960
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.110
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.158
  • 23.48.23.143
  • 23.48.23.159
  • 23.48.23.173
  • 23.48.23.166
whitelisted
client.wns.windows.com
  • 20.10.31.115
whitelisted
login.live.com
  • 20.190.160.14
  • 20.190.160.17
  • 20.190.160.130
  • 40.126.32.68
  • 20.190.160.20
  • 40.126.32.133
  • 40.126.32.76
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 2.19.217.218
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info