File name:

headshot.zip

Full analysis: https://app.any.run/tasks/3ee9dbe4-1991-4a3e-b1a0-0228ef8e3638
Verdict: Malicious activity
Analysis date: April 23, 2025, 00:17:04
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

9F13936875AFD92B2CE5C0B3C25C56B1

SHA1:

4720461E024CB05A4FB092F889DC8D6B3637B456

SHA256:

518E01399C5D91B2C9C5369435CB61A8368CECDE11AA0FCEEB58D1D284B699F5

SSDEEP:

98304:wiIVa3wrtRAtCq9a/0ciM2P2wiOnMXmdWEG0xIESaIBxNTb7tJ/34y8R9LhtjQOZ:qWtk2+VKbkpeL3evm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 4776)
  • INFO

    • Manual execution by a user

      • headshot_anticheat.exe (PID: 4868)
      • headshot_anticheat.exe (PID: 1184)
      • headshot_service.exe (PID: 6480)
      • headshot_service.exe (PID: 728)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 4776)
    • Reads the computer name

      • headshot_anticheat.exe (PID: 1184)
      • headshot_service.exe (PID: 728)
    • Reads Environment values

      • headshot_anticheat.exe (PID: 1184)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4776)
    • Reads the machine GUID from the registry

      • headshot_anticheat.exe (PID: 1184)
    • Disables trace logs

      • headshot_anticheat.exe (PID: 1184)
    • Checks proxy server information

      • headshot_anticheat.exe (PID: 1184)
    • Reads the software policy settings

      • headshot_anticheat.exe (PID: 1184)
    • Checks supported languages

      • headshot_anticheat.exe (PID: 1184)
      • headshot_service.exe (PID: 728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:04:01 19:31:20
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: headshot/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
8
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs headshot_anticheat.exe no specs headshot_anticheat.exe headshot_service.exe no specs headshot_service.exe

Process information

PID
CMD
Path
Indicators
Parent process
728"C:\Users\admin\Desktop\headshot\src\headshot_service.exe" C:\Users\admin\Desktop\headshot\src\headshot_service.exe
explorer.exe
User:
admin
Company:
www.headshot.ro / #headshot gather
Integrity Level:
HIGH
Description:
#headshot AntiCheat Service
Version:
1.0.0.4
Modules
Images
c:\users\admin\desktop\headshot\src\headshot_service.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1184"C:\Users\admin\Desktop\headshot\headshot_anticheat.exe" C:\Users\admin\Desktop\headshot\headshot_anticheat.exe
explorer.exe
User:
admin
Company:
www.headshot.ro / #headshot gather
Integrity Level:
HIGH
Description:
#headshot AntiCheat
Exit code:
1
Version:
1.0.0.4
Modules
Images
c:\users\admin\desktop\headshot\headshot_anticheat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2320"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4776"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\headshot.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4868"C:\Users\admin\Desktop\headshot\headshot_anticheat.exe" C:\Users\admin\Desktop\headshot\headshot_anticheat.exeexplorer.exe
User:
admin
Company:
www.headshot.ro / #headshot gather
Integrity Level:
MEDIUM
Description:
#headshot AntiCheat
Exit code:
3221226540
Version:
1.0.0.4
Modules
Images
c:\users\admin\desktop\headshot\headshot_anticheat.exe
c:\windows\system32\ntdll.dll
5256C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6244C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6480"C:\Users\admin\Desktop\headshot\src\headshot_service.exe" C:\Users\admin\Desktop\headshot\src\headshot_service.exeexplorer.exe
User:
admin
Company:
www.headshot.ro / #headshot gather
Integrity Level:
MEDIUM
Description:
#headshot AntiCheat Service
Exit code:
3221226540
Version:
1.0.0.4
Modules
Images
c:\users\admin\desktop\headshot\src\headshot_service.exe
c:\windows\system32\ntdll.dll
Total events
3 238
Read events
3 188
Write events
37
Delete events
13

Modification events

(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\headshot.zip
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(4776) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
36
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
4776WinRAR.exeC:\Users\admin\Desktop\headshot\src\AuthenticodeExaminer.dllexecutable
MD5:1FC478AF95BA9A5860F7F694879159B8
SHA256:9043F097BC9D529830BF6E9BE69558DDC2BF891D696D926A0B4321B77CF155FE
4776WinRAR.exeC:\Users\admin\Desktop\headshot\headshot_anticheat.exeexecutable
MD5:5C292BA0B6D088D76EDEFF92C855BAE3
SHA256:4010E81A767148A1C8F406A57BFBDC287A243F4F3381F0D38F219B3FCC00F150
4776WinRAR.exeC:\Users\admin\Desktop\headshot\src\amd64\KernelTraceControl.dllexecutable
MD5:B1C75BF2B5095AC3299403E34D462C4C
SHA256:98DE2F1DE4FB1711688C04E2CB0187BF8C47E627771E8F51329671F296BFC688
4776WinRAR.exeC:\Users\admin\Desktop\headshot\src\Microsoft.Bcl.AsyncInterfaces.dllexecutable
MD5:DF4EC528F55FD5BC394F98049251B74D
SHA256:49EEA12DCAC1B64E1E6D075A594C8B2EF71A0E40FBB5554509A7DA5396FA38AA
4776WinRAR.exeC:\Users\admin\Desktop\headshot\src\Microsoft.Diagnostics.Tracing.TraceEvent.dllexecutable
MD5:2140D15E58FC3C64C4A0260CE0113D6F
SHA256:9DA7E7BFC0D5B5EF83E694560D478D05D0F0E512B463F43349DCA2F2E67AACE0
4776WinRAR.exeC:\Users\admin\Desktop\headshot\src\Gameloop.Vdf.dllexecutable
MD5:C3D74A26D3AC858CA827546FB6A993CF
SHA256:325DE2B398089F136E23E623CF1658B03C51A821A9271069B74CC4187D3482E0
4776WinRAR.exeC:\Users\admin\Desktop\headshot\src\Hardware.Info.dllexecutable
MD5:A815D487985608CF7165AE1B47EE1940
SHA256:0EFE34682450AEBB23B3CE017DC4B6644A370F776E293D0E628567914F6793DA
4776WinRAR.exeC:\Users\admin\Desktop\headshot\src\headshot_service.exe.configxml
MD5:3A7D9295FC78E521222AFA1DE6B6A950
SHA256:B70CD6C2CE2A4FB5DFB4C59AAC97E2DCC4C7D3D4041EBBCF096C7FEE461042C8
4776WinRAR.exeC:\Users\admin\Desktop\headshot\src\Dia2Lib.dllexecutable
MD5:BE6474B726207994DECDC22E84936A3C
SHA256:6C4CAC68010FE032218EFE5E9FCF46EEF9F77BFAA5F3BD33F03C5FF77D5A8FAC
4776WinRAR.exeC:\Users\admin\Desktop\headshot\src\Microsoft.Diagnostics.NETCore.Client.dllexecutable
MD5:6874AD9011A17B0AD5BEAE80D55755FE
SHA256:4241A6C0E6CBBD7DBBF330A8CF0209CFC130D27181DBF4BA2E0E102F2C801AD8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
13
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.48.23.147:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1184
headshot_anticheat.exe
104.21.80.1:443
api.headshot.ro
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.147
  • 23.48.23.166
  • 23.48.23.176
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 216.58.212.142
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
api.headshot.ro
  • 104.21.80.1
  • 104.21.32.1
  • 104.21.64.1
  • 104.21.96.1
  • 104.21.16.1
  • 104.21.112.1
  • 104.21.48.1
unknown

Threats

No threats detected
No debug info