File name:

EzExploit Latest.zip

Full analysis: https://app.any.run/tasks/3641f97c-1955-4b47-ba37-4a618647ea6d
Verdict: Malicious activity
Analysis date: July 05, 2025, 23:44:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
java
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

5996C2043B7521C8E597C835A9AF9185

SHA1:

C353EF679FDF9DCB51CD4D20F7EA7BB49A03B9F9

SHA256:

5A5EC4036808E7CA225BA397729B98B5CA4D1E8073B05E650CF50E53A66B7E2E

SSDEEP:

12288:CludmdD3o5EDN8mDDt9Dl0HwcLDxbE0DTsvLEydq:2udID3o5EDNjDt9DlywcDxbE0DTdn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7052)
  • SUSPICIOUS

    • Checks for Java to be installed

      • java.exe (PID: 1036)
      • java.exe (PID: 4860)
      • java.exe (PID: 4808)
      • java.exe (PID: 856)
  • INFO

    • Manual execution by a user

      • cmd.exe (PID: 4572)
      • cmd.exe (PID: 2428)
      • cmd.exe (PID: 7136)
      • cmd.exe (PID: 4552)
    • Create files in a temporary directory

      • java.exe (PID: 1036)
      • java.exe (PID: 4860)
      • java.exe (PID: 4808)
      • javaw.exe (PID: 1216)
      • java.exe (PID: 856)
    • Checks supported languages

      • java.exe (PID: 1036)
      • java.exe (PID: 4860)
      • java.exe (PID: 4808)
      • javaw.exe (PID: 1216)
      • java.exe (PID: 856)
    • Creates files in the program directory

      • java.exe (PID: 1036)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 5552)
    • Reads security settings of Internet Explorer

      • OpenWith.exe (PID: 5552)
    • Application based on Java

      • javaw.exe (PID: 1216)
    • Reads the computer name

      • javaw.exe (PID: 1216)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:04:15 20:29:38
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: EzExploit Latest/EzExploit/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
155
Monitored processes
19
Malicious processes
4
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe no specs rundll32.exe no specs cmd.exe no specs conhost.exe no specs java.exe no specs icacls.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs java.exe no specs cmd.exe no specs conhost.exe no specs java.exe no specs openwith.exe no specs javaw.exe no specs cmd.exe no specs conhost.exe no specs java.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
856java -jar snapshot.jarC:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_2989500\java.execmd.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
8.0.2710.9
Modules
Images
c:\program files (x86)\common files\oracle\java\javapath_target_2989500\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1036java -jar snapshot.jarC:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_2989500\java.execmd.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
8.0.2710.9
Modules
Images
c:\program files (x86)\common files\oracle\java\javapath_target_2989500\java.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1132\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1216"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar "C:\Users\admin\Desktop\EzExploit Latest\EzExploit\snapshot.jar" C:\Program Files\Java\jre1.8.0_271\bin\javaw.exeOpenWith.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1700\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2040C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2428C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\EzExploit Latest\EzExploit\start.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
2648\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4552C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\EzExploit Latest\EzExploit\start.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
4572C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\EzExploit Latest\EzExploit\start.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
Total events
7 609
Read events
7 596
Write events
13
Delete events
0

Modification events

(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\EzExploit Latest.zip
(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(7052) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
Executable files
8
Suspicious files
1
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\config.ymltext
MD5:6231121A75F5D415FDC54C9E50DA3B1F
SHA256:FB6EC7C1A4B05F4F0725580156EA053ECE1C4730FE525FA60B4A897A4A549565
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\cmd_list.jarjava
MD5:E3F0B6C0FF5ECED03B00C2AEA5B19916
SHA256:008F4D48845C1CC12243FBF0BB8023CD42F2627CA9850FFE237FAD51920A7973
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\espr\VdsPro.jarcompressed
MD5:49322DFBB0BEAED49C9DC64C94924FB0
SHA256:B1BA51E4D0A434601B25CEA274E01D35085FF7D3422B58DCABCF6B0606A5089F
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\espr\RconFix.jarjava
MD5:BB0199FAD177D12AC638D2DA61F9A4DF
SHA256:87E3C42B1CDBA0B17983EE04ED656D94EBC2101923F4BA4F6DD96DEA83705751
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\reconnect_yaml.jarjava
MD5:0832D6ABFFA9AF5A2ABFDFE389626A93
SHA256:0F21068F22BC3BA87F598E417E1FFB6EA8A6886B44A0E16350045F5476C87731
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\cmd_alert.jarjava
MD5:3053817C36BD1DFA1CE52C303D1328E6
SHA256:56E2A960F11637F31DC30D652532950E834161D2AB36A10C0C57C9E445F8DACE
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\java\net\md_5\bungee\module\cmd\server\CommandServer.javatext
MD5:6E40F8CCD6CE7BEAD2376C595B86DB87
SHA256:EDC15FA70BC5604A75286885B91D481B098401A8A08CBDCED747FCCCEDD3D1C9
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\java\net\md_5\bungee\module\cmd\server\PluginServer.javatext
MD5:51889CCEE78F54E288B1B123574263A6
SHA256:9C62C485CDAA6E9CBFF1DC7E56097678BEB62B8CF394A94C1275002F3E29D8ED
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\cmd_server.jarjava
MD5:A958A700C64F3B6C07BB0E5183B37807
SHA256:A25B5B1C4EB732C149BBB070B97C9C60E2ACBB66916BFBA41D24378745282B6F
7052WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7052.41888\EzExploit Latest\EzExploit\libraries\cmd_send.jarjava
MD5:B06755DEDD8D7D81F80C17013C47B16E
SHA256:5002C806A46F7736B85FB6ED1ECB7E555A8A284C01752CB3C6F58EBF4F6E34F6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.55.104.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7060
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2180
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2180
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5708
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.55.104.172:80
crl.microsoft.com
Akamai International B.V.
US
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
7060
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7060
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.55.104.172
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.130
  • 20.190.159.4
  • 20.190.159.23
  • 20.190.159.0
  • 20.190.159.131
  • 20.190.159.2
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted

Threats

No threats detected
No debug info