File name:

ECUSafe_Cracked.rar

Full analysis: https://app.any.run/tasks/1a548aee-7852-4631-abbe-477258354595
Verdict: Malicious activity
Analysis date: May 02, 2025, 17:15:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
delphi
upx
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

61B5E4DB7A4190C4FECAABA149BB79F5

SHA1:

018D4F0AB33F8848B91A1276FB406B7A898E2ED0

SHA256:

5B888E02A37A1D097AEF2E0562EBEAE16E2B912193892B0E39304D379FE36D64

SSDEEP:

98304:OyCTEKcdTXZMtNYpsdY3dF126y1AtpsnHqDJhVlMGKR07FcGK94z91tiPGGPAS8C:6H+Kj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7000)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7000)
      • ECUsafe2.exe (PID: 3240)
    • Reads the BIOS version

      • ECUsafe2.exe (PID: 3240)
    • Reads Microsoft Outlook installation path

      • ECUsafe2.exe (PID: 3240)
    • There is functionality for taking screenshot (YARA)

      • ECUsafe2.exe (PID: 3240)
    • Reads Internet Explorer settings

      • ECUsafe2.exe (PID: 3240)
  • INFO

    • The sample compiled with swedish language support

      • WinRAR.exe (PID: 7000)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7000)
    • Checks supported languages

      • ECUsafe2.exe (PID: 3240)
    • Manual execution by a user

      • ECUsafe2.exe (PID: 3240)
    • Reads CPU info

      • ECUsafe2.exe (PID: 3240)
    • Reads the computer name

      • ECUsafe2.exe (PID: 3240)
    • Checks proxy server information

      • ECUsafe2.exe (PID: 3240)
    • Creates files or folders in the user directory

      • ECUsafe2.exe (PID: 3240)
    • UPX packer has been detected

      • ECUsafe2.exe (PID: 3240)
    • Compiled with Borland Delphi (YARA)

      • ECUsafe2.exe (PID: 3240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

FileVersion: RAR v4
CompressedSize: 13830
UncompressedSize: 40960
OperatingSystem: Win32
ModifyDate: 2010:05:09 16:49:18
PackingMethod: Normal
ArchivedFileName: ECUSafe-FREE4ALL\dpx_esx.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs ecusafe2.exe

Process information

PID
CMD
Path
Indicators
Parent process
720C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
2284C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3240"C:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked\ECUSafe-FREE4ALL\ECUsafe2.exe" C:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked\ECUSafe-FREE4ALL\ECUsafe2.exe
explorer.exe
User:
admin
Company:
ECUsafe (c) Trygnites
Integrity Level:
MEDIUM
Description:
tryngites.fulvo@gmail.com
Version:
1.9.1.6
Modules
Images
c:\users\admin\appdata\local\temp\ecusafe_cracked\ecusafe-free4all\ecusafe2.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6728"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7000"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
3 631
Read events
3 604
Write events
14
Delete events
13

Modification events

(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked.rar
(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(7000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
2
Suspicious files
4
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7000WinRAR.exeC:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked\ECUSafe-FREE4ALL\licensebinary
MD5:325B32EE818AA3F352569EA70AAA3F23
SHA256:E5F724C07DB58AC5FF48023B8F539B6A9658D1A7395CCFABD93776A73A2D68B6
7000WinRAR.exeC:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked\ECUSafe-FREE4ALL\dp_DD2.datbinary
MD5:54C82E88A6462F6BC18DFABEAF7E1365
SHA256:3B44DB5449B0B957BCDB459AE69A16E71178DBEBC9B20E1DF266034D093278ED
7000WinRAR.exeC:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked\ECUSafe-FREE4ALL\ECUsafe2.exeexecutable
MD5:6CC92AFE50FD50FDFCF156F0892E4C24
SHA256:761ECC49DABD97F25FA70F1137EE2E4E2CB9DE7B3C046B0DA633DF755C4498A9
7000WinRAR.exeC:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked\ECUSafe-FREE4ALL\names_list2.datbinary
MD5:0F3D323D9488267B72602C4631503D5D
SHA256:BC4E7D07C034891BE706BC5AB7E017E058FD7BEC8FC63CFA1C5A37AAA981B8F5
7000WinRAR.exeC:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked\ECUSafe-FREE4ALL\dpx_esx.dllexecutable
MD5:1BD7AF05C05DCFA906A209CF279E2D68
SHA256:D34A218FAEB485D026CD386C539680C5CEAD839A4C9C21CD4374EC3225BD0455
7000WinRAR.exeC:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked\ECUSafe-FREE4ALL\eula.txttext
MD5:CB36AB19375B9E9A3AF1DCA233952063
SHA256:8ADD33E8CD170DDDF8EFD7C6A487861F0F2EC71D1197E0B991584E86A2901EBA
7000WinRAR.exeC:\Users\admin\AppData\Local\Temp\ECUSafe_Cracked\ECUSafe-FREE4ALL\sl_DD2.datbinary
MD5:D8CC2D18481AAB69E404C0EB7EAEBAED
SHA256:54C8259794F79E3038B19E036210C956E724CB6661A3DB3416997064B14470C8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
22
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1184
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1184
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
google.com
  • 142.250.185.78
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.17
  • 20.190.160.14
  • 20.190.160.131
  • 20.190.160.66
  • 40.126.32.134
  • 20.190.160.20
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info