File name:

PS3Dec Simple GUI 1.16.zip

Full analysis: https://app.any.run/tasks/b296e8c7-a24f-482e-aa4c-afae86479876
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 14, 2025, 22:51:58
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autohotkey
ahk
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

BE1E1159E86C9EBB1F12655ECA772FB9

SHA1:

16BC1237F08F4EC7E8F3C1960D871B34DE7E888D

SHA256:

6FD24EB52B2BD8B24089D2F8BC1DD0C37DDCC50BDE99FCEEC8ED4B0D85B02188

SSDEEP:

49152:JrBuaeBipSBdGxa6EkaUtVLUDayi/I6qFg2SZ8Auo0p7gr3x33I:JKcSdGxa6UuViaB/Oq2SZ8AuoFR3I

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AHK has been detected (YARA)

      • PS3Dec Simple GUI.exe (PID: 7220)
      • PS3Dec Simple GUI.exe (PID: 3240)
  • SUSPICIOUS

    • AUTOHOTKEY mutex has been found

      • PS3Dec Simple GUI.exe (PID: 7220)
      • PS3Dec Simple GUI.exe (PID: 5332)
      • PS3Dec Simple GUI.exe (PID: 3240)
    • Executable content was dropped or overwritten

      • PS3Dec Simple GUI.exe (PID: 7220)
    • There is functionality for taking screenshot (YARA)

      • PS3Dec Simple GUI.exe (PID: 7220)
      • PS3Dec Simple GUI.exe (PID: 3240)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 7324)
  • INFO

    • Reads the software policy settings

      • slui.exe (PID: 7508)
      • slui.exe (PID: 7208)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 7324)
    • Manual execution by a user

      • PS3Dec Simple GUI.exe (PID: 7220)
      • PS3Dec Simple GUI.exe (PID: 5332)
      • PS3Dec Simple GUI.exe (PID: 3240)
    • Checks supported languages

      • PS3Dec Simple GUI.exe (PID: 7220)
      • PS3Dec Simple GUI.exe (PID: 5332)
      • PS3Dec Simple GUI.exe (PID: 3240)
    • Reads the computer name

      • PS3Dec Simple GUI.exe (PID: 7220)
      • PS3Dec Simple GUI.exe (PID: 5332)
      • PS3Dec Simple GUI.exe (PID: 3240)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7324)
    • Detects AutoHotkey samples (YARA)

      • PS3Dec Simple GUI.exe (PID: 7220)
      • PS3Dec Simple GUI.exe (PID: 3240)
    • Checks proxy server information

      • slui.exe (PID: 7208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2023:07:04 18:13:56
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: PS3Dec Simple GUI 1.16/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
7
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe #AUTOHOTKEY ps3dec simple gui.exe slui.exe #AUTOHOTKEY ps3dec simple gui.exe no specs #AUTOHOTKEY ps3dec simple gui.exe

Process information

PID
CMD
Path
Indicators
Parent process
3240"C:\Users\admin\Desktop\PS3Dec Simple GUI.exe" C:\Users\admin\Desktop\PS3Dec Simple GUI.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.1.24.01
Modules
Images
c:\users\admin\desktop\ps3dec simple gui.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
5332"C:\Users\admin\Desktop\PS3Dec Simple GUI.exe" C:\Users\admin\Desktop\PS3Dec Simple GUI.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.1.24.01
Modules
Images
c:\users\admin\desktop\ps3dec simple gui.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
7208C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7220"C:\Users\admin\Desktop\PS3Dec Simple GUI.exe" C:\Users\admin\Desktop\PS3Dec Simple GUI.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.1.24.01
Modules
Images
c:\users\admin\desktop\ps3dec simple gui.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7324"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\PS3Dec Simple GUI 1.16.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7472C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7508"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 926
Read events
2 918
Write events
8
Delete events
0

Modification events

(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\PS3Dec Simple GUI 1.16.zip
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
5
Suspicious files
1
Text files
1 356
Unknown types
0

Dropped files

PID
Process
Filename
Type
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\007 - Blood Stone (Japan).dkeytext
MD5:D2A1631EC6B985A7C2C77B56D05F5655
SHA256:308642D37ACA7A52B68A8A28E5F117FD196E8B3F35741D638346811DFA5EE7F4
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\'&' - Sora no Mukou de Sakimasu You ni (Japan).dkeytext
MD5:24460E8A22F521424B06D31D69E8D3C9
SHA256:682A5908EE2A1FB569ADA9E659DD829FAF987EDF63BB0A5996EC4B77E856C915
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\007 - Quantum of Solace (USA) (En,Fr).dkeytext
MD5:4262822B6E99382A8012EE0D4E4320E9
SHA256:08244E6ECB367B9B8A27A50B99FBF4EC101170B8CD057F0BD772D70EBAEAF08B
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\007 Legends (Europe) (En,Fr,De).dkeytext
MD5:F398FCF949F8D8DF4D0A9DEA060D7F82
SHA256:15F3A0E085FE377EC00F7FEED3E9C2A31738CE450A8B5358C51F97BE43F241DB
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\007 - Kvant Miloserdiya (Russia).dkeytext
MD5:52CB74E611E9AD10700D450444D9BA51
SHA256:8D5C4B8306D095CB280D8FCB99B49E640BFE6B420E0B03933457B5F08D424112
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\007 - Blood Stone (USA) (En,Fr).dkeytext
MD5:F087776B801FE49BA347E25AEE2C2654
SHA256:0A2127380DB289210B1F634C6421B7C5C763706C29C6EDF36830CDB5FCAA43B0
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\007 Legends (Russia).dkeytext
MD5:06070E7C7D0F77C752BA9304F9F52BC4
SHA256:A572331D5F41FA427EE70B2E41C8C2B192162358E5F9BE08A6DA88D54814DB5A
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\007 Legends (USA) (En,Fr).dkeytext
MD5:626BF53CB51296C3532A69B6E6A9E398
SHA256:1F2AD64DB5017521BEFD6D4049A25A47A01F174EC5041CDA11CADBF5DBFBE90C
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\2010 FIFA World Cup South Africa (Europe) (En,Fr,De,Es,It,Nl).dkeytext
MD5:8F08E4FFE1262C7681A7C40E7AC81FE4
SHA256:93EA2DFCE1AB661EC78666E350ACBE7CFF059C765875191C9CB769AEB4C21376
7324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7324.44058\PS3Dec Simple GUI 1.16\DKeys\2010 FIFA World Cup - Minami Africa Taikai (Japan).dkeytext
MD5:70F75864529133A51082879F15A1D450
SHA256:FBA6C76AF73565043045FAF190F0925C1A693125418C75B82FA2A46CF0320901
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
23
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:137
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7984
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.128
  • 40.126.31.0
  • 20.190.159.64
  • 40.126.31.67
  • 40.126.31.73
  • 40.126.31.128
  • 40.126.31.71
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info