File name:

PBO2.7z

Full analysis: https://app.any.run/tasks/6a54f2f8-040f-46c1-9138-69a75a62de85
Verdict: Malicious activity
Analysis date: June 09, 2025, 01:39:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
inpoutx64-sys
vuln-driver
winring0x64-sys
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

869ADC2864B2FE8569E9B3926BF5B554

SHA1:

53132A650096AA6B2D444CC903BEBA803C95F09D

SHA256:

74243E0CBDD435C3E74F14C79D94ECE5E77F5AC0DF5FFC7215F6C68ACFDB1927

SSDEEP:

12288:b3RKaIv1yAYEu8cgtte4waKCJfsgPa1WWB4y4GJ:rRKPvMAYEu8PtteraKCJfsgPa1WWB4yF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5324)
    • Vulnerable driver has been detected

      • PBO2 _tuner.exe (PID: 6920)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5324)
    • Creates files in the driver directory

      • PBO2 _tuner.exe (PID: 6920)
    • Executable content was dropped or overwritten

      • PBO2 _tuner.exe (PID: 6920)
    • Drops a system driver (possible attempt to evade defenses)

      • PBO2 _tuner.exe (PID: 6920)
  • INFO

    • Checks supported languages

      • PBO2 _tuner.exe (PID: 6920)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5324)
    • Reads the computer name

      • PBO2 _tuner.exe (PID: 6920)
    • The sample compiled with english language support

      • PBO2 _tuner.exe (PID: 6920)
    • Create files in a temporary directory

      • PBO2 _tuner.exe (PID: 6920)
    • The sample compiled with japanese language support

      • PBO2 _tuner.exe (PID: 6920)
    • Reads the machine GUID from the registry

      • PBO2 _tuner.exe (PID: 6920)
    • Reads the software policy settings

      • slui.exe (PID: 6240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2023:01:14 07:58:06+00:00
ArchivedFileName: PBO2
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe pbo2 _tuner.exe no specs THREAT pbo2 _tuner.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2104C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5324"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\PBO2.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6240"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6920"C:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\PBO2 _tuner.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\PBO2 _tuner.exe
WinRAR.exe
User:
admin
Company:
PJVol
Integrity Level:
HIGH
Description:
PBO2 tuning tool for Vermeer Zen3 CPU
Version:
0.9.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa5324.133\pbo2\pbo2 _tuner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7492"C:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\PBO2 _tuner.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\PBO2 _tuner.exeWinRAR.exe
User:
admin
Company:
PJVol
Integrity Level:
MEDIUM
Description:
PBO2 tuning tool for Vermeer Zen3 CPU
Exit code:
3221226540
Version:
0.9.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa5324.133\pbo2\pbo2 _tuner.exe
c:\windows\system32\ntdll.dll
8112C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
6 221
Read events
6 211
Write events
10
Delete events
0

Modification events

(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\PBO2.7z
(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
6
Suspicious files
1
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
5324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\app.configxml
MD5:17BF367A1DC4F191BA7F1041011C74C6
SHA256:9A6193CEFF22B6376DB677E8B7476BD46C4D61A6EDDA01B90FD6A9100AC1778C
5324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\Newtonsoft.Json.xmlxml
MD5:928ED37DB61C1E98A2831C8C01F6157C
SHA256:39F6A4DB1BE658D6BAFF643FA05AAE7809139D9665475BFCA10D37DCA3384F21
5324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\PBO.battext
MD5:632AFABA6A31B90A8AEF650FF472A8C1
SHA256:23AA24D48976B6627B6DC58574EA0DD16C539AAC1D04F60D01C5D747C2A77DEA
5324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\Newtonsoft.Json.dllexecutable
MD5:8F81C9520104B730C25D90A9DD511148
SHA256:F1F01B3474B92D6E1C3D6ADFAE74EE0EA0EBA6E9935565FE2317686D80A2E886
5324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\ZenStates-Core.dllexecutable
MD5:53520D6AC911F259E42032CCDDD82039
SHA256:DC581FD7B2F81145C5985FE07AD1C7E33AF025954A7548BCAE1EBC8C898D2878
6920PBO2 _tuner.exeC:\Windows\System32\drivers\inpoutx64.sysexecutable
MD5:9321A61A25C7961D9F36852ECAA86F55
SHA256:F8965FDCE668692C3785AFA3559159F9A18287BC0D53ABB21902895A8ECF221B
6920PBO2 _tuner.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\ZenStates-Core.sysexecutable
MD5:0C0195C48B6B8582FA6F6373032118DA
SHA256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
5324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\PBO2 _tuner.exeexecutable
MD5:6189D87564582C051A7FF409B5C3EE72
SHA256:6DA1A7589A584BE42FAAC6CD0054AD64F8071D5515467ED4EFE2F9586F0858E5
5324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\PBO2 tuner.exe.configxml
MD5:17BF367A1DC4F191BA7F1041011C74C6
SHA256:9A6193CEFF22B6376DB677E8B7476BD46C4D61A6EDDA01B90FD6A9100AC1778C
5324WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa5324.133\PBO2\inpoutx64.dllexecutable
MD5:AC0C3AE82EC0764C605FA59E7BF05614
SHA256:5F27ED4D5CD58A1EE23DEEB802E09E73F3A1D884CE2135F6E827F67B171269E7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
29
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4528
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4528
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6544
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5408
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.31.67
  • 20.190.159.2
  • 40.126.31.131
  • 40.126.31.2
  • 20.190.159.64
  • 40.126.31.69
  • 20.190.159.71
  • 20.190.159.4
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
google.com
  • 142.250.185.110
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info