File name:

Release.zip

Full analysis: https://app.any.run/tasks/209a24a8-0fd9-4d4a-bda6-0c9a79003a3e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: July 08, 2025, 16:31:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
loader
iqvw64e-sys
vuln-driver
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

6B727DF522DF66EB8EE0A79218B10E37

SHA1:

72FBBE3CD73515DFDC229A2B1688562625092B35

SHA256:

81B7C12306ABC4B59BCC1F946975D6E03E74EC78C3A1D4803A211D8A70EDF0CA

SSDEEP:

6144:TKCWUxkndiLwKvBO4Al2I78wJ34XveSP4GuAtEPXif5O1fUrl:TPBx0iLwKvBO4m2IgwJXSSAtffOcrl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6240)
    • Vulnerable driver has been detected

      • mapper.exe (PID: 5928)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • Temp base.exe (PID: 6260)
    • Hides command output

      • cmd.exe (PID: 3620)
      • cmd.exe (PID: 2764)
      • cmd.exe (PID: 3632)
      • cmd.exe (PID: 3752)
      • cmd.exe (PID: 7000)
      • cmd.exe (PID: 2212)
    • Execution of CURL command

      • Temp base.exe (PID: 6260)
    • Executing commands from a ".bat" file

      • Temp base.exe (PID: 6260)
    • Reads the date of Windows installation

      • Temp base.exe (PID: 6260)
    • Reads security settings of Internet Explorer

      • Temp base.exe (PID: 6260)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 2512)
      • WMIC.exe (PID: 2696)
    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 4880)
    • Accesses video controller name via WMI (SCRIPT)

      • WMIC.exe (PID: 6372)
    • Accesses computer name via WMI (SCRIPT)

      • WMIC.exe (PID: 6372)
    • Uses WMIC.EXE to obtain memory chip information

      • cmd.exe (PID: 4880)
    • Uses WMIC.EXE to obtain CPU information

      • cmd.exe (PID: 4880)
    • Uses WMIC.EXE to obtain physical disk drive information

      • cmd.exe (PID: 4880)
    • Uses WMIC.EXE to obtain data on the base board management (motherboard or system board)

      • cmd.exe (PID: 4880)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 4880)
    • Executable content was dropped or overwritten

      • curl.exe (PID: 4040)
      • curl.exe (PID: 5548)
      • mapper.exe (PID: 5928)
    • Drops a system driver (possible attempt to evade defenses)

      • curl.exe (PID: 4040)
    • Process requests binary or script from the Internet

      • curl.exe (PID: 5548)
    • Potential Corporate Privacy Violation

      • curl.exe (PID: 5548)
    • Uses WMIC.EXE to obtain network information

      • cmd.exe (PID: 4880)
    • Stops a currently running service

      • sc.exe (PID: 1232)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 3752)
      • cmd.exe (PID: 2212)
    • Windows service management via SC.EXE

      • sc.exe (PID: 6376)
    • Creates or modifies Windows services

      • mapper.exe (PID: 5928)
  • INFO

    • Manual execution by a user

      • Temp base.exe (PID: 3876)
      • Temp base.exe (PID: 6260)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6240)
    • Reads the computer name

      • Temp base.exe (PID: 6260)
      • curl.exe (PID: 4844)
      • curl.exe (PID: 4040)
      • curl.exe (PID: 5548)
    • Checks supported languages

      • Temp base.exe (PID: 6260)
      • curl.exe (PID: 4844)
      • mode.com (PID: 7000)
      • curl.exe (PID: 5548)
      • curl.exe (PID: 4040)
      • mapper.exe (PID: 5928)
    • Execution of CURL command

      • cmd.exe (PID: 3620)
      • cmd.exe (PID: 3632)
      • cmd.exe (PID: 2764)
    • Process checks computer location settings

      • Temp base.exe (PID: 6260)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 7000)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 2072)
      • WMIC.exe (PID: 2512)
      • WMIC.exe (PID: 2160)
      • WMIC.exe (PID: 6372)
      • WMIC.exe (PID: 2696)
      • WMIC.exe (PID: 1564)
      • WMIC.exe (PID: 7160)
      • WMIC.exe (PID: 756)
    • Create files in a temporary directory

      • mapper.exe (PID: 5928)
    • The sample compiled with english language support

      • mapper.exe (PID: 5928)
    • Checks proxy server information

      • slui.exe (PID: 3636)
    • Reads the software policy settings

      • slui.exe (PID: 3636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:07:08 18:30:50
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Release/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
171
Monitored processes
37
Malicious processes
2
Suspicious processes
6

Behavior graph

Click at the process to see the details
start winrar.exe no specs rundll32.exe no specs temp base.exe no specs temp base.exe cmd.exe no specs conhost.exe no specs curl.exe cmd.exe no specs conhost.exe no specs mode.com no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs slui.exe cmd.exe no specs conhost.exe no specs curl.exe cmd.exe no specs conhost.exe no specs curl.exe cmd.exe no specs conhost.exe no specs mapper.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
756wmic path Win32_NetworkAdapter where "PNPDeviceID like '%PCI%' AND NetConnectionStatus=2 AND AdapterTypeID='0'" get MacAddressC:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
1232sc stop iqvw64e C:\Windows\System32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
1564wmic diskdrive get serialnumberC:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
1632"C:\Windows\System32\cmd.exe" /k ""C:\Windows\System32\mapper.exe" "C:\Windows\System32\Driver.sys" & echo. & echo ========== [LamaSpoofer] Mapping Finished ==========& pause"C:\Windows\System32\cmd.exeTemp base.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1636\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1740\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2032\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2072wmic baseboard get serialnumberC:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
2160wmic memorychip get serialnumberC:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
Total events
9 799
Read events
9 760
Write events
25
Delete events
14

Modification events

(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Release.zip
(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6240) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
4
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
6240WinRAR.exeC:\Users\admin\Desktop\Release\imgui.initext
MD5:9B1539431B2AD1B386B275252E9CCE51
SHA256:24CB6F9AB027B03A7CB0D155FF245C37A55C17C525AD3D3A6C4351B4FEFB6AD7
5548curl.exeC:\Windows\System32\mapper.exeexecutable
MD5:A3395163AC66E65A392B59E87A79499D
SHA256:F34BFACD3A6CBFF4E9964A7C9739B5F74417BED6D5A8DDCAE8A2D0519CABAA84
5928mapper.exeC:\Users\admin\AppData\Local\Temp\nTxewYEwEtxfxnZXexecutable
MD5:1898CEDA3247213C084F43637EF163B3
SHA256:4429F32DB1CC70567919D7D47B844A91CF1329A6CD116F582305F3B7B60CD60B
4040curl.exeC:\Windows\System32\Driver.sysexecutable
MD5:2D068886EEF3C2E7235525BAA276ADF2
SHA256:6CE01851361B94A05EDC7DAEBA510D3CBB884B5AF6D541C2B11BFC1D2F77F954
6240WinRAR.exeC:\Users\admin\Desktop\Release\Temp base.exeexecutable
MD5:08D72BB7D7C719E4F2D0BB7825C7FB35
SHA256:1079EC1388FCA1AD197E1269E6928AB5F80DC8B98102C3B80EF4B3A0BB0323D3
6240WinRAR.exeC:\Users\admin\Desktop\Release\serialsold.txttext
MD5:C6E1C8437D13948B45AE91E92DBCA772
SHA256:6D7995AAD9974118B7DFB416368D41CE9FBD2C9F71BBDBBD9DC071CC6D012080
4844curl.exeC:\Windows\System32\checker.battext
MD5:119A816FB17E3C634DEDA5FA650BBB50
SHA256:8E04607E18F90A99E360F4BFFE37102B20006143859C87AE845694512B41094F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
26
DNS requests
20
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7060
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3572
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3572
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
764
lsass.exe
GET
200
104.18.20.213:80
http://e5.c.lencr.org/115.crl
unknown
whitelisted
5548
curl.exe
GET
200
217.160.0.24:80
http://velocity.rip/kdmapper.exe
unknown
unknown
2940
svchost.exe
GET
200
2.23.197.184:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4100
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
1268
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
7060
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7060
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 23.35.229.160
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.71
  • 40.126.31.129
  • 20.190.159.75
  • 20.190.159.130
  • 40.126.31.73
  • 40.126.31.0
  • 20.190.159.4
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
files.catbox.moe
  • 108.181.20.35
malicious

Threats

PID
Process
Class
Message
4844
curl.exe
Potentially Bad Traffic
ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI)
4040
curl.exe
Potentially Bad Traffic
ET INFO Observed File Sharing Service Download Domain (files .catbox .moe in TLS SNI)
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
5548
curl.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
5548
curl.exe
Misc activity
ET INFO Packed Executable Download
No debug info