File name:

Win-PS2EXE.exe

Full analysis: https://app.any.run/tasks/d7e7e3e0-54da-4373-8f6c-9fdba9be0c4c
Verdict: Malicious activity
Analysis date: June 01, 2025, 17:30:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
susp-attachments
blind-copy
attachments
attc-unc
attc-eml
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

A14CD9701168DC0FD0EDC5D4550330F4

SHA1:

032EBF36E0B57F0A622A6390B000D56E39C5C332

SHA256:

8965FEB0301C9970FA3C867882B51883F72109199703950D9F9F57F0DA3AA261

SSDEEP:

768:4Y7dPDOZdWGazzzLwnmmmmmmmmmmmmrNgOuKY3o3tGkduqVC+Obac9q/fLuU:4Y9GgOuKY3o3tGkduqVC+ObzifLuU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 8028)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 8028)
    • Process drops python dynamic module

      • WinRAR.exe (PID: 8028)
  • INFO

    • Reads the computer name

      • Win-PS2EXE.exe (PID: 1176)
    • Reads the machine GUID from the registry

      • Win-PS2EXE.exe (PID: 1176)
    • Checks supported languages

      • Win-PS2EXE.exe (PID: 1176)
    • Reads the software policy settings

      • slui.exe (PID: 6584)
      • slui.exe (PID: 4008)
    • Manual execution by a user

      • WinRAR.exe (PID: 6132)
      • WinRAR.exe (PID: 8028)
      • WinRAR.exe (PID: 2092)
    • Checks proxy server information

      • slui.exe (PID: 4008)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 8028)
    • The sample compiled with german language support

      • WinRAR.exe (PID: 8028)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 8028)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:09:26 14:30:36+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 26112
InitializedDataSize: 4608
UninitializedDataSize: -
EntryPoint: 0x846e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.1.2
ProductVersionNumber: 1.0.1.2
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Graphical front end to Invoke-PS2EXE
CompanyName: MS
FileDescription: Graphical front end to Invoke-PS2EXE
FileVersion: 1.0.1.2
InternalName: Win-PS2EXE.exe
LegalCopyright: © Markus Scholtes 2023
OriginalFileName: Win-PS2EXE.exe
ProductName: Win-PS2EXE
ProductVersion: 1.0.1.2
AssemblyVersion: 1.0.1.2
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
8
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start win-ps2exe.exe no specs sppextcomobj.exe no specs slui.exe slui.exe winrar.exe no specs winrar.exe rundll32.exe no specs winrar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1176"C:\Users\admin\AppData\Local\Temp\Win-PS2EXE.exe" C:\Users\admin\AppData\Local\Temp\Win-PS2EXE.exeexplorer.exe
User:
admin
Company:
MS
Integrity Level:
MEDIUM
Description:
Graphical front end to Invoke-PS2EXE
Version:
1.0.1.2
Modules
Images
c:\users\admin\appdata\local\temp\win-ps2exe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2092"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\Trillium_Security_MultiSploit_Tool_v6.5.21_Full.rar" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4008C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6072C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
6132"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Trillium_Security_MultiSploit_Tool_v6.5.21_Full.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6584"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msxml6.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\ondemandconnroutehelper.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\webio.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\winnsi.dll
7572C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
8028"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Trillium_Security_MultiSploit_Tool_v6.5.21_Full.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
4 114
Read events
4 078
Write events
36
Delete events
0

Modification events

(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Trillium_Security_MultiSploit_Tool_v6.5.21_Full.rar
(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6132) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
36
Suspicious files
92
Text files
391
Unknown types
0

Dropped files

PID
Process
Filename
Type
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\acledit.battext
MD5:3B33446A78CFF74B5FB4E9A19599D174
SHA256:85CB802D09069E128067E809F25AC0850EC356DE280E67F1DC44469025ECF621
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\csrss.exeexecutable
MD5:0E14E70C14597160AAAEABA06536191D
SHA256:269DD8A318E57E8445D23E76DB7C692B4C670840064168BBD1A221B363B9EE6F
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\pots.vbstext
MD5:9C21C8D0CEB71D1E29552153D26E2B99
SHA256:E64DA7B7D57B7F02677A384D0737D5F95C57A0FD49F07F53E3108DC633035900
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\conhost.exeexecutable
MD5:4964C1751F6DB917B5C285338EFC4687
SHA256:6353B1218561A746BB3E009B611A1945BC2367B4D3FFEF7849D4AF4D369F184C
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\crack.exeexecutable
MD5:0F60E7958CBD9F8BEAC3D89A141D112D
SHA256:BF4788424F6290A3023407D97BDB7CCE3B262B615ABE9D012C1A47FE42EC49B6
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\nhac.vbstext
MD5:5929A32F53268FB5DA65837D95390F05
SHA256:AE1E366C62776646980F0DBA9AE6107A0842827E3FF26A3486F685646BF1A523
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\pnpui.battext
MD5:9EA1BB4FF775243C97272F9FC14F7658
SHA256:FC711EC126E0A47BCF178AFFD6A72A0A65785A608D7EDB85A682150583FC7273
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\TDS_Ocx_Files\MSCOMCTL.OCXexecutable
MD5:F7BBB7D79ADB9E3ADC13F3B3C33D3D4D
SHA256:18A83D7A420A17FCB6F56EB3BA5362C975D32E5DED7553C6FD407F07BDB7B006
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\TDS_Ocx_Files\MSWINSCK.OCXexecutable
MD5:9484C04258830AA3C2F2A70EB041414C
SHA256:BF7E47C16D7E1C0E88534F4EF95E09D0FD821ED1A06B0D95A389B35364B63FF5
8028WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb8028.47508\Trillium Security MultiSploit Tool v6.5.21 Full\TDS_Ocx_Files\Trillium_Security_OCX_Registrator.exeexecutable
MD5:0732C318475AD1197E9B4191B912A514
SHA256:B2E7D11309C60AEF82B52F3244C14BBC999905B6A25EE3E127D55F463C4C2482
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
35
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3096
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3096
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7512
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
7548
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
40.126.31.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
login.live.com
  • 40.126.31.0
  • 20.190.159.75
  • 40.126.31.128
  • 20.190.159.71
  • 40.126.31.69
  • 40.126.31.71
  • 40.126.31.67
  • 20.190.159.68
  • 20.190.159.2
  • 40.126.31.129
  • 20.190.159.130
  • 40.126.31.73
whitelisted
google.com
  • 172.217.23.110
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info