File name:

AppGroup_v1.2.0.win-x64.zip

Full analysis: https://app.any.run/tasks/4bae1c0c-b6a1-4c41-b1b8-8ea3e1fb0196
Verdict: Malicious activity
Analysis date: May 26, 2025, 16:23:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

F68DB09A291D70676851ADF135173D57

SHA1:

9793B43FC7FAACB14DB2E01016B9E6D8A57FA2A2

SHA256:

8F17B5A6EDFF0BF74D1ECA8FFCC8A0B97B2E20F1CABB37B059A7BC575CF97353

SSDEEP:

786432:VqrR6PXIx1ijrA6Uih6MFquEo0Bhi3ushVqB5lKv:srR6PXi1ij06Uih6MFquCBg+sHkKv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6660)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 6660)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6660)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 6660)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 6660)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6660)
    • The sample compiled with arabic language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with bulgarian language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with spanish language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with german language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with french language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with czech language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with japanese language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with Italian language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with korean language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with Indonesian language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with portuguese language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with polish language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with slovak language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with swedish language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with russian language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with turkish language support

      • WinRAR.exe (PID: 6660)
    • The sample compiled with chinese language support

      • WinRAR.exe (PID: 6660)
    • Reads the computer name

      • MpCmdRun.exe (PID: 5568)
    • Checks supported languages

      • MpCmdRun.exe (PID: 5568)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 5568)
    • Checks proxy server information

      • slui.exe (PID: 5960)
    • Reads the software policy settings

      • slui.exe (PID: 5960)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:05:17 13:33:00
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: AppGroup_v1.2.0.win-x64/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2616C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\Rar$Scan33174.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
5568"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
5960C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6660"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\AppGroup_v1.2.0.win-x64.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6760\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 934
Read events
4 925
Write events
9
Delete events
0

Modification events

(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\AppGroup_v1.2.0.win-x64.zip
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\VirusScan
Operation:writeName:DefScanner
Value:
Windows Defender
Executable files
437
Suspicious files
9
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\AppGroup.pdbbinary
MD5:944856E38FA9AED13A1124543208AD34
SHA256:B930D1F4298FF92D347626BE2F596A8893F0626DC595307377CC68FEE6AEFEC2
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\AppGroup.deps.jsonbinary
MD5:AD1BACD177A47CE0CB401730CA65B86A
SHA256:1588DF7F9E803E05CA00741973B25C30969DE54B4B4F8BEC7DCE1AF3DE2E7453
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\af-ZA\Microsoft.UI.Xaml.Phone.dll.muiexecutable
MD5:D973F5932B8CD04EDFE58D538D145386
SHA256:D527AC95E4EEB7464B3E83A8FA33264CD2A2FFE8B63F02F2DB42235F06F3C748
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\am-ET\Microsoft.ui.xaml.dll.muiexecutable
MD5:8A0866BD6918AC1354796704651C0789
SHA256:1BD4F2A272E0E9E089778FD7F6154B8CEB2808DF77FA3EAA28BED56B2A9C7033
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\AppGroup.pngimage
MD5:ECB740A63CEB39F99AC2FE1912459DDC
SHA256:AFC7F5490F1ADD6113438463648DFBE33AB45C3759101D1FD0F40DCF47BEE5A5
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\AppGroup.exeexecutable
MD5:2EBF365383809E8BB021C9E971A0BAA6
SHA256:E38152F9A0F6236B6EB72C2A24B1C336C6FA9DF547B913E35E8A5F7ECB6B82ED
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\AppGroupBackground.exeexecutable
MD5:3AA383F95DF5401B3A8DA724C4AA00A1
SHA256:5C1C8A2294C6BC8B8628224BD1B36620767B340A61EEEE46388E53DDB584647C
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\am-ET\Microsoft.UI.Xaml.Phone.dll.muiexecutable
MD5:960EFF650E4246EDDDFB619313C82541
SHA256:39B993F2DC9E2C0C6608A8062A679E98C6B3CCA407CE11A49CA08626024455F9
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\AppGroup.icoimage
MD5:D0B6B9AD457D1F8A97A170B963051141
SHA256:7C7F7AA1A1DA2C898F8241F2F414C056B363BB1B3E094CC34AD9FA9C3C19EC07
6660WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6660.48345\AppGroup_v1.2.0.win-x64.zip\AppGroup_v1.2.0.win-x64\AppGroupBackground.dllexecutable
MD5:0C150189864F50D2277EBC037E56E655
SHA256:69C2DE03429B50AD517555547EBF96A01F04F9DE9A686BAED03A339F9BC0455E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
37
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5796
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5796
svchost.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
200
20.190.159.0:443
https://login.live.com/RST2.srf
unknown
xml
11.0 Kb
whitelisted
POST
200
40.126.31.131:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
52.149.20.212:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
GET
304
52.149.20.212:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
GET
200
13.85.23.206:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5796
svchost.exe
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
5796
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5344
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
  • 20.83.72.98
whitelisted
login.live.com
  • 40.126.32.138
  • 40.126.32.136
  • 20.190.160.130
  • 40.126.32.134
  • 40.126.32.74
  • 20.190.160.131
  • 40.126.32.68
  • 20.190.160.20
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info