File name:

18-06-2025_gUmEIDW4wUo3Gfy.zip

Full analysis: https://app.any.run/tasks/e4d459e4-b60d-4a54-8ef1-bdd4ea2206f7
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 18, 2025, 16:57:51
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

80FF314B769E235A812ECEED02463B39

SHA1:

5B496558C7C7919358CB19C21A9B9FDE87A6CFAC

SHA256:

8F8AF378B387B3E49766215450C51932F0AE0566D8AB88F8EDDB7B08E0984337

SSDEEP:

192:ZUCS0aWJ+tkDStVaGhmPIgTlNV6p3gsZWwePzBhUfRmB+WOET:ZUCS0SfaHdlYQKWwetPT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6584)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
      • WinRAR.exe (PID: 6584)
    • Reads the date of Windows installation

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
    • The process creates files with name similar to system file names

      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 6584)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 6584)
  • INFO

    • Manual execution by a user

      • firefox.exe (PID: 1760)
      • firefox.exe (PID: 7052)
      • notepad.exe (PID: 4580)
    • Checks proxy server information

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
      • slui.exe (PID: 5628)
    • Reads the computer name

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
      • MpCmdRun.exe (PID: 1564)
    • Reads the machine GUID from the registry

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
    • Creates files or folders in the user directory

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
    • Reads the software policy settings

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
    • Checks supported languages

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
      • MpCmdRun.exe (PID: 1564)
    • Process checks computer location settings

      • firefox.exe (PID: 1760)
      • VsGraphicsResou‎r‎ces.exe (PID: 5416)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 4580)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 1564)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6584)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:05:23 07:02:28
ZipCRC: 0x995ed311
ZipCompressedSize: 120
ZipUncompressedSize: 146
ZipFileName: ReadMe.txt
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
10
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe firefox.exe no specs firefox.exe notepad.exe no specs vsgraphicsresou‎r‎ces.exe svchost.exe no specs slui.exe cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1564"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR6584.24072"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
1760"C:\Users\admin\Desktop\firefox.exe" C:\Users\admin\Desktop\firefox.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
4040\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4156C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR6584.24072\Rar$Scan50012.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
4580"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\ReadMe.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
4836"C:\Windows\security\database\svchost.exe" C:\Windows\security\database\svchost.exeVsGraphicsResou‎r‎ces.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225781
Modules
Images
c:\windows\security\database\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5416"C:\Windows\prefetch\VsGraphicsResou‎r‎ces.exe" C:\Windows\Prefetch\VsGraphicsResou‎r‎ces.exe
firefox.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\prefetch\vsgraphicsresou‎r‎ces.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
5628C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6584"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\18-06-2025_gUmEIDW4wUo3Gfy.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7052"C:\Users\admin\Desktop\firefox.exe" C:\Users\admin\Desktop\firefox.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\firefox.exe
c:\windows\system32\ntdll.dll
Total events
13 123
Read events
13 108
Write events
15
Delete events
0

Modification events

(PID) Process:(6584) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6584) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6584) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6584) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\18-06-2025_gUmEIDW4wUo3Gfy.zip
(PID) Process:(6584) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6584) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6584) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6584) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1760) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1760) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
7
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
5416VsGraphicsResou‎r‎ces.exeC:\Windows\security\database\VMProtectSDK64.dllexecutable
MD5:BA5CF8079FA68D90A2E6497D3C5711C1
SHA256:AE22254E2B5C5557F35A170696D53E847018221DCD4CC70C153C36ECDD891F81
1760firefox.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\msedge[1].exeexecutable
MD5:9EACFCCF5993E8D54120BBF8737EC772
SHA256:8C4CF00EA866D9D520B56AD65EA6582754630F33E94AA94001E71E3ED8382B54
5416VsGraphicsResou‎r‎ces.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\VMProtectSDK64[1].dllexecutable
MD5:BA5CF8079FA68D90A2E6497D3C5711C1
SHA256:AE22254E2B5C5557F35A170696D53E847018221DCD4CC70C153C36ECDD891F81
1760firefox.exeC:\Windows\Prefetch\VsGraphicsResou‎r‎ces.exeexecutable
MD5:9EACFCCF5993E8D54120BBF8737EC772
SHA256:8C4CF00EA866D9D520B56AD65EA6582754630F33E94AA94001E71E3ED8382B54
6584WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6584.24072\18-06-2025_gUmEIDW4wUo3Gfy.zip\ReadMe.txttext
MD5:FF372680E95ABE08ED4F38B0516C90C6
SHA256:9B266828DE1B21A40B23ABB2BDAFE18AA94AD3F931FC04E085223423C9B369A7
5416VsGraphicsResou‎r‎ces.exeC:\Windows\security\database\svchost.exeexecutable
MD5:651D12BD2E79184A13A73BF05A630F3C
SHA256:02903BD6332267C5408C4A7D882F16CED81406E275A9DAC841B0534B92F0C2A5
6584WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6584.24072\Rar$Scan50012.battext
MD5:275CBFE866E4BDC62270F8C19B642DA9
SHA256:DAFBAE3D4380A566571294106E344BB3CDF225C39B4E9122C2EC09AB481AD851
5416VsGraphicsResou‎r‎ces.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\monetsches[1].exeexecutable
MD5:651D12BD2E79184A13A73BF05A630F3C
SHA256:02903BD6332267C5408C4A7D882F16CED81406E275A9DAC841B0534B92F0C2A5
1564MpCmdRun.exeC:\Users\admin\AppData\Local\Temp\MpCmdRun.logtext
MD5:54A71587C4F0DDC0078324DA66DFC243
SHA256:A46815CED8E77CD3DD08573E16365993E7845E4BDAFFD537A4C2A90661980E91
6584WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6584.24072\18-06-2025_gUmEIDW4wUo3Gfy.zip\firefox.exeexecutable
MD5:4017098A9CFC58A5194666BA3AD97FC2
SHA256:4657C84913AEFC05A44A6F66943AE6798FC91984F31471E4FBC6595B070FAAB3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
22
DNS requests
8
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6876
RUXIMICS.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6876
RUXIMICS.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
216.198.79.129:443
https://exot1c.vercel.app/kxz-free/idk/msedge.exe
unknown
executable
16.0 Kb
GET
200
64.29.17.129:443
https://exot1c.vercel.app/kxz-free/idk/monetsches.exe
unknown
executable
2.38 Mb
GET
200
216.198.79.129:443
https://exot1c.vercel.app/kxz-free/idk/VMProtectSDK64.dll
unknown
executable
116 Kb
2940
svchost.exe
GET
200
2.16.252.233:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6876
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
1268
svchost.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
6876
RUXIMICS.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
1268
svchost.exe
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5944
MoUsoCoreWorker.exe
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
exot1c.vercel.app
  • 216.198.79.129
  • 64.29.17.129
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
x1.c.lencr.org
  • 2.16.252.233
whitelisted
self.events.data.microsoft.com
  • 52.182.143.213
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud infrastructure to build app (vercel .app)
Misc activity
ET INFO Observed UA-CPU Header
Misc activity
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
Misc activity
ET INFO Packed Executable Download
Misc activity
ET INFO EXE - Served Inline HTTP
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Inline HTTP
No debug info