download:

/LJ9859/Malware-Database/raw/refs/heads/main/Fake-AVs/Win7Recovery.zip

Full analysis: https://app.any.run/tasks/891e0136-ebc5-411c-a9be-096058f13f7e
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 01, 2026, 05:56:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
adware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

E232D17CDCB2EB797C1B347460C91C00

SHA1:

3315A09EC7ECDCF1D9741FBDB7B0F33DE4D696CC

SHA256:

C106EF25EA429B93B181670A32BC249108769B1339593F01E9CB8FAB62F3FC83

SSDEEP:

12288:wiCboN9HBu55m71qwoTbA3iR34erLskRfX0AH8+8LKI9yD0fymQ9jiwmaUklj8:wiCboN9huHm71q5+s4erQkRfX78+8LK8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Win7Recovery.exe (PID: 1504)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • Win7Recovery.exe (PID: 1504)
    • Starts itself from another location

      • Win7Recovery.exe (PID: 1504)
    • Reads the Internet Settings

      • Win7Recovery.exe (PID: 1504)
    • Creates file in the systems drive root

      • ntvdm.exe (PID: 996)
    • Access to an unwanted program domain was detected

      • Win7Recovery.exe (PID: 1504)
  • INFO

    • Manual execution by a user

      • Win7Recovery.exe (PID: 1504)
    • Reads the computer name

      • Win7Recovery.exe (PID: 1504)
    • Checks supported languages

      • Win7Recovery.exe (PID: 1504)
      • WbVhxCIDDK.exe (PID: 2420)
    • Launching a file from a Registry key

      • Win7Recovery.exe (PID: 1504)
    • Reads the machine GUID from the registry

      • Win7Recovery.exe (PID: 1504)
    • Reads security settings of Internet Explorer

      • Win7Recovery.exe (PID: 1504)
    • Create files in a temporary directory

      • Win7Recovery.exe (PID: 1504)
    • UPX packer has been detected

      • Win7Recovery.exe (PID: 1504)
      • WbVhxCIDDK.exe (PID: 2420)
    • Creates files or folders in the user directory

      • Win7Recovery.exe (PID: 1504)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2011:05:27 14:38:58
ZipCRC: 0xb5168f4f
ZipCompressedSize: 410935
ZipUncompressedSize: 478720
ZipFileName: Win7Recovery.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs win7recovery.exe wbvhxciddk.exe no specs csrstub.exe ntvdm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
996"C:\Windows\system32\ntvdm.exe" -i1 C:\Windows\System32\ntvdm.execsrstub.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
NTVDM.EXE
Exit code:
255
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntvdm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1504"C:\Users\admin\Desktop\Win7Recovery.exe" C:\Users\admin\Desktop\Win7Recovery.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
GDI Client DLL
Exit code:
0
Version:
5.1.2600.5698 (xpsp_sp3_gdr.081022-1932)
Modules
Images
c:\users\admin\desktop\win7recovery.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1900"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Win7Recovery.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2420"C:\ProgramData\WbVhxCIDDK.exe" C:\ProgramData\WbVhxCIDDK.exeWin7Recovery.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
GDI Client DLL
Version:
5.1.2600.5698 (xpsp_sp3_gdr.081022-1932)
Modules
Images
c:\programdata\wbvhxciddk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2588C:\Windows\system32\csrstub.exe 67636244 -P "C:\Users\admin\AppData\Local\Temp\Adobe_Flash_Player.exe" C:\Windows\System32\csrstub.exe
Win7Recovery.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
allows lua to launch 16-bit applications
Exit code:
255
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\csrstub.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ntvdm.exe
Total events
4 227
Read events
4 132
Write events
83
Delete events
12

Modification events

(PID) Process:(1900) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1900) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1900) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1900) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1900) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1900) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1900) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1900) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1900) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(1900) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
Executable files
0
Suspicious files
0
Text files
0
Unknown types
7

Dropped files

PID
Process
Filename
Type
1504Win7Recovery.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\531-direct[1].htmbinary
MD5:E89F75F918DBDCEE28604D4E09DD71D7
SHA256:6DC9C7FC93BB488BB0520A6C780A8D3C0FB5486A4711ACA49B4C53FAC7393023
1900WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1900.14090\Win7Recovery.exebinary
MD5:AB65E866ABC51F841465D19ABA35FB14
SHA256:2AC0CA4FFDA10B1861DD4AE0C2F0131A6400214CB4F5FA33951F3062B784A755
1504Win7Recovery.exeC:\ProgramData\WbVhxCIDDK.exebinary
MD5:AB65E866ABC51F841465D19ABA35FB14
SHA256:2AC0CA4FFDA10B1861DD4AE0C2F0131A6400214CB4F5FA33951F3062B784A755
996ntvdm.exeC:\Users\admin\AppData\Local\Temp\scs41B5.tmpbinary
MD5:4C361DEA398F7AEEF49953BDC0AB4A9B
SHA256:06D61C23E6CA59B9DDAD1796ECCC42C032CD8F6F424AF6CFEE5D085D36FF7DFD
1504Win7Recovery.exeC:\Users\admin\AppData\Local\Temp\Adobe_Flash_Player.exebinary
MD5:E89F75F918DBDCEE28604D4E09DD71D7
SHA256:6DC9C7FC93BB488BB0520A6C780A8D3C0FB5486A4711ACA49B4C53FAC7393023
1504Win7Recovery.exeC:\Users\admin\AppData\Local\Temp\tmp4137.tmpbinary
MD5:AB65E866ABC51F841465D19ABA35FB14
SHA256:2AC0CA4FFDA10B1861DD4AE0C2F0131A6400214CB4F5FA33951F3062B784A755
996ntvdm.exeC:\Users\admin\AppData\Local\Temp\scs4195.tmpbinary
MD5:8CF6DDB5AA59B49F34B967CD46F013B6
SHA256:EE06792197C3E025B84860A72460EAF628C66637685F8C52C5A08A9CC35D376C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
6
DNS requests
8
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1504
Win7Recovery.exe
GET
200
3.33.130.190:80
http://clickfer.org/pica1/531-direct
US
binary
114 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
1092
svchost.exe
224.0.0.252:5355
whitelisted
1504
Win7Recovery.exe
3.33.130.190:80
clickfer.org
AMAZON-02
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.251.20.139
  • 142.251.20.138
  • 142.251.20.102
  • 142.251.20.113
  • 142.251.20.101
  • 142.251.20.100
whitelisted
searchant.org
unknown
searchalice.org
unknown
clickbatonrouge.org
malicious
searchatlantic.org
unknown
searchbeen.org
unknown
searchbowl.org
unknown
clickfer.org
  • 3.33.130.190
  • 15.197.148.33
whitelisted

Threats

PID
Process
Class
Message
1504
Win7Recovery.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Fake Wget User-Agent (wget 3.0) - Likely Hostile
1504
Win7Recovery.exe
A Network Trojan was detected
ET USER_AGENTS Long Fake wget 3.0 User-Agent Detected
No debug info