File name:

Release.zip

Full analysis: https://app.any.run/tasks/f106abe6-2095-4799-b805-0fbd05e2b5ae
Verdict: Malicious activity
Analysis date: May 16, 2025, 09:52:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

281EF50C5F2085782239D90114BAB3E0

SHA1:

6EB53BAF86E8CE6928430A76E2C617D7FB43EC91

SHA256:

CCCE27D92D4593FE0BEB0239C0BE22589321ED5FD38493E450ED4299BB55857F

SSDEEP:

98304:XFsW9HlcPV1RStkJUz891wLFEUxrB/XyeXEoGq9VxcOwtw0L9OyEPFjanbdk9A61:rSV1wQyRXKsJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 7396)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 7396)
    • Reads security settings of Internet Explorer

      • Pulsar.exe (PID: 8116)
    • Reads the date of Windows installation

      • Pulsar.exe (PID: 8116)
    • Creates file in the systems drive root

      • explorer.exe (PID: 3676)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7396)
    • Reads Environment values

      • Pulsar.exe (PID: 8116)
    • Creates files in the program directory

      • Pulsar.exe (PID: 8116)
    • Process checks computer location settings

      • Pulsar.exe (PID: 8116)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 3676)
    • Manual execution by a user

      • Pulsar.exe (PID: 8116)
    • Checks supported languages

      • Pulsar.exe (PID: 8116)
    • Reads product name

      • Pulsar.exe (PID: 8116)
    • Reads the machine GUID from the registry

      • Pulsar.exe (PID: 8116)
    • Reads the computer name

      • Pulsar.exe (PID: 8116)
    • Creates files or folders in the user directory

      • Pulsar.exe (PID: 8116)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:05:16 09:47:34
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Release/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs pulsar.exe no specs explorer.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3676C:\WINDOWS\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
7220"C:\Windows\explorer.exe" /select, "C:\Users\admin\Desktop\Release\net472\Pulsar.p12"C:\Windows\explorer.exePulsar.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
7396"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Release.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7552C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7584"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7976C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
8116"C:\Users\admin\Desktop\Release\net472\Pulsar.exe" C:\Users\admin\Desktop\Release\net472\Pulsar.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Pulsar Server
Exit code:
0
Version:
1.6.0
Modules
Images
c:\users\admin\desktop\release\net472\pulsar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
10 179
Read events
10 140
Write events
36
Delete events
3

Modification events

(PID) Process:(7396) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7396) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7396) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7396) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Release.zip
(PID) Process:(7396) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7396) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7396) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7396) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3676) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Ribbon
Operation:writeName:MinimizedStateTabletModeOff
Value:
0
(PID) Process:(3676) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Ribbon
Operation:writeName:QatItems
Value:
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
Executable files
129
Suspicious files
3
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\.msCoverageSourceRootsMapping_Pulsar.Common.Teststext
MD5:2E7BD29BAB9AE201775405596CCD3D4C
SHA256:7B2DEDF2D305D0F8F9D87DFB3A8FBA004506B64B5617D7A37680FEF2CB097E70
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\es\Microsoft.Testing.Extensions.MSBuild.resources.dllexecutable
MD5:5C303D6602A0086FFC07FAEAC8F3D416
SHA256:5958A089A081BF050E2F7830F0337DF0AA27F61F2034C21B4B4A8F15C8B391DD
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\cs\Microsoft.Testing.Platform.resources.dllexecutable
MD5:D3EA6F9C5A84FB1A464D401D989C9338
SHA256:567645C51EF8D36C725563515E4B54A0C4003EB9281D5B7BDC39FDE15FBB4DB6
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\es\Microsoft.Testing.Extensions.VSTestBridge.resources.dllexecutable
MD5:5C027D7DA8693327051DE38151A161F4
SHA256:3BE66A5FCC45F84602FC0C8E32B98EB970262999CEC52AC60D06D9DCEEDC75D6
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\cs\Microsoft.Testing.Extensions.VSTestBridge.resources.dllexecutable
MD5:88DDF36119B1278D60BED2F81F1F35D4
SHA256:22BD5E7A2E719EFF9F57D5EE9957A2D92FA78BB631A2F95101219CC2FB84F52A
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\cs\Microsoft.TestPlatform.CoreUtilities.resources.dllexecutable
MD5:693EC085DD366C21DE93F8306983E61D
SHA256:503F10BDC72BD3CA08B8B6A752605A91473B73BEA2ACD22602B88A0D41F1AEF7
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\cs\Microsoft.Testing.Extensions.Telemetry.resources.dllexecutable
MD5:839950F946113B5FC375DD3DA71B16BC
SHA256:46DD55883BADEDAF61A6B47DDF6778DABCE0B03F25C14AE235133B2C06C03095
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\de\Microsoft.TestPlatform.CoreUtilities.resources.dllexecutable
MD5:34C967C01370C1E4BF1ADFCAB9B86A50
SHA256:BD20DFFDFE3266E0FD4935A0E8EC581DEE18C448BC54475F79F6D4AFB2EAB03C
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\cs\Microsoft.Testing.Extensions.MSBuild.resources.dllexecutable
MD5:8615942CA00F0D60A1CB66986370A4E3
SHA256:50AE5EA6A47C707230CD28A75F8C70DAB459112BD45CB51B58BF58492115B89B
7396WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7396.46710\Release\net472\de\Microsoft.Testing.Extensions.VSTestBridge.resources.dllexecutable
MD5:64691FDDD1DEC1038F2D44BB755BD4A6
SHA256:BF8C23628DC1D9FDC08DE54177844B0380A9B04EEF96E5E8D73C1D4A4D8AA379
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
19
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7316
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7316
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.65:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7316
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 216.58.206.46
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.65
  • 20.190.160.17
  • 40.126.32.76
  • 20.190.160.4
  • 40.126.32.133
  • 20.190.160.64
  • 20.190.160.3
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info