File name:

OBS-Studio-29.0-Full-Installer-x64.rar

Full analysis: https://app.any.run/tasks/abb0a541-963a-40b5-89a2-5efe5560144d
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 07, 2025, 18:23:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
trox
stealer
python
telegram
loader
upx
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

3042215EBEEFB5AAE8808AFC228771C9

SHA1:

4CD97D264155E2605880E138E33B8C50CEBE24EE

SHA256:

DD17F2803A4332398DCADA5CE9ABFA246241B14BC9C250FBADA5ECF5D6E38DA7

SSDEEP:

393216:SblI9gCds0xuDDAQLq5OP7E0y+gtT2ppkMkK9Gbw27T+6j:Sbl/gxqD/L+j0y+E2kMV9GbT7SE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • HuyNTVideo.exe (PID: 4380)
    • TROX has been detected

      • HuyNTVideo.exe (PID: 4380)
    • Create files in the Startup directory

      • MicrosofOffice.exe (PID: 6972)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 2284)
      • HuyNTVideo.exe (PID: 4380)
    • Process drops python dynamic module

      • HuyNTVideo.exe (PID: 4380)
    • Executable content was dropped or overwritten

      • HuyNTVideo.exe (PID: 4380)
    • The process drops C-runtime libraries

      • HuyNTVideo.exe (PID: 4380)
    • Process drops legitimate windows executable

      • HuyNTVideo.exe (PID: 4380)
    • Loads Python modules

      • MicrosofOffice.exe (PID: 6972)
    • Starts CMD.EXE for commands execution

      • MicrosofOffice.exe (PID: 6972)
    • Process uses ARP to discover network configuration

      • MicrosofOffice.exe (PID: 6972)
    • Process requests binary or script from the Internet

      • MicrosofOffice.exe (PID: 6972)
    • Potential Corporate Privacy Violation

      • MicrosofOffice.exe (PID: 6972)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • MicrosofOffice.exe (PID: 6972)
  • INFO

    • Create files in a temporary directory

      • HuyNTVideo.exe (PID: 4380)
    • Checks supported languages

      • HuyNTVideo.exe (PID: 4380)
      • MicrosofOffice.exe (PID: 6972)
    • The sample compiled with english language support

      • HuyNTVideo.exe (PID: 4380)
    • Reads the machine GUID from the registry

      • MicrosofOffice.exe (PID: 6972)
    • UPX packer has been detected

      • HuyNTVideo.exe (PID: 4380)
    • Reads the computer name

      • MicrosofOffice.exe (PID: 6972)
      • HuyNTVideo.exe (PID: 4380)
    • Checks operating system version

      • MicrosofOffice.exe (PID: 6972)
    • Creates files or folders in the user directory

      • MicrosofOffice.exe (PID: 6972)
    • Checks proxy server information

      • MicrosofOffice.exe (PID: 6972)
      • slui.exe (PID: 6576)
    • Reads the software policy settings

      • slui.exe (PID: 864)
      • slui.exe (PID: 6576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 15259493
UncompressedSize: 330105896
OperatingSystem: Win32
ArchivedFileName: HuyNTVideo.exe
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
10
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe #TROX huyntvideo.exe microsofoffice.exe cmd.exe no specs conhost.exe no specs arp.exe no specs conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
664C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exeMicrosofOffice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
864"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2284"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\OBS-Studio-29.0-Full-Installer-x64.rarC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4112C:\WINDOWS\system32\arp.exe -a 192.168.100.11C:\Windows\System32\ARP.EXEMicrosofOffice.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Arp Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\arp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\snmpapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
4380"C:\Users\admin\AppData\Local\Temp\Rar$EXa2284.1469\HuyNTVideo.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2284.1469\HuyNTVideo.exe
WinRAR.exe
User:
admin
Company:
Microsoft Coporation
Integrity Level:
MEDIUM
Description:
MicrosofOffice.exe
Exit code:
0
Version:
1.1.29.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2284.1469\huyntvideo.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\user32.dll
5776\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeARP.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5956C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6576C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6972"C:\Users\admin\AppData\Local\Temp\Rar$EXa2284.1469\HuyNTVideo.exe" C:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\MicrosofOffice.exe
HuyNTVideo.exe
User:
admin
Company:
Microsoft Coporation
Integrity Level:
MEDIUM
Description:
MicrosofOffice.exe
Exit code:
0
Version:
1.1.29.0
Modules
Images
c:\users\admin\appdata\local\temp\onefile_4380_133911158105498885\microsofoffice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
Total events
3 763
Read events
3 755
Write events
8
Delete events
0

Modification events

(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\OBS-Studio-29.0-Full-Installer-x64.rar
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
52
Suspicious files
7
Text files
922
Unknown types
0

Dropped files

PID
Process
Filename
Type
2284WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2284.1469\HuyNTVideo.exe
MD5:
SHA256:
4380HuyNTVideo.exeC:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\_decimal.pydexecutable
MD5:6339FA92584252C3B24E4CCE9D73EF50
SHA256:4AE6F6FB3992BB878416211221B3D62515E994D78F72EAB51E0126CA26D0EE96
4380HuyNTVideo.exeC:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\_cffi_backend.pydexecutable
MD5:6F1B90884343F717C5DC14F94EF5ACEA
SHA256:2093E7E4F5359B38F0819BDEF8314FDA332A1427F22E09AFC416E1EDD5910FE1
4380HuyNTVideo.exeC:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\_tkinter.pydexecutable
MD5:470364D8ABDC5C22828DF8E22C095ED2
SHA256:4262CABAC7E97220D0E4BD72DEB337FFD9DF429860AB298B3E2D5C9223874705
4380HuyNTVideo.exeC:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\_ssl.pydexecutable
MD5:9DDB64354EF0B91C6999A4B244A0A011
SHA256:E33B7A4AA5CDD5462EE66830636FDD38048575A43D06EB7E2F688358525DDEAB
4380HuyNTVideo.exeC:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\_elementtree.pydexecutable
MD5:1DCD7EBE6ACADDF16C805D8094451F3D
SHA256:D90414E40FB283ED4633924613DAC671580BF7DB926DA37346AA230380860933
4380HuyNTVideo.exeC:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\_ctypes.pydexecutable
MD5:CA4CEF051737B0E4E56B7D597238DF94
SHA256:E60A2B100C4FA50B0B144CF825FE3CDE21A8B7B60B92BFC326CB39573CE96B2B
4380HuyNTVideo.exeC:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\_lzma.pydexecutable
MD5:0A94C9F3D7728CF96326DB3AB3646D40
SHA256:0A70E8546FA6038029F2A3764E721CEEBEA415818E5F0DF6B90D6A40788C3B31
4380HuyNTVideo.exeC:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\_hashlib.pydexecutable
MD5:D856A545A960BF2DCA1E2D9BE32E5369
SHA256:CD33F823E608D3BDA759AD441F583A20FC0198119B5A62A8964F172559ACB7D3
4380HuyNTVideo.exeC:\Users\admin\AppData\Local\Temp\onefile_4380_133911158105498885\_queue.pydexecutable
MD5:52D0A6009D3DE40F4FA6EC61DB98C45C
SHA256:007BCF19D9B036A7E73F5EF31F39BFB1910F72C9C10E4A1B0658352CFE7A8B75
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
25
DNS requests
17
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1164
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1164
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6972
MicrosofOffice.exe
GET
200
3.94.72.89:80
http://lumtest.com/myip.json
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2104
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 23.35.229.160
whitelisted
google.com
  • 172.217.16.206
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.131
  • 40.126.31.67
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.2
  • 40.126.31.129
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
lumtest.com
  • 3.94.72.89
  • 3.94.40.55
unknown

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET HUNTING Telegram API Domain in DNS Lookup
6972
MicrosofOffice.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Python Suspicious User Agent
6972
MicrosofOffice.exe
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
No debug info