File name:

Optimizer-16.4.exe

Full analysis: https://app.any.run/tasks/05675dcc-de1b-4a7d-858f-7f2bdd97cd66
Verdict: Malicious activity
Analysis date: March 11, 2024, 16:18:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

9352623BA2FEE1206079CE3D81BF0132

SHA1:

9C398C2D975D82BA1E46F3BCC0E6298A2B713B8D

SHA256:

F4775567CA9941B4FB3224D97B0741AE669EEDFCB0D8B3C71106B21BDB1AEE28

SSDEEP:

49152:VDQOl91KNw3LnfYV5IuEC87NMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMI:1zNMMMMMMMMMMMMMMMMMMMMMMMMMMMMB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Optimizer-16.4.exe (PID: 3700)
  • SUSPICIOUS

    • Application launched itself

      • Optimizer-16.4.exe (PID: 3700)
    • Reads security settings of Internet Explorer

      • Optimizer-16.4.exe (PID: 3700)
    • Reads the Internet Settings

      • Optimizer-16.4.exe (PID: 3700)
      • Optimizer-16.4.exe (PID: 2752)
    • Reads settings of System Certificates

      • Optimizer-16.4.exe (PID: 2752)
  • INFO

    • Reads the computer name

      • Optimizer-16.4.exe (PID: 3700)
      • Optimizer-16.4.exe (PID: 2752)
    • Checks supported languages

      • Optimizer-16.4.exe (PID: 3700)
      • Optimizer-16.4.exe (PID: 2752)
    • Reads product name

      • Optimizer-16.4.exe (PID: 2752)
    • Reads the machine GUID from the registry

      • Optimizer-16.4.exe (PID: 3700)
      • Optimizer-16.4.exe (PID: 2752)
    • Reads Environment values

      • Optimizer-16.4.exe (PID: 2752)
    • Creates files in the program directory

      • Optimizer-16.4.exe (PID: 2752)
    • Reads the software policy settings

      • Optimizer-16.4.exe (PID: 2752)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:29 18:52:05+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 2392576
InitializedDataSize: 34816
UninitializedDataSize: -
EntryPoint: 0x24a012
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: The Finest Windows Optimizer
CompanyName: deadmoon © ∞
FileDescription: Optimizer
FileVersion: 0.0.0.0
InternalName: Optimizer.exe
LegalCopyright: deadmoon © ∞
LegalTrademarks: -
OriginalFileName: Optimizer.exe
ProductName: Optimizer
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start optimizer-16.4.exe no specs optimizer-16.4.exe

Process information

PID
CMD
Path
Indicators
Parent process
2752"C:\Users\admin\AppData\Local\Temp\Optimizer-16.4.exe" C:\Users\admin\AppData\Local\Temp\Optimizer-16.4.exe
Optimizer-16.4.exe
User:
admin
Company:
deadmoon © ∞
Integrity Level:
HIGH
Description:
Optimizer
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\optimizer-16.4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3700"C:\Users\admin\AppData\Local\Temp\Optimizer-16.4.exe" C:\Users\admin\AppData\Local\Temp\Optimizer-16.4.exeexplorer.exe
User:
admin
Company:
deadmoon © ∞
Integrity Level:
MEDIUM
Description:
Optimizer
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\optimizer-16.4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
9 580
Read events
9 540
Write events
37
Delete events
3

Modification events

(PID) Process:(3700) Optimizer-16.4.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3700) Optimizer-16.4.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3700) Optimizer-16.4.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3700) Optimizer-16.4.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2752) Optimizer-16.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2752) Optimizer-16.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2752) Optimizer-16.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2752) Optimizer-16.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2752) Optimizer-16.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2752) Optimizer-16.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
0
Suspicious files
1
Text files
21
Unknown types
1

Dropped files

PID
Process
Filename
Type
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\Required\EnableXboxTasks.battext
MD5:FABECE235B2BEE26CAFD321A676F85F5
SHA256:DDD6EDECA0D2ABFF7DD9FAB08CB8C736D60B37648E7DFC2E8158798D7DDDF7F7
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\Required\DisableOfficeTelemetryTasks.battext
MD5:FED75B5CB9D9F4EC5EE22B8FD304CCF7
SHA256:D884C0D04BA09B113D9439D2F8C0B7ED322111AE2E3ED802F6A95278FF8E0AC2
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\ReadyMadeMenus\RemoveTakeOwnership.regtext
MD5:01AE3E08513E213ECF621F92B9F0B47C
SHA256:177FB8F30D10E50115500D1B2AF488A9D885FBA42C2FB22E6FBBEE337806AF19
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\ReadyMadeMenus\InstallTakeOwnership.regtext
MD5:29896F795D3E250540AE33EB84D0AF71
SHA256:61FD9430AAC2D0813451326B5CAEB7F463442CEEC46A9D1D52ED34541768C931
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\ReadyMadeMenus\PowerMenu.regtext
MD5:2640EC954A779D0C212822991FF7CF57
SHA256:1C842C9395AAF625908F6579D201AF2754A92F08859D49D1BC7B55BBA2EAACE5
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\ReadyMadeMenus\WindowsApps.regtext
MD5:A1714039AB00D6275EF7EF2559346D71
SHA256:21223E33A52A85EC5EA797457DDF8458A5040760BABC5E5367646C312D74D5D4
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\ReadyMadeMenus\DesktopShortcuts.regtext
MD5:1213A1260BE0789ADE56ED9BA6656FCA
SHA256:52B190CD52671BA5652AFE574245D72DD91AD0EC4168EA405EECC90BF6365BEA
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\Required\DisableOfficeTelemetryTasks.regtext
MD5:7F7B192506491E4105E2AE1CF5EA9067
SHA256:41CF9DB9E395349B94EC7A1EE99DB68062F27BF95C3B364AA6B035DC39FF1DC0
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\Required\EnableOfficeTelemetryTasks.regtext
MD5:496768EA845782927C2A9E0DD172D241
SHA256:6A8F76C97FD957AFEC1F416363DF1E56843C8A56E0F2C470AAE66D9BE8CD2A1A
2752Optimizer-16.4.exeC:\ProgramData\Optimizer\Required\OneDrive_Uninstaller.cmdtext
MD5:522F706E19F359A973C17722C61478ED
SHA256:43F50E6AD08310C365F143301685950330B15AD58AD4B45EFCBA37D876CB1021
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
2752
Optimizer-16.4.exe
185.199.109.133:443
raw.githubusercontent.com
FASTLY
US
unknown

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 185.199.109.133
  • 185.199.108.133
  • 185.199.111.133
  • 185.199.110.133
shared

Threats

No threats detected
No debug info