File name:

Valex_Executor.zip

Full analysis: https://app.any.run/tasks/784479fd-2e74-4b12-92cc-e852ed7c2133
Verdict: Malicious activity
Analysis date: June 14, 2025, 10:51:51
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-scr
arch-html
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

BE07C03E4B7C97004B37B6813918112E

SHA1:

12E58A1A22F512EFC32C76A706A398B155451267

SHA256:

FE969C08599664C940F3131BA6B0D24D3A2D5C8CFE85F3D54CA1C3705A599139

SSDEEP:

196608:adpEgIX4Czr22IDZGCDvRNLxfPp8gwgrdkI+Ithy98FxM6N3:eElX1JIDZdDvf5h5RxkI+IthJFTN3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 5644)
      • WinRAR.exe (PID: 4172)
    • Executes application which crashes

      • Valex.exe (PID: 5556)
      • Valex.exe (PID: 3668)
      • Valex.exe (PID: 1508)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 5644)
      • WinRAR.exe (PID: 4172)
    • Manual execution by a user

      • WinRAR.exe (PID: 4172)
      • Valex.exe (PID: 4864)
      • Valex.exe (PID: 5556)
      • Valex.exe (PID: 5008)
      • Valex.exe (PID: 3668)
      • Valex.exe (PID: 1508)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4172)
    • Reads the computer name

      • Valex.exe (PID: 5556)
      • Valex.exe (PID: 3668)
      • Valex.exe (PID: 1508)
    • Checks supported languages

      • Valex.exe (PID: 5556)
      • Valex.exe (PID: 3668)
      • Valex.exe (PID: 1508)
    • Checks proxy server information

      • Valex.exe (PID: 5556)
      • WerFault.exe (PID: 3608)
      • WerFault.exe (PID: 2716)
      • Valex.exe (PID: 3668)
      • Valex.exe (PID: 1508)
      • WerFault.exe (PID: 5900)
    • Disables trace logs

      • Valex.exe (PID: 5556)
      • Valex.exe (PID: 3668)
      • Valex.exe (PID: 1508)
    • Reads the machine GUID from the registry

      • Valex.exe (PID: 5556)
      • Valex.exe (PID: 3668)
      • Valex.exe (PID: 1508)
    • Reads the software policy settings

      • Valex.exe (PID: 5556)
      • Valex.exe (PID: 3668)
      • WerFault.exe (PID: 2716)
      • Valex.exe (PID: 1508)
      • WerFault.exe (PID: 5900)
      • WerFault.exe (PID: 3608)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 3608)
      • WerFault.exe (PID: 2716)
      • WerFault.exe (PID: 5900)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:03:30 05:04:10
ZipCRC: 0x95751423
ZipCompressedSize: 38273
ZipUncompressedSize: 82024
ZipFileName: Microsoft.Web.WebView2.Wpf.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
12
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe rundll32.exe no specs valex.exe no specs valex.exe svchost.exe werfault.exe valex.exe no specs valex.exe werfault.exe valex.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
1508"C:\Users\admin\Desktop\Valex_Executor\Valex.exe" C:\Users\admin\Desktop\Valex_Executor\Valex.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Nezur
Exit code:
3221225477
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\valex_executor\valex.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2716C:\WINDOWS\SysWOW64\WerFault.exe -u -p 3668 -s 2092C:\Windows\SysWOW64\WerFault.exe
Valex.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
3608C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5556 -s 2088C:\Windows\SysWOW64\WerFault.exe
Valex.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
3668"C:\Users\admin\Desktop\Valex_Executor\Valex.exe" C:\Users\admin\Desktop\Valex_Executor\Valex.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Nezur
Exit code:
3221225477
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\valex_executor\valex.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4172"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\Valex_Executor.zip" C:\Users\admin\Desktop\Valex_Executor\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4864"C:\Users\admin\Desktop\Valex_Executor\Valex.exe" C:\Users\admin\Desktop\Valex_Executor\Valex.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Nezur
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\valex_executor\valex.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5008"C:\Users\admin\Desktop\Valex_Executor\Valex.exe" C:\Users\admin\Desktop\Valex_Executor\Valex.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Nezur
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\valex_executor\valex.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5556"C:\Users\admin\Desktop\Valex_Executor\Valex.exe" C:\Users\admin\Desktop\Valex_Executor\Valex.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Nezur
Exit code:
3221225477
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\valex_executor\valex.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5644"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Valex_Executor.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
30 929
Read events
30 870
Write events
50
Delete events
9

Modification events

(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Valex_Executor.zip
(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(5644) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
10
Suspicious files
7
Text files
19
Unknown types
0

Dropped files

PID
Process
Filename
Type
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\Valex.exeexecutable
MD5:452D917F90185A169A4B201B3905E6F5
SHA256:77C0F2D523D0363E3FBE1A5DD5F5126A5192DF389A9E578FF30F1BBF81F52A31
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\bin\Monaco\vs\editor\editor.main.jsbinary
MD5:9399A8EAA741D04B0AE6566A5EBB8106
SHA256:93D28520C07FBCA09E20886087F28797BB7BD0E6CF77400153AAB5AE67E3CE18
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\bin\Monaco\vs\editor\editor.main.nls.it.jstext
MD5:A8855A662EB4D3A771FDAB7BA6287DEF
SHA256:F67CEC6DBF98C98C834638D20DF53C5A770EDADA7F26EBF6D0B7DFEC60F7A4AB
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\bin\Monaco\vs\basic-languages\lua\lua.jsbinary
MD5:8706D861294E09A1F2F7E63D19E5FCB7
SHA256:FC2D6FB52A524A56CD8AC53BFE4BAD733F246E76DC73CBEC4C61BE32D282AC42
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\bin\Monaco\vs\editor\editor.main.nls.de.jstext
MD5:4D83BC1BCED6F773423BE6F939472CFE
SHA256:0DEE462D5FB231F169F6CBC432465A43FD445C011FE650E29F5FB2BCCC31EAAE
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\bin\Monaco\vs\editor\editor.main.nls.fr.jstext
MD5:D319E61FC6B357B9A5D8E3BBAA44CE3C
SHA256:7FDE40B2B212D274617232DE09452C6CB896E8A3C6B9E0B459F067CD07F31A99
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\bin\Monaco\vs\editor\editor.main.nls.jstext
MD5:74DD2381DDBB5AF80CE28AEFED3068FC
SHA256:FDD9D64CE5284373D1541528D15E2AA8AA3A4ADC11B51B3D71D3A3953F8BCC48
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\bin\Monaco\vs\editor\editor.main.csstext
MD5:233217455A3EF3604BF4942024B94F98
SHA256:2EC118616A1370E7C37342DA85834CA1819400C28F83ABFCBBB1EF50B51F7701
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\Newtonsoft.Json.dllexecutable
MD5:195FFB7167DB3219B217C4FD439EEDD6
SHA256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
4172WinRAR.exeC:\Users\admin\Desktop\Valex_Executor\bin\Monaco\vs\editor\editor.main.nls.zh-cn.jstext
MD5:F954AC1091C6D0B640ED5F0ABDCD8ADB
SHA256:AC881E6F56544ED9B8DD4FD8FD8A73F1DA864FB8D79D91C45F5A51F923BD5287
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
48
DNS requests
15
Threats
4

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
436
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5556
Valex.exe
104.26.1.5:443
keyauth.win
CLOUDFLARENET
US
malicious
6024
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3608
WerFault.exe
20.189.173.22:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.73
  • 20.190.159.128
  • 20.190.159.129
  • 20.190.159.4
  • 40.126.31.2
  • 20.190.159.64
  • 20.190.159.130
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.30
whitelisted
keyauth.win
  • 104.26.1.5
  • 104.26.0.5
  • 172.67.72.57
malicious
watson.events.data.microsoft.com
  • 20.189.173.22
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
  • 2603:1030:408:7::3d
whitelisted
171.39.242.20.in-addr.arpa
unknown
d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown

Threats

PID
Process
Class
Message
5556
Valex.exe
Potentially Bad Traffic
ET INFO KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI
2200
svchost.exe
Potentially Bad Traffic
ET INFO KeyAuth Open-source Authentication System Domain in DNS Lookup (keyauth .win)
3668
Valex.exe
Potentially Bad Traffic
ET INFO KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI
1508
Valex.exe
Potentially Bad Traffic
ET INFO KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI
No debug info