File name:

07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9

Full analysis: https://app.any.run/tasks/24becaff-b6af-4ddf-8d0e-e7f68daae194
Verdict: Malicious activity
Analysis date: May 17, 2025, 13:29:48
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

4904591BE9AD82890AD5DB4784AB1061

SHA1:

084E3E18918106CB9DE8A1CBCD095AFBE4D9477B

SHA256:

07835A4A3A8071C7A7631817774F53C20C83954FA98F3D0454B8A3C6F7A031F9

SSDEEP:

3072:TpdE+XS40aEt8ohZI7KZ5rfx6C4eMjvfucXloea7z5W7EQy/1ygPND1Hd7ZK7dv:TE+XS40aEt90OfI3WlXfQyRPDHK7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe (PID: 7292)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe (PID: 7292)
    • Detected use of alternative data streams (AltDS)

      • svchost.exe (PID: 7644)
    • Executes application which crashes

      • ukkhtfvt.exe (PID: 7484)
    • Reads security settings of Internet Explorer

      • 07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe (PID: 7292)
  • INFO

    • Reads the computer name

      • 07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe (PID: 7292)
      • ukkhtfvt.exe (PID: 7484)
    • Create files in a temporary directory

      • 07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe (PID: 7292)
    • Process checks computer location settings

      • 07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe (PID: 7292)
    • Checks supported languages

      • 07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe (PID: 7292)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:09:15 13:33:39+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 224256
InitializedDataSize: 31808512
UninitializedDataSize: -
EntryPoint: 0x4d0d
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 54.0.0.0
ProductVersionNumber: 50.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Unknown (0274)
CharacterSet: Unknown (85B3)
InternalName: ElasticAttribs.exe
LegalTrademark1: DoesGet
OriginalFileName: Huklusa.exe
ProductName: Jsdgsdfu
ProductVersion: 1.0.0.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe wusa.exe no specs wusa.exe ukkhtfvt.exe svchost.exe no specs sppextcomobj.exe no specs werfault.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7292"C:\Users\admin\AppData\Local\Temp\07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe" C:\Users\admin\AppData\Local\Temp\07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7344"C:\Windows\System32\wusa.exe" C:\Windows\SysWOW64\wusa.exe07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Update Standalone Installer
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wusa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7444"C:\WINDOWS\SysWOW64\wusa.exe" C:\Windows\SysWOW64\wusa.exe
07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Update Standalone Installer
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wusa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7484"C:\Users\admin\ukkhtfvt.exe" /d"C:\Users\admin\AppData\Local\Temp\07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe" /e5E0402100000007FC:\Users\admin\ukkhtfvt.exe
07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\windows\syswow64\msimg32.dll
c:\windows\syswow64\ws2_32.dll
c:\windows\syswow64\dbghelp.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\shell32.dll
c:\windows\syswow64\oleaut32.dll
c:\windows\syswow64\combase.dll
c:\windows\syswow64\sspicli.dll
7644svchost.exeC:\Windows\SysWOW64\svchost.exeukkhtfvt.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
3221225501
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
7680C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7704C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7484 -s 588C:\Windows\SysWOW64\WerFault.exeukkhtfvt.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7736"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 108
Read events
1 105
Write events
2
Delete events
1

Modification events

(PID) Process:(7292) 07835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:uchsotgo
Value:
"C:\Users\admin\ukkhtfvt.exe"
(PID) Process:(7644) svchost.exeKey:HKEY_CURRENT_USER\Control Panel\Buses
Operation:writeName:Config0
Value:
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
(PID) Process:(7644) svchost.exeKey:HKEY_CURRENT_USER\Control Panel\Buses
Operation:delete valueName:Config1
Value:
Executable files
2
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
729207835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exeC:\Users\admin\AppData\Local\Temp\seuhvumq.exeexecutable
MD5:FF412B78774414BC9334AAAD13929722
SHA256:FB561127612609D386871898999008CA9D9CD9170DC3861D9108AA5043DDB190
729207835a4a3a8071c7a7631817774f53c20c83954fa98f3d0454b8a3c6f7a031f9.exeC:\Users\admin\ukkhtfvt.exeexecutable
MD5:B696BF95717D112B1CD02B0DCC4EC754
SHA256:289F35FF350793CCA46BD03222A64DE5A00D345E8B064EC8EBEC6951D020664F
7644svchost.exeC:\Users\admin:.reposbinary
MD5:5B2233CDFE878F1D76BE025366938323
SHA256:C2F861C780B72EE272D5E816F8FF0C731A3D2A045C2267B7160F57CE225A57A6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.26:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.26:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5968
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5968
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.26:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.216.77.26:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.216.77.26
  • 23.216.77.22
  • 23.216.77.21
  • 23.216.77.18
  • 23.216.77.25
  • 23.216.77.28
  • 23.216.77.6
  • 23.216.77.8
  • 23.216.77.31
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.0
  • 40.126.31.130
  • 40.126.31.129
  • 40.126.31.2
  • 40.126.31.0
  • 40.126.31.1
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info