File name:

update_server.exe

Full analysis: https://app.any.run/tasks/696af3c6-b3f8-4365-babb-93ad82ac2fe6
Verdict: Malicious activity
Analysis date: June 06, 2025, 18:52:40
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ip-check
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

34CFACEA470DAEEC3BD8F970D8F14419

SHA1:

5DA9528858BF0144CD365867C5770C8C2B9900CD

SHA256:

5684BB146F78ED87935457FF833D9ED8E50DFF80C1F385405B48E9F07CF3881F

SSDEEP:

98304:yrmaIcFU1QPyZ1TfromsbgSe4smKzRyvK15Je2sFAxaP+2R3LgwgSGmiuy/PfR4Q:Egg1sMy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • update_server.tmp (PID: 7812)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • update_server.exe (PID: 6940)
      • update_server.tmp (PID: 7812)
    • Reads the Windows owner or organization settings

      • update_server.tmp (PID: 7812)
    • Process drops legitimate windows executable

      • update_server.tmp (PID: 7812)
    • The process drops C-runtime libraries

      • update_server.tmp (PID: 7812)
    • Reads security settings of Internet Explorer

      • startUp.exe (PID: 760)
    • There is functionality for capture public ip (YARA)

      • SPUpDateServer.exe (PID: 5548)
  • INFO

    • Create files in a temporary directory

      • update_server.exe (PID: 6940)
      • update_server.tmp (PID: 7812)
    • Checks supported languages

      • update_server.exe (PID: 6940)
      • update_server.tmp (PID: 7812)
      • startUp.exe (PID: 760)
      • SPUpDateServer.exe (PID: 5548)
    • The sample compiled with english language support

      • update_server.tmp (PID: 7812)
    • Reads the computer name

      • update_server.tmp (PID: 7812)
      • startUp.exe (PID: 760)
      • SPUpDateServer.exe (PID: 5548)
    • The sample compiled with russian language support

      • update_server.tmp (PID: 7812)
    • Creates files in the program directory

      • update_server.tmp (PID: 7812)
      • SPUpDateServer.exe (PID: 5548)
    • The sample compiled with chinese language support

      • update_server.tmp (PID: 7812)
    • Creates a software uninstall entry

      • update_server.tmp (PID: 7812)
    • Launching a file from a Registry key

      • update_server.tmp (PID: 7812)
    • Process checks computer location settings

      • startUp.exe (PID: 760)
    • Reads the machine GUID from the registry

      • SPUpDateServer.exe (PID: 5548)
    • Process checks whether UAC notifications are on

      • SPUpDateServer.exe (PID: 5548)
    • Reads the software policy settings

      • slui.exe (PID: 2852)
      • slui.exe (PID: 6456)
    • Checks proxy server information

      • slui.exe (PID: 6456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (77.7)
.exe | Win32 Executable Delphi generic (10)
.dll | Win32 Dynamic Link Library (generic) (4.6)
.exe | Win32 Executable (generic) (3.1)
.exe | Win16/32 Executable Delphi generic (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 37888
InitializedDataSize: 14848
UninitializedDataSize: -
EntryPoint: 0x9b24
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.5.0.0
ProductVersionNumber: 2.5.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: update_server Setup
FileVersion: 2.5.0.0
LegalCopyright:
ProductName: update_server
ProductVersion: 2.5.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start update_server.exe update_server.tmp sppextcomobj.exe no specs slui.exe startup.exe no specs spupdateserver.exe slui.exe update_server.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
760"C:\Program Files (x86)\hik\update_server\startUp.exe"C:\Program Files (x86)\hik\update_server\startUp.exeupdate_server.tmp
User:
admin
Integrity Level:
HIGH
Description:
startUp Application
Version:
2, 5, 0, 0
Modules
Images
c:\program files (x86)\hik\update_server\startup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
2236C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2852"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5548"C:\Program Files (x86)\hik\update_server\SPUpDateServer.exe" C:\Program Files (x86)\hik\update_server\SPUpDateServer.exe
startUp.exe
User:
admin
Integrity Level:
HIGH
Description:
SPUpDate Application
Version:
2, 5, 0, 0
Modules
Images
c:\program files (x86)\hik\update_server\spupdateserver.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6456C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6940"C:\Users\admin\AppData\Local\Temp\update_server.exe" C:\Users\admin\AppData\Local\Temp\update_server.exe
explorer.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
update_server Setup
Exit code:
0
Version:
2.5.0.0
Modules
Images
c:\users\admin\appdata\local\temp\update_server.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6988"C:\Users\admin\AppData\Local\Temp\update_server.exe" C:\Users\admin\AppData\Local\Temp\update_server.exeexplorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
update_server Setup
Exit code:
3221226540
Version:
2.5.0.0
Modules
Images
c:\users\admin\appdata\local\temp\update_server.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7812"C:\Users\admin\AppData\Local\Temp\is-O6U8Q.tmp\update_server.tmp" /SL5="$100284,2478167,53760,C:\Users\admin\AppData\Local\Temp\update_server.exe" C:\Users\admin\AppData\Local\Temp\is-O6U8Q.tmp\update_server.tmp
update_server.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.50.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-o6u8q.tmp\update_server.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
1 804
Read events
1 788
Write events
16
Delete events
0

Modification events

(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:SPUpDateServerrun
Value:
C:\Program Files (x86)\hik\update_server\startUp.exe
(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\shipin7\shipin7_update_server
Operation:writeName:InstallPath
Value:
C:\Program Files (x86)\hik\update_server
(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\shipin7\shipin7_update_server
Operation:writeName:ClientType
Value:
PCUpdateServer
(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\shipin7\shipin7_update_server
Operation:writeName:ClientVision
Value:
2.5.0.0
(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\shipin7\shipin7_update_server
Operation:writeName:ClientKey
Value:
10
(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A9A0CFDF-AD32-4FA0-8179-405A04F8E7DA}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
5.3.5 (a)
(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A9A0CFDF-AD32-4FA0-8179-405A04F8E7DA}_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files (x86)\hik\update_server
(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A9A0CFDF-AD32-4FA0-8179-405A04F8E7DA}_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\hik\update_server\
(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A9A0CFDF-AD32-4FA0-8179-405A04F8E7DA}_is1
Operation:writeName:Inno Setup: Icon Group
Value:
hik
(PID) Process:(7812) update_server.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A9A0CFDF-AD32-4FA0-8179-405A04F8E7DA}_is1
Operation:writeName:Inno Setup: User
Value:
admin
Executable files
49
Suspicious files
2
Text files
16
Unknown types
0

Dropped files

PID
Process
Filename
Type
6940update_server.exeC:\Users\admin\AppData\Local\Temp\is-O6U8Q.tmp\update_server.tmpexecutable
MD5:9D321C7096F4BCAEB6F3D8D1636E1744
SHA256:43202B0DE2E718D35CDF7EB8B34DD35BF3FAE85C0ECD2108830230A121284322
7812update_server.tmpC:\Program Files (x86)\hik\update_server\is-7JACM.tmpexecutable
MD5:F7BAC757D17A077B7DEDBDAB0FEB1E2F
SHA256:4D2A7A0990613206A3AE327F74A2A6F93A58AEDBBC0946D1188608C7177FE447
7812update_server.tmpC:\Program Files (x86)\hik\update_server\unins000.exeexecutable
MD5:E44F371578D5C0D7DF7CB59FEE7994A3
SHA256:A52DA542E5180802EB3DF43D6A8707E3D8D568D84DC1AAF8F28A5D07D20891FE
7812update_server.tmpC:\Users\admin\AppData\Local\Temp\is-KRMG0.tmp\_isetup\_RegDLL.tmpexecutable
MD5:0EE914C6F0BB93996C75941E1AD629C6
SHA256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
7812update_server.tmpC:\Users\admin\AppData\Local\Temp\is-KRMG0.tmp\ISTask.dllexecutable
MD5:86A1311D51C00B278CB7F27796EA442E
SHA256:E916BDF232744E00CBD8D608168A019C9F41A68A7E8390AA48CFB525276C483D
7812update_server.tmpC:\Program Files (x86)\hik\update_server\is-3P1L8.tmpexecutable
MD5:E44F371578D5C0D7DF7CB59FEE7994A3
SHA256:A52DA542E5180802EB3DF43D6A8707E3D8D568D84DC1AAF8F28A5D07D20891FE
7812update_server.tmpC:\Program Files (x86)\hik\update_server\hlog.dllexecutable
MD5:F7BAC757D17A077B7DEDBDAB0FEB1E2F
SHA256:4D2A7A0990613206A3AE327F74A2A6F93A58AEDBBC0946D1188608C7177FE447
7812update_server.tmpC:\Program Files (x86)\hik\update_server\is-R1IK6.tmpexecutable
MD5:E982D6233FE5E315256D545527FB4EFE
SHA256:C0321C4841960960D198B3DE744AF97A28D8E205B53308278539495B6AD1E9AD
7812update_server.tmpC:\Program Files (x86)\hik\update_server\log4cxx.propertiestext
MD5:060FF5CC1C71404E1D745BF40C592FF8
SHA256:FEF06BDE74BB1BD5DB8F2E3F25E92A7FAF77CA9976F2A7998B74059E24BF4C7D
7812update_server.tmpC:\Program Files (x86)\hik\update_server\hpr.dllexecutable
MD5:E982D6233FE5E315256D545527FB4EFE
SHA256:C0321C4841960960D198B3DE744AF97A28D8E205B53308278539495B6AD1E9AD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
39
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7768
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7768
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7636
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
40.126.31.71:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.159.68:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5548
SPUpDateServer.exe
60.190.232.47:443
api.ys7.com
Chinanet
CN
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 23.219.150.101
whitelisted
api.ys7.com
  • 60.190.232.47
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
log.ys7.com
  • 115.238.23.30
  • 115.238.23.80
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info