download:

/uv/install.ps1

Full analysis: https://app.any.run/tasks/e89a56a3-f8c9-4e02-9dcc-f954136d4941
Verdict: Malicious activity
Analysis date: February 25, 2025, 10:49:38
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (367)
MD5:

2C589C40DD560034124997E9656BCBCF

SHA1:

550B15396226DE36972B8C5C7EDB4C911DD71C5A

SHA256:

85818C4BD40FE1F06476232CE11C7F76E0223EB5D3BBB6575E6A836558EE85D4

SSDEEP:

384:xMManH74vczieoWPJdTRBfMdP4h/b9GiQY:xMMyH7icloGHVBfMdP4h/b9GiQY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 6256)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6256)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 6256)
  • SUSPICIOUS

    • Creates new GUID (POWERSHELL)

      • powershell.exe (PID: 6256)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 6256)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 6256)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 6256)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 6256)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 6256)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 6256)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 6048)
      • uv.exe (PID: 872)
    • Checks proxy server information

      • powershell.exe (PID: 6256)
      • BackgroundTransferHost.exe (PID: 6048)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 6256)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 2148)
      • BackgroundTransferHost.exe (PID: 6048)
      • BackgroundTransferHost.exe (PID: 6800)
      • BackgroundTransferHost.exe (PID: 2124)
      • BackgroundTransferHost.exe (PID: 5972)
    • Manual execution by a user

      • uvx.exe (PID: 6988)
      • uv.exe (PID: 6632)
      • uv.exe (PID: 4304)
      • uv.exe (PID: 1276)
      • uvx.exe (PID: 6048)
      • uvx.exe (PID: 5364)
    • Reads the software policy settings

      • slui.exe (PID: 4464)
      • BackgroundTransferHost.exe (PID: 6048)
    • Checks supported languages

      • uvx.exe (PID: 6988)
      • uv.exe (PID: 6632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
163
Monitored processes
26
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs rundll32.exe no specs slui.exe uvx.exe no specs conhost.exe no specs uv.exe no specs uv.exe no specs conhost.exe no specs uv.exe no specs conhost.exe no specs uvx.exe no specs conhost.exe no specs uv.exe no specs uv.exe conhost.exe no specs uvx.exe conhost.exe no specs uv.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
872"C:\Users\admin\.local\bin\uv.exe" tool uvxC:\Users\admin\.local\bin\uv.exeuvx.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\.local\bin\uv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
1276"C:\Users\admin\.local\bin\uv.exe" C:\Users\admin\.local\bin\uv.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\.local\bin\uv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
2124"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
2148"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
4180C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4304"C:\Users\admin\.local\bin\uv.exe" C:\Users\admin\.local\bin\uv.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\.local\bin\uv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
4444\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeuvx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4464"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4880"C:\Users\admin\.local\bin\uv.exe" tool uvxC:\Users\admin\.local\bin\uv.exeuvx.exe
User:
admin
Integrity Level:
HIGH
Exit code:
2
Modules
Images
c:\users\admin\.local\bin\uv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
4976\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeuv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
9 816
Read events
9 798
Write events
17
Delete events
1

Modification events

(PID) Process:(2148) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2148) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2148) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6048) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6048) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6048) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6256) powershell.exeKey:HKEY_CURRENT_USER\Environment
Operation:delete valueName:cargo-dist-01226a75-95c8-4ef8-a297-f340ab47ff8c
Value:
cargo-dist-dummy
(PID) Process:(6256) powershell.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:Path
Value:
C:\Users\admin\.local\bin;%USERPROFILE%\AppData\Local\Microsoft\WindowsApps
(PID) Process:(6256) powershell.exeKey:HKEY_CURRENT_USER\Environment
Operation:writeName:cargo-dist-01226a75-95c8-4ef8-a297-f340ab47ff8c
Value:
cargo-dist-dummy
(PID) Process:(5972) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
2
Suspicious files
12
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
6256powershell.exeC:\Users\admin\AppData\Local\Temp\2d03a4bd-2d6f-4e97-992e-91ed9d8a6e92\uv.exe
MD5:
SHA256:
6048BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\8ae8478b-1da7-4c84-9306-aacfd395d842.down_data
MD5:
SHA256:
6256powershell.exeC:\Users\admin\.local\bin\uv.exe
MD5:
SHA256:
6256powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Y4JYH85Z1KM466N3LJ80.tempbinary
MD5:7D8C5B7CAA67FA8BEE4BED4B43FF5A66
SHA256:4DB3ABCEFA1F40C17ECBA06C11E3D155B12B614F508186E06A770410B4C89781
6048BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:8DDD7C6D4A3AB775235E44297C251885
SHA256:9AB98597EE66662FE13E1D1ABDFA73756608C345060DA9D7842C851EDE3D7992
6048BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\3ceae305-3bff-4643-ba3e-fdce293a70ce.up_meta_securebinary
MD5:295B73C1747E3B965660959A2ACBC7B5
SHA256:A53580052DA0FF32DB3AF56A6A555DCBF83B02C91332F20ECC9523CB83E76660
6256powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:7D8C5B7CAA67FA8BEE4BED4B43FF5A66
SHA256:4DB3ABCEFA1F40C17ECBA06C11E3D155B12B614F508186E06A770410B4C89781
6256powershell.exeC:\Users\admin\AppData\Local\uv\uv-receipt.jsonbinary
MD5:2F721F8B7D1F8C809813B99A72E04FAA
SHA256:B257F8BD1886AC8D6DE67FE753ECA70A45ACBA6F2C7C792E893285E203878E65
6256powershell.exeC:\Users\admin\.local\bin\uvx.exeexecutable
MD5:9D16DE38FD8F46EEF5D45CA5A7AA6659
SHA256:25CEBD9D2D71AC088D3400A35F29D531CEF5721B4FAE4A03CD14181C34D23A21
872uv.exeC:\Users\admin\AppData\Local\uv\cache\CACHEDIR.TAGtext
MD5:4B50DC490CA121C935CEC9C15273AA95
SHA256:5953156D7E0C564A427251316EAF26F8870E6483AE2197F916B630E4F93E31AE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
39
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6048
BackgroundTransferHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6388
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6388
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6080
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2088
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2740
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6256
powershell.exe
104.21.68.235:443
astral.sh
CLOUDFLARENET
unknown
6256
powershell.exe
140.82.121.4:443
github.com
GITHUB
US
whitelisted
6256
powershell.exe
185.199.108.133:443
objects.githubusercontent.com
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.174
whitelisted
astral.sh
  • 104.21.68.235
  • 172.67.200.58
unknown
github.com
  • 140.82.121.4
whitelisted
objects.githubusercontent.com
  • 185.199.108.133
  • 185.199.109.133
  • 185.199.111.133
  • 185.199.110.133
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.131
  • 20.190.159.4
  • 40.126.31.3
  • 20.190.159.128
  • 20.190.159.23
  • 20.190.159.2
  • 20.190.159.75
whitelisted
www.bing.com
  • 92.123.104.18
  • 92.123.104.26
  • 92.123.104.19
  • 92.123.104.23
  • 92.123.104.17
  • 92.123.104.21
  • 92.123.104.13
  • 92.123.104.22
  • 92.123.104.29
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

No threats detected
No debug info