File name:

aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9

Full analysis: https://app.any.run/tasks/3887c444-f571-401a-8331-236a7b87e389
Verdict: Malicious activity
Analysis date: April 29, 2025, 11:13:18
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

33316866BAC99AE4D612DE6BB35B8C94

SHA1:

AF79059E3F4BB3B6DF263FF87DFF0F2107E7BE32

SHA256:

AA525E1B6EACB3CCC7E90B49A98F8E8CA79F726F10628801C0C931C70531B3D9

SSDEEP:

6144:FGkNOSSGvkYjsVOnkqutSEwcohG/9oZhe2ArO0Q5VVVVVd+uZ:Z0SSVYj8Onk5/ByrvNJVVVVVT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe (PID: 7556)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe (PID: 7556)
    • Reads security settings of Internet Explorer

      • aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe (PID: 7556)
    • Executes application which crashes

      • aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe (PID: 7556)
      • rdcqbltn.exe (PID: 8144)
    • Connects to SMTP port

      • svchost.exe (PID: 7324)
    • Detected use of alternative data streams (AltDS)

      • svchost.exe (PID: 7324)
  • INFO

    • Create files in a temporary directory

      • aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe (PID: 7556)
    • Checks supported languages

      • aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe (PID: 7556)
      • rdcqbltn.exe (PID: 8144)
    • Reads the computer name

      • aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe (PID: 7556)
      • rdcqbltn.exe (PID: 8144)
    • Process checks computer location settings

      • aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe (PID: 7556)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (35)
.exe | Win64 Executable (generic) (31)
.scr | Windows screen saver (14.7)
.dll | Win32 Dynamic Link Library (generic) (7.3)
.exe | Win32 Executable (generic) (5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:10:15 10:50:16+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 87040
InitializedDataSize: 790016
UninitializedDataSize: -
EntryPoint: 0x6017
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x007f
FileFlags: (none)
FileOS: Unknown (0x40324)
ObjectFileType: Static library
FileSubtype: -
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
10
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe sppextcomobj.exe no specs slui.exe no specs wusa.exe no specs wusa.exe rdcqbltn.exe werfault.exe no specs svchost.exe werfault.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
7296C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7556 -s 688C:\Windows\SysWOW64\WerFault.exeaa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7324svchost.exeC:\Windows\SysWOW64\svchost.exe
rdcqbltn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
7376C:\WINDOWS\SysWOW64\WerFault.exe -u -p 8144 -s 556C:\Windows\SysWOW64\WerFault.exerdcqbltn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7556"C:\Users\admin\AppData\Local\Temp\aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe" C:\Users\admin\AppData\Local\Temp\aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
7564C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7596"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8052"C:\Windows\System32\wusa.exe" C:\Windows\SysWOW64\wusa.exeaa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Update Standalone Installer
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wusa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
8104"C:\WINDOWS\SysWOW64\wusa.exe" C:\Windows\SysWOW64\wusa.exe
aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Update Standalone Installer
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wusa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
8144"C:\Users\admin\rdcqbltn.exe" /d"C:\Users\admin\AppData\Local\Temp\aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe" /e550302100000007FC:\Users\admin\rdcqbltn.exe
aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\rdcqbltn.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
1 581
Read events
1 580
Write events
1
Delete events
0

Modification events

(PID) Process:(7556) aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:wxgfvhzq
Value:
"C:\Users\admin\rdcqbltn.exe"
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7556aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exeC:\Users\admin\rdcqbltn.exeexecutable
MD5:56B93F40BDDCCFDB4D8692C9114A8DC3
SHA256:E48076550BC9A1DA217B4669CFAD4CB3F8984D0BA36E1E1346FA2A4AF558B8B3
7556aa525e1b6eacb3ccc7e90b49a98f8e8ca79f726f10628801c0c931c70531b3d9.exeC:\Users\admin\AppData\Local\Temp\zvnnkzym.exeexecutable
MD5:92992AB6D6CDE95DF4CED6CADFEFF846
SHA256:30A817627B0D9048613534E4D67D147C8CC67C546B6A8FE2E7633D99A39B592A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.180:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6808
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6808
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.48.23.180:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
7324
svchost.exe
13.107.246.59:80
microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7324
svchost.exe
52.101.40.1:25
microsoft-com.mail.protection.outlook.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.180
  • 23.48.23.141
  • 23.48.23.147
  • 23.48.23.158
  • 23.48.23.194
  • 23.48.23.173
  • 23.48.23.145
  • 23.48.23.143
  • 23.48.23.162
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.184.206
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.130
  • 20.190.159.68
  • 40.126.31.128
  • 20.190.159.2
  • 40.126.31.130
  • 20.190.159.4
  • 40.126.31.0
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
microsoft.com
  • 13.107.246.59
whitelisted
microsoft-com.mail.protection.outlook.com
  • 52.101.40.1
  • 52.101.8.51
  • 52.101.9.20
  • 52.101.194.17
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted

Threats

No threats detected
No debug info