File name:

windowsupdateagent30-x86.exe

Full analysis: https://app.any.run/tasks/d7551b79-0597-47ff-a2a5-a2595027271e
Verdict: Malicious activity
Analysis date: May 28, 2025, 20:42:15
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

F723820B8656E82958FA7ED854A7EEFE

SHA1:

50186EC913A4896A92D72E5E5384693BF3A71182

SHA256:

B2512E0C2786F72ED41559580261C782A13FB5EA7FE23878873F83ECAEEEC25F

SSDEEP:

98304:bEQ5paQMpw6sfqfeIYqp7sO703ERL9bB5itiO7Ek4d+ciCZwxZVXURShoxGA7/uW:DxVca+k8R2I

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • windowsupdateagent30-x86.exe (PID: 7424)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • windowsupdateagent30-x86.exe (PID: 7528)
    • Starts a Microsoft application from unusual location

      • windowsupdateagent30-x86.exe (PID: 7424)
      • windowsupdateagent30-x86.exe (PID: 7528)
    • Process drops legitimate windows executable

      • windowsupdateagent30-x86.exe (PID: 7528)
  • INFO

    • The sample compiled with english language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with chinese language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with german language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with spanish language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with swedish language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with french language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with czech language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with japanese language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • Reads the computer name

      • windowsupdateagent30-x86.exe (PID: 7528)
      • wusetup.exe (PID: 7688)
    • The sample compiled with arabic language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with portuguese language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with turkish language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • Checks supported languages

      • wusetup.exe (PID: 7688)
      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with polish language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • Reads the software policy settings

      • slui.exe (PID: 7572)
    • The sample compiled with russian language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with korean language support

      • windowsupdateagent30-x86.exe (PID: 7528)
    • Reads the machine GUID from the registry

      • windowsupdateagent30-x86.exe (PID: 7528)
    • The sample compiled with Italian language support

      • windowsupdateagent30-x86.exe (PID: 7528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | MS generic-sfx Cabinet File Unpacker (32/64bit MSCFU) (82.5)
.exe | Win32 Executable MS Visual C++ (generic) (7.3)
.exe | Win64 Executable (generic) (6.5)
.dll | Win32 Dynamic Link Library (generic) (1.5)
.exe | Win32 Executable (generic) (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2005:06:28 16:55:01+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 7.1
CodeSize: 31232
InitializedDataSize: 72704
UninitializedDataSize: -
EntryPoint: 0x5a45
OSVersion: 5.2
ImageVersion: 5.2
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.2.29.0
ProductVersionNumber: 6.2.29.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Self-Extracting Cabinet
FileVersion: 6.2.0029.0 (SRV03_QFE.031113-0918)
InternalName: SFXCAB.EXE
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: SFXCAB.EXE
ProductName: Microsoft® Windows® Operating System
ProductVersion: 6.2.0029.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start windowsupdateagent30-x86.exe sppextcomobj.exe no specs slui.exe wusetup.exe no specs slui.exe no specs windowsupdateagent30-x86.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7192C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7424"C:\Users\admin\AppData\Local\Temp\windowsupdateagent30-x86.exe" C:\Users\admin\AppData\Local\Temp\windowsupdateagent30-x86.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Self-Extracting Cabinet
Exit code:
3221226540
Version:
6.2.0029.0 (SRV03_QFE.031113-0918)
Modules
Images
c:\users\admin\appdata\local\temp\windowsupdateagent30-x86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7528"C:\Users\admin\AppData\Local\Temp\windowsupdateagent30-x86.exe" C:\Users\admin\AppData\Local\Temp\windowsupdateagent30-x86.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Self-Extracting Cabinet
Exit code:
53258
Version:
6.2.0029.0 (SRV03_QFE.031113-0918)
Modules
Images
c:\users\admin\appdata\local\temp\windowsupdateagent30-x86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
7540C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7572"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7688c:\d35ab894a8a08b358e496c8b\wusetup.exeC:\d35ab894a8a08b358e496c8b\wusetup.exewindowsupdateagent30-x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Update Setup
Exit code:
53258
Version:
7.4.7600.226 (winmain_wtr_wsus3sp2(wmbla).090806-1834)
Modules
Images
c:\d35ab894a8a08b358e496c8b\wusetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
Total events
623
Read events
623
Write events
0
Delete events
0

Modification events

No data
Executable files
157
Suspicious files
3
Text files
50
Unknown types
26

Dropped files

PID
Process
Filename
Type
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\WUClient-SelfUpdate-ActiveX.cabcompressed
MD5:232CCCBB86D2AFAE9B60C42D23D885B9
SHA256:F2D9F27A725B6AEC105B42D434EFA683D3B8A85F87B87A47A846703C5166163A
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\msxml3.dllexecutable
MD5:E7A3FCB568797785750308DD6DB2BDC0
SHA256:E56FAAC4EA3C7C392FDE178851599EE4DF244B0AF743F8D2239EB093704AFA71
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\WUClient-SelfUpdate-Core-TopLevel.cabcompressed
MD5:FB59D11E7CE0880CD564CFE1E60933C0
SHA256:92514168119F26A7149FEB0C01C5DF39EC75700DDE193EFCBF5644DD992A0942
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\WUClient-SelfUpdate-Aux-TopLevel.cabcompressed
MD5:0A0FE198EFE05D6FA8F4DC48DD8CAAD3
SHA256:12F355D099956D93817AC4F249242FDA428F9FED7B03B03438D019384D3F2101
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\wuapi.dll.mui_fiexecutable
MD5:7566307C21A344FDDBB52B407A5D410F
SHA256:D428743C5E7258B60903A1AC27962D8FCA4F3E8D2391F5A36BF49664B6848670
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\wuapi.dll.mui_deexecutable
MD5:4D8E7E2AAB4DC36E3C4E91E4CD5F020F
SHA256:49F4698BB700B07F351F5A9EF89AEECECC93077D5CFB5AE7FD72F4307F69EB18
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\wuapi.dll.mui_enexecutable
MD5:52CF3B23095C47043FC060D9F1A74D2E
SHA256:D33206182504C9AFC64B7A7F3CD0574E3C1F79361D0E459527FA4F788F666401
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\wuapi.dll.mui_elexecutable
MD5:9B5BB7DDF4BAD4B06138448DA6DE89FB
SHA256:72AB1B6891B08D1CC781E58F0CDBE11C7DF34942B241E34EE165224F4C6EE422
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\wuapi.dll.mui_daexecutable
MD5:966CA3C3F82C2250C8013B30FD9C343C
SHA256:E4F08B0BD61F7040B3626118BD577A96F9351AC71EDD4865F940F4A9D21BE149
7528windowsupdateagent30-x86.exeC:\d35ab894a8a08b358e496c8b\winhttp.dllexecutable
MD5:D9CCCBCA7DBFB45D91FCB6FAF3B9AC08
SHA256:4E0C219B0A0C7399FBD3C0728340BECF159B97035D4DA17BE1E5829A093B027C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
19
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.40.158.218:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7976
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7976
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
5796
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5024
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
23.40.158.218:80
ocsp.digicert.com
AKAMAI-AS
MX
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 2.23.181.156
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.5
  • 20.190.160.128
  • 40.126.32.133
  • 20.190.160.14
  • 20.190.160.132
  • 20.190.160.22
  • 20.190.160.3
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 23.40.158.218
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
whitelisted

Threats

No threats detected
No debug info