File name:

KMSAuto.exe

Full analysis: https://app.any.run/tasks/c3f79007-7808-42a8-8d9b-20a6e3d8e60f
Verdict: Malicious activity
Analysis date: February 17, 2025, 15:29:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

403C6A8FE520B28FF4AEC9F2B75B3546

SHA1:

96BD47B9CB864AD6154373CA38C988DD4736176D

SHA256:

C0FE2B8082FD757E71028EC4115BC90C3A5C19359DF876292FFF3878CE94FC0B

SSDEEP:

6144:8EzIe+v593qyaM02BL5c89gIV9dLTGvXNmoSu9qW:8Eb+v59ahIgXC0qW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • KMSAuto.exe (PID: 1572)
    • Creates a software uninstall entry

      • KMSAuto.exe (PID: 1572)
  • INFO

    • The sample compiled with english language support

      • KMSAuto.exe (PID: 1572)
    • Reads the computer name

      • KMSAuto.exe (PID: 1572)
    • Checks supported languages

      • KMSAuto.exe (PID: 1572)
    • Manual execution by a user

      • notepad.exe (PID: 2600)
      • KMSAuto.exe (PID: 4468)
      • KMSAuto.exe (PID: 2132)
      • KMSAuto.exe (PID: 3080)
      • KMSAuto.exe (PID: 3584)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (31.9)
.scr | Windows screen saver (29.4)
.dll | Win32 Dynamic Link Library (generic) (14.8)
.exe | Win32 Executable (generic) (10.1)
.exe | Win16/32 Executable Delphi generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 148992
InitializedDataSize: 70656
UninitializedDataSize: -
EntryPoint: 0x25468
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.8.8.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: -
CompanyName: KMSAuto Lite
FileDescription: KMSAuto 1.8.8 Installation
FileVersion: 1.8.8
LegalCopyright: KMSAuto Lite
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
8
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start kmsauto.exe kmsauto.exe no specs kmsauto.exe rundll32.exe no specs notepad.exe no specs kmsauto.exe no specs kmsauto.exe kmsauto.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1572"C:\Users\admin\Desktop\KMSAuto.exe" C:\Users\admin\Desktop\KMSAuto.exe
explorer.exe
User:
admin
Company:
KMSAuto Lite
Integrity Level:
HIGH
Description:
KMSAuto 1.8.8 Installation
Exit code:
0
Version:
1.8.8
Modules
Images
c:\users\admin\desktop\kmsauto.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2132"C:\Users\admin\Desktop\KMSAuto.exe" C:\Users\admin\Desktop\KMSAuto.exe
explorer.exe
User:
admin
Company:
KMSAuto Lite
Integrity Level:
HIGH
Description:
KMSAuto 1.8.8 Installation
Exit code:
0
Version:
1.8.8
Modules
Images
c:\users\admin\desktop\kmsauto.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2168"C:\Users\admin\Desktop\KMSAuto.exe" C:\Users\admin\Desktop\KMSAuto.exeexplorer.exe
User:
admin
Company:
KMSAuto Lite
Integrity Level:
MEDIUM
Description:
KMSAuto 1.8.8 Installation
Exit code:
3221226540
Version:
1.8.8
Modules
Images
c:\users\admin\desktop\kmsauto.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2168C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
2600"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Uninstall\rich.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
3080"C:\Users\admin\Desktop\KMSAuto.exe" C:\Users\admin\Desktop\KMSAuto.exeexplorer.exe
User:
admin
Company:
KMSAuto Lite
Integrity Level:
MEDIUM
Description:
KMSAuto 1.8.8 Installation
Exit code:
3221226540
Version:
1.8.8
Modules
Images
c:\users\admin\desktop\kmsauto.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3584"C:\Users\admin\Desktop\KMSAuto.exe" C:\Users\admin\Desktop\KMSAuto.exeexplorer.exe
User:
admin
Company:
KMSAuto Lite
Integrity Level:
MEDIUM
Description:
KMSAuto 1.8.8 Installation
Exit code:
3221226540
Version:
1.8.8
Modules
Images
c:\users\admin\desktop\kmsauto.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4468"C:\Users\admin\Desktop\KMSAuto.exe" C:\Users\admin\Desktop\KMSAuto.exe
explorer.exe
User:
admin
Company:
KMSAuto Lite
Integrity Level:
HIGH
Description:
KMSAuto 1.8.8 Installation
Version:
1.8.8
Modules
Images
c:\users\admin\desktop\kmsauto.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
498
Read events
470
Write events
28
Delete events
0

Modification events

(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:DisplayName
Value:
KMSAuto 1.8.8
(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:DisplayVersion
Value:
1.8.8
(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:VersionMajor
Value:
1
(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:VersionMinor
Value:
8
(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:Publisher
Value:
KMSAuto Lite
(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\Desktop\Uninstall.exe
(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:UninstallString
Value:
C:\Users\admin\Desktop\Uninstall.exe
(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:InstallLocation
Value:
C:\Users\admin\Desktop\
(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:InstallSource
Value:
C:\Users\admin\Desktop\
(PID) Process:(1572) KMSAuto.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\KMSAuto 1.8.8
Operation:writeName:InstallDate
Value:
20250217
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1572KMSAuto.exeC:\Users\admin\Desktop\Uninstall\rich.txt
MD5:
SHA256:
2132KMSAuto.exeC:\Users\admin\Desktop\Uninstall\rich.txt
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
33
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4244
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4244
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1616
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2132
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3508
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
92.123.104.59:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
www.bing.com
  • 92.123.104.59
  • 92.123.104.62
  • 92.123.104.64
  • 92.123.104.67
  • 92.123.104.63
  • 92.123.104.9
  • 92.123.104.65
  • 92.123.104.66
  • 92.123.104.61
whitelisted
login.live.com
  • 20.190.159.0
  • 40.126.31.128
  • 40.126.31.69
  • 40.126.31.67
  • 40.126.31.1
  • 20.190.159.71
  • 40.126.31.129
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info