File name:

c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90

Full analysis: https://app.any.run/tasks/7674bd9b-34df-42c0-9968-5e18ade685c8
Verdict: Malicious activity
Analysis date: April 29, 2025, 23:19:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 14 sections
MD5:

546B8F2D93F093F8E6C96247A94C85B5

SHA1:

39CD8B7AAFE392B08540C3AD4ACAB51C6AF3309C

SHA256:

C73C4880385317C987C6087A2F7A868B67E1CA4075B69EBF1F7F12CEF4B76D90

SSDEEP:

6144:+Rcx5BAH22o7Lq7S3eyYOy4pzB41weX689V3Vqy:+cBAH1Wlfy41e1rX689V3Vqy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe (PID: 4268)
      • zvzvgjn.exe (PID: 5344)
      • zvzvgjn.exe (PID: 2088)
    • The process executes via Task Scheduler

      • zvzvgjn.exe (PID: 5344)
      • zvzvgjn.exe (PID: 2088)
    • Reads security settings of Internet Explorer

      • zvzvgjn.exe (PID: 5344)
    • Starts itself from another location

      • zvzvgjn.exe (PID: 5344)
  • INFO

    • The sample compiled with english language support

      • c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe (PID: 4268)
      • zvzvgjn.exe (PID: 2088)
    • Creates files in the program directory

      • c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe (PID: 4268)
      • zvzvgjn.exe (PID: 2088)
    • Checks supported languages

      • c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe (PID: 4268)
      • zvzvgjn.exe (PID: 5344)
      • java_update_tfalcaa.exe (PID: 5720)
      • zvzvgjn.exe (PID: 2088)
    • Reads the computer name

      • c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe (PID: 4268)
      • zvzvgjn.exe (PID: 5344)
      • java_update_tfalcaa.exe (PID: 5720)
    • Reads the machine GUID from the registry

      • zvzvgjn.exe (PID: 5344)
      • c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe (PID: 4268)
      • zvzvgjn.exe (PID: 2088)
      • java_update_tfalcaa.exe (PID: 5720)
    • Create files in a temporary directory

      • zvzvgjn.exe (PID: 5344)
    • Process checks computer location settings

      • zvzvgjn.exe (PID: 5344)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.3)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:06:29 17:00:20+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 24576
InitializedDataSize: 252416
UninitializedDataSize: -
EntryPoint: 0x341e0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.1.2600.0
ProductVersionNumber: 5.1.2600.0
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: ASCII
CompanyName: Hilgraeve, Inc.
FileDescription: HyperTerminal Applet
FileVersion: 5.1.2600.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
6
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe sppextcomobj.exe no specs slui.exe no specs zvzvgjn.exe java_update_tfalcaa.exe zvzvgjn.exe

Process information

PID
CMD
Path
Indicators
Parent process
2088"C:\PROGRA~3\Mozilla\zvzvgjn.exe" -eglgyjmC:\ProgramData\Mozilla\zvzvgjn.exe
svchost.exe
User:
SYSTEM
Company:
Hilgraeve, Inc.
Integrity Level:
SYSTEM
Description:
HyperTerminal Applet
Exit code:
0
Version:
5.1.2600.0
Modules
Images
c:\programdata\mozilla\zvzvgjn.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
4268"C:\Users\admin\AppData\Local\Temp\c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe" C:\Users\admin\AppData\Local\Temp\c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe
explorer.exe
User:
admin
Company:
Hilgraeve, Inc.
Integrity Level:
MEDIUM
Description:
HyperTerminal Applet
Exit code:
0
Version:
5.1.2600.0
Modules
Images
c:\users\admin\appdata\local\temp\c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4880C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5344"C:\PROGRA~3\Mozilla\zvzvgjn.exe" -eglgyjmC:\ProgramData\Mozilla\zvzvgjn.exe
svchost.exe
User:
admin
Company:
Hilgraeve, Inc.
Integrity Level:
MEDIUM
Description:
HyperTerminal Applet
Exit code:
0
Version:
5.1.2600.0
Modules
Images
c:\programdata\mozilla\zvzvgjn.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5720"C:\Users\admin\AppData\Local\Temp\java_update_tfalcaa.exe" C:\Users\admin\AppData\Local\Temp\java_update_tfalcaa.exe
zvzvgjn.exe
User:
admin
Company:
Hilgraeve, Inc.
Integrity Level:
HIGH
Description:
HyperTerminal Applet
Exit code:
0
Version:
5.1.2600.0
Modules
Images
c:\users\admin\appdata\local\temp\java_update_tfalcaa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
5960"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
476
Read events
476
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5344zvzvgjn.exeC:\Users\admin\AppData\Local\Temp\java_update_tfalcaa.exeexecutable
MD5:51474A82B3786291F5ABA71B021FA168
SHA256:47383748AA87A981F800471D82E7219B95D6D01434DE5BD029833C775C36CB65
2088zvzvgjn.exeC:\ProgramData\Mozilla\pysrkic.dllexecutable
MD5:FDAB107849555AA98F46DDB284EC86AF
SHA256:1B3451C6309DBC61B3A3DED42C6277C8F4244DB20B20ADC304A8FDF33C6443AD
4268c73c4880385317c987c6087a2f7a868b67e1ca4075b69ebf1f7f12cef4b76d90.exeC:\ProgramData\Mozilla\zvzvgjn.exeexecutable
MD5:2BDEA9293C0AEFD700BBB06056F326CD
SHA256:8F255DE69AB2430C5DCDC8D54E8DB30ED7A07B6E3FE55E1AEE403791E1F45080
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
104.124.11.17:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4040
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4040
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
104.124.11.17:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4040
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 104.124.11.17
  • 104.124.11.58
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
google.com
  • 142.250.186.110
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.131
  • 20.190.159.23
  • 40.126.31.2
  • 20.190.159.2
  • 40.126.31.0
  • 40.126.31.71
  • 20.190.159.128
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info