File name:

UserDiag.exe

Full analysis: https://app.any.run/tasks/cff2ac62-f6a2-4d05-8e1d-29bd88b98cd2
Verdict: Malicious activity
Analysis date: May 11, 2025, 11:27:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

3337A850C19559C35FB8256610C3D71F

SHA1:

1F2E69A35948DAAA48713B00ED364E6F45C5B4AA

SHA256:

0CC6BF6D8E866C368CF271203EB9468BBBA9202ADA100CA352CEAE15C05FDEC4

SSDEEP:

393216:/6aR+AcSw736z592AAQYSpOpVmtQgfqwx8BxGEnqBaV8d8UZMSUKll:mmz59CGvtTdx8nAB+8nZMjal

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • UserDiag.exe (PID: 7812)
  • INFO

    • Reads the computer name

      • UserDiag.exe (PID: 7812)
      • curl.exe (PID: 7840)
    • Reads mouse settings

      • UserDiag.exe (PID: 7812)
    • Checks supported languages

      • UserDiag.exe (PID: 7812)
      • curl.exe (PID: 7840)
    • Reads the machine GUID from the registry

      • UserDiag.exe (PID: 7812)
    • The sample compiled with english language support

      • UserDiag.exe (PID: 7812)
    • Execution of CURL command

      • UserDiag.exe (PID: 7812)
    • Create files in a temporary directory

      • UserDiag.exe (PID: 7812)
    • The process uses AutoIt

      • UserDiag.exe (PID: 7812)
    • Checks proxy server information

      • slui.exe (PID: 8072)
    • Reads the software policy settings

      • slui.exe (PID: 8072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:10 15:22:18+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 633856
InitializedDataSize: 50163200
UninitializedDataSize: -
EntryPoint: 0x204f7
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 25.5.4.0
ProductVersionNumber: 25.5.4.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 25.5.4
Comments: UserDiag
FileDescription: UserDiag
ProductName: UserDiag
ProductVersion: 25.5.4
CompanyName: SkyEmie_
LegalCopyright: Copyright © since 2020 - All rights reserved
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start userdiag.exe curl.exe conhost.exe no specs slui.exe userdiag.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7720"C:\Users\admin\Desktop\UserDiag.exe" C:\Users\admin\Desktop\UserDiag.exeexplorer.exe
User:
admin
Company:
SkyEmie_
Integrity Level:
MEDIUM
Description:
UserDiag
Exit code:
3221226540
Version:
25.5.4
Modules
Images
c:\users\admin\desktop\userdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7812"C:\Users\admin\Desktop\UserDiag.exe" C:\Users\admin\Desktop\UserDiag.exe
explorer.exe
User:
admin
Company:
SkyEmie_
Integrity Level:
HIGH
Description:
UserDiag
Version:
25.5.4
Modules
Images
c:\users\admin\desktop\userdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7840"C:\WINDOWS\Sysnative\curl.exe" "https://userdiag.com/api/v1/build-metadata?sys_lang=us&app_lang=us&app_version=25.5.4" -k -v -m 15 --retry 1 --retry-delay 5C:\Windows\System32\curl.exe
UserDiag.exe
User:
admin
Company:
curl, https://curl.se/
Integrity Level:
HIGH
Description:
The curl executable
Exit code:
0
Version:
8.4.0
Modules
Images
c:\windows\system32\curl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
7852\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execurl.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
8072C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 699
Read events
3 699
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
9
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\autF985.tmpbinary
MD5:4713BCC39E651DD8E9C0956263EB34B9
SHA256:EA36D0F1B6147182FE013211039B715122F7ECDA4430E90421B6DAFCE7C10E6D
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\udiag\logo.icoimage
MD5:9AF3FADAC4C9E086392327505C651164
SHA256:3B331F678C1BC0B73339F2E6F506C9B9EDD3D20DF8D7D1C73B32DA96AE126256
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\autF9D4.tmpbinary
MD5:6CD5DEB51E8A09D6EBE0DDCCCDD87C63
SHA256:7AF37E44EF03F12DDA818CCF5BC1C60757F182CB58F759D587421779B8FA525F
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\udiag\bg_menu1.bmpimage
MD5:EB8E7DDDBD829F743627A2DEADF8570C
SHA256:8CA4E8387BBA57C348880717DA915E14C28EC3E31195978EE252C0D519C206DC
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\~DFEC49725752A68F9B.TMPbinary
MD5:4F8111EA09CB2DB60CCB64E9C9111B93
SHA256:D6DD31882740C31BCA45CCE0A399EAE1CCE97CAB6E946210EC9BC8C0D6F34957
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\aut541.tmpbinary
MD5:6CD5DEB51E8A09D6EBE0DDCCCDD87C63
SHA256:7AF37E44EF03F12DDA818CCF5BC1C60757F182CB58F759D587421779B8FA525F
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\aut5A0.tmpbinary
MD5:73E4F4172ED03746F49F6D0FEC2936EA
SHA256:C15085B96E4E76B8CD0D94DF7E239EE051BCD3878D674AE3CC488E6554F2958E
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\aut4C2.tmpbinary
MD5:95A1448CBBBB8C5B84146A78CC50474E
SHA256:E2B8B0B4C0C05B273536405ECFD6E0E7C915E2F8CC472A18786675885D75A2B0
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\aut501.tmpbinary
MD5:4C021E569430EDB193DBA8FFB82D896E
SHA256:47D1318FEB0DEB9AC3FCCA359F1DAA87C3EF177BAC11CCF2A86297CFF616B43E
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\udiag\bg_menu2.bmpimage
MD5:BAA9DC77EA0EFE5D384EA0C6EB244DE8
SHA256:FA2ACEC1E7CBD4B78C3B2E83B633D0A24388F8147FD2C204D9F30803057CEA41
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
22
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7840
curl.exe
104.21.32.1:443
userdiag.com
CLOUDFLARENET
unknown
7348
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8072
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.78
whitelisted
userdiag.com
  • 104.21.32.1
  • 104.21.112.1
  • 104.21.96.1
  • 104.21.80.1
  • 104.21.64.1
  • 104.21.48.1
  • 104.21.16.1
unknown
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info