File name:

UserDiag.exe

Full analysis: https://app.any.run/tasks/cff2ac62-f6a2-4d05-8e1d-29bd88b98cd2
Verdict: Malicious activity
Analysis date: May 11, 2025, 11:27:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

3337A850C19559C35FB8256610C3D71F

SHA1:

1F2E69A35948DAAA48713B00ED364E6F45C5B4AA

SHA256:

0CC6BF6D8E866C368CF271203EB9468BBBA9202ADA100CA352CEAE15C05FDEC4

SSDEEP:

393216:/6aR+AcSw736z592AAQYSpOpVmtQgfqwx8BxGEnqBaV8d8UZMSUKll:mmz59CGvtTdx8nAB+8nZMjal

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • UserDiag.exe (PID: 7812)
  • INFO

    • Reads mouse settings

      • UserDiag.exe (PID: 7812)
    • The sample compiled with english language support

      • UserDiag.exe (PID: 7812)
    • Reads the machine GUID from the registry

      • UserDiag.exe (PID: 7812)
    • Reads the computer name

      • UserDiag.exe (PID: 7812)
      • curl.exe (PID: 7840)
    • Execution of CURL command

      • UserDiag.exe (PID: 7812)
    • Create files in a temporary directory

      • UserDiag.exe (PID: 7812)
    • Checks supported languages

      • UserDiag.exe (PID: 7812)
      • curl.exe (PID: 7840)
    • The process uses AutoIt

      • UserDiag.exe (PID: 7812)
    • Reads the software policy settings

      • slui.exe (PID: 8072)
    • Checks proxy server information

      • slui.exe (PID: 8072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:10 15:22:18+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 633856
InitializedDataSize: 50163200
UninitializedDataSize: -
EntryPoint: 0x204f7
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 25.5.4.0
ProductVersionNumber: 25.5.4.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 25.5.4
Comments: UserDiag
FileDescription: UserDiag
ProductName: UserDiag
ProductVersion: 25.5.4
CompanyName: SkyEmie_
LegalCopyright: Copyright © since 2020 - All rights reserved
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start userdiag.exe curl.exe conhost.exe no specs slui.exe userdiag.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7720"C:\Users\admin\Desktop\UserDiag.exe" C:\Users\admin\Desktop\UserDiag.exeexplorer.exe
User:
admin
Company:
SkyEmie_
Integrity Level:
MEDIUM
Description:
UserDiag
Exit code:
3221226540
Version:
25.5.4
Modules
Images
c:\users\admin\desktop\userdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7812"C:\Users\admin\Desktop\UserDiag.exe" C:\Users\admin\Desktop\UserDiag.exe
explorer.exe
User:
admin
Company:
SkyEmie_
Integrity Level:
HIGH
Description:
UserDiag
Version:
25.5.4
Modules
Images
c:\users\admin\desktop\userdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7840"C:\WINDOWS\Sysnative\curl.exe" "https://userdiag.com/api/v1/build-metadata?sys_lang=us&app_lang=us&app_version=25.5.4" -k -v -m 15 --retry 1 --retry-delay 5C:\Windows\System32\curl.exe
UserDiag.exe
User:
admin
Company:
curl, https://curl.se/
Integrity Level:
HIGH
Description:
The curl executable
Exit code:
0
Version:
8.4.0
Modules
Images
c:\windows\system32\curl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
7852\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execurl.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
8072C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 699
Read events
3 699
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
9
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\autF9D4.tmpbinary
MD5:6CD5DEB51E8A09D6EBE0DDCCCDD87C63
SHA256:7AF37E44EF03F12DDA818CCF5BC1C60757F182CB58F759D587421779B8FA525F
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\aut4C2.tmpbinary
MD5:95A1448CBBBB8C5B84146A78CC50474E
SHA256:E2B8B0B4C0C05B273536405ECFD6E0E7C915E2F8CC472A18786675885D75A2B0
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\autF985.tmpbinary
MD5:4713BCC39E651DD8E9C0956263EB34B9
SHA256:EA36D0F1B6147182FE013211039B715122F7ECDA4430E90421B6DAFCE7C10E6D
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\udiag\logo.icoimage
MD5:9AF3FADAC4C9E086392327505C651164
SHA256:3B331F678C1BC0B73339F2E6F506C9B9EDD3D20DF8D7D1C73B32DA96AE126256
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\udiag\bg_menu4.bmpimage
MD5:A9C702473D44B4C42ADA76343CA27A98
SHA256:B6640AC899A159EA956A94EE64CD36119A05C3CA866EB9EF44845F30566FF631
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\udiag\bg_diag.bmpimage
MD5:3C2DF549FA55E0E0D7CB46DBFC696397
SHA256:4B99C30AFA745BA9AFE160810CE03D938F85FA53E8B29CE8C64DEB022580A995
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\aut5A0.tmpbinary
MD5:73E4F4172ED03746F49F6D0FEC2936EA
SHA256:C15085B96E4E76B8CD0D94DF7E239EE051BCD3878D674AE3CC488E6554F2958E
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\~DF1211CCAA766D74AD.TMPbinary
MD5:086F6BA91100E719B013B0BA1BF71326
SHA256:C5F9AA6BC8E5E89B6E9A5646C9C76F48CA4B7E63233A57FC9EEB48E74D95849A
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\aut571.tmpbinary
MD5:3861F528B71D74CED1EED077AC8C17CE
SHA256:EE8A5CC02E4B11C0A11BBAE5FDA3A33AC874824DD222B4293A532DE593AF4745
7812UserDiag.exeC:\Users\admin\AppData\Local\Temp\udiag\bg_menu1.bmpimage
MD5:EB8E7DDDBD829F743627A2DEADF8570C
SHA256:8CA4E8387BBA57C348880717DA915E14C28EC3E31195978EE252C0D519C206DC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
22
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7840
curl.exe
104.21.32.1:443
userdiag.com
CLOUDFLARENET
unknown
7348
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8072
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.78
whitelisted
userdiag.com
  • 104.21.32.1
  • 104.21.112.1
  • 104.21.96.1
  • 104.21.80.1
  • 104.21.64.1
  • 104.21.48.1
  • 104.21.16.1
unknown
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info