File name:

BSOD.bat

Full analysis: https://app.any.run/tasks/7d6732a6-e725-4c0a-ba6e-8fe0767e430b
Verdict: Malicious activity
Analysis date: August 02, 2025, 02:33:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: text/x-msdos-batch
File info: DOS batch file, ASCII text
MD5:

8ECF12DDF752A339440CFC46A49F16CD

SHA1:

15A79DC05270705D6462C524CFB65326DF702CCF

SHA256:

6F1123FB13CA072836E8BB67D2B6E2882EF7FAA376143E36AF41D6513206BC69

SSDEEP:

3:mKDDUFcTwi9ufyM1K/RFofD6tRQpohLQ0+jnNCG85JSYsdL0in:hzTN9uH1MUmt2psQ0aQ/cYKLJn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • cmd.exe (PID: 3576)
  • SUSPICIOUS

    • Uses NETSH.EXE to trace traffic

      • sdiagnhost.exe (PID: 4072)
    • Checks a user's role membership (POWERSHELL)

      • sdiagnhost.exe (PID: 4072)
    • Uses RUNDLL32.EXE to load library

      • cmd.exe (PID: 3576)
    • Probably uses Microsoft diagnostics tool to execute malicious payload

      • rundll32.exe (PID: 4172)
  • INFO

    • Gets data length (POWERSHELL)

      • sdiagnhost.exe (PID: 4072)
    • Creates files in the program directory

      • msdt.exe (PID: 3504)
    • Creates files or folders in the user directory

      • msdt.exe (PID: 3504)
    • The sample compiled with english language support

      • msdt.exe (PID: 3504)
    • Launching a file from the Startup directory

      • cmd.exe (PID: 3576)
    • Create files in a temporary directory

      • msdt.exe (PID: 3504)
      • sdiagnhost.exe (PID: 4072)
    • Reads the software policy settings

      • msdt.exe (PID: 3504)
    • Reads security settings of Internet Explorer

      • msdt.exe (PID: 3504)
      • sdiagnhost.exe (PID: 4072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cmd.exe conhost.exe no specs rundll32.exe no specs msdt.exe no specs sdiagnhost.exe no specs conhost.exe no specs netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3504 -skip TRUE -path "C:\WINDOWS\diagnostics\system\networking" -af "C:\Users\admin\AppData\Local\Temp\NDFF567.tmp" -ep "NetworkDiagnosticsSharing"C:\Windows\System32\msdt.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Diagnostics Troubleshooting Wizard
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msdt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3576C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\BSOD.bat" "C:\Windows\System32\cmd.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
3844\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4072C:\WINDOWS\System32\sdiagnhost.exe -EmbeddingC:\Windows\System32\sdiagnhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Scripted Diagnostics Native Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sdiagnhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
4172"C:\WINDOWS\system32\rundll32.exe" ndfapi.dll,NdfRunDllDiagnoseWithAnswerFile NetworkDiagnosticsSharing C:\Users\admin\AppData\Local\Temp\NDFF567.tmpC:\Windows\System32\rundll32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5460\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesdiagnhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6684"C:\WINDOWS\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter C:\Windows\System32\netsh.exesdiagnhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
7 142
Read events
7 142
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
14
Text files
23
Unknown types
0

Dropped files

PID
Process
Filename
Type
3504msdt.exeC:\Users\admin\AppData\Local\Temp\SDIAG_1e82808e-cdd2-4066-8520-4c4aba3e0381\DiagPackage.diagpkgxml
MD5:0606098A37089BDC9D644DEE1CC1CD78
SHA256:284A7A8525B1777BDBC194FA38D28CD9EE91C2CBC7856F5968E79667C6B62A9D
3576cmd.exeC:\Users\admin\AppData\Local\Temp\NDFF567.tmpbinary
MD5:C8A87EFE6CCB6EDA63CC11F79490425E
SHA256:7B1C91859B020F8CBE839CA829266F9AB676C37FE0FBEC9F8D79ED2CD5E180A5
3576cmd.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bsod.battext
MD5:8ECF12DDF752A339440CFC46A49F16CD
SHA256:6F1123FB13CA072836E8BB67D2B6E2882EF7FAA376143E36AF41D6513206BC69
3504msdt.exeC:\Users\admin\AppData\Local\Temp\SDIAG_1e82808e-cdd2-4066-8520-4c4aba3e0381\UtilitySetConstants.ps1text
MD5:0C75AE5E75C3E181D13768909C8240BA
SHA256:DE5C231C645D3AE1E13694284997721509F5DE64EE5C96C966CDFDA9E294DB3F
3504msdt.exeC:\Users\admin\AppData\Local\Temp\SDIAG_1e82808e-cdd2-4066-8520-4c4aba3e0381\StartDPSService.ps1text
MD5:A660422059D953C6D681B53A6977100E
SHA256:D19677234127C38A52AEC23686775A8EB3F4E3A406F4A11804D97602D6C31813
3504msdt.exeC:\Users\admin\AppData\Local\Temp\SDIAG_1e82808e-cdd2-4066-8520-4c4aba3e0381\en-US\DiagPackage.dll.muiexecutable
MD5:44C4385447D4FA46B407FC47C8A467D0
SHA256:8BE175E8FBDAE0DADE54830FECE6C6980D1345DBEB4A06C07F7EFDB1152743F4
4072sdiagnhost.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lo4o4rk3.n4j.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
3504msdt.exeC:\Users\admin\AppData\Local\Temp\SDIAG_1e82808e-cdd2-4066-8520-4c4aba3e0381\NetworkDiagnosticsResolve.ps1text
MD5:D213491A2D74B38A9535D616B9161217
SHA256:4662C3C94E0340A243C2A39CA8A88FD9F65C74FB197644A11D4FFCAE6B191211
3504msdt.exeC:\Users\admin\AppData\Local\Temp\SDIAG_1e82808e-cdd2-4066-8520-4c4aba3e0381\UtilityFunctions.ps1text
MD5:C912FAA190464CE7DEC867464C35A8DC
SHA256:3891846307AA9E83BCA66B13198455AF72AF45BF721A2FBD41840D47E2A91201
4072sdiagnhost.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ld153s0x.qxy.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
17
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.110.211:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1380
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
7124
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
20.72.205.209:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1268
svchost.exe
23.55.110.211:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1380
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1380
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.72.205.209
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 23.55.110.211
  • 23.55.110.193
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2a02:26f0:1700:1a2::356e
  • 2a02:26f0:1700:1af::356e
  • 2a02:26f0:1700:197::356e
whitelisted
login.live.com
  • 40.126.31.129
  • 40.126.31.73
  • 40.126.31.3
  • 40.126.31.69
  • 40.126.31.130
  • 20.190.159.2
  • 20.190.159.130
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted

Threats

No threats detected
No debug info