File name:

PXEBoot.exe

Full analysis: https://app.any.run/tasks/6b6009a7-6cc8-48b4-af21-504be971382d
Verdict: Malicious activity
Analysis date: April 26, 2025, 19:47:14
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

3256DBF718362D0C99963C0B39894A81

SHA1:

95286AC18E9B81C2A68412C406B791DFE8B91400

SHA256:

982BB7FDF2AA85A0E233462B9B47F368AD7B4FD8ACACF8185C0B5C3B96286796

SSDEEP:

393216:ZlC1Px/Q6XT3XuqqIFMtWs/+Gh+hC0/tew3:Zlsx//TVFMtWsGGYC0Mw3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • PXEBoot.exe (PID: 4892)
      • PXEBoot.exe (PID: 6728)
      • PXEBoot.exe (PID: 4244)
      • PXEBoot.exe (PID: 5548)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • PXEBoot.tmp (PID: 4040)
    • Process drops legitimate windows executable

      • PXEBoot.tmp (PID: 4040)
    • The process drops C-runtime libraries

      • PXEBoot.tmp (PID: 4040)
    • Executable content was dropped or overwritten

      • PXEBoot.tmp (PID: 4040)
      • PXEBoot.exe (PID: 4892)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • PXEBoot.exe (PID: 4244)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • PXEBoot.exe (PID: 4244)
  • INFO

    • Checks supported languages

      • PXEBoot.tmp (PID: 4040)
      • PXEBoot.exe (PID: 4892)
      • PXEBoot.exe (PID: 4244)
    • Reads the computer name

      • PXEBoot.tmp (PID: 4040)
      • PXEBoot.exe (PID: 4244)
    • Create files in a temporary directory

      • PXEBoot.exe (PID: 4892)
      • PXEBoot.tmp (PID: 4040)
    • Creates files in the program directory

      • PXEBoot.tmp (PID: 4040)
    • Creates a software uninstall entry

      • PXEBoot.tmp (PID: 4040)
    • Creates files or folders in the user directory

      • PXEBoot.tmp (PID: 4040)
    • The sample compiled with english language support

      • PXEBoot.tmp (PID: 4040)
    • Detects InnoSetup installer (YARA)

      • PXEBoot.exe (PID: 4892)
    • Manual execution by a user

      • PXEBoot.exe (PID: 5548)
      • PXEBoot.exe (PID: 4244)
    • Compiled with Borland Delphi (YARA)

      • PXEBoot.exe (PID: 4892)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (77.7)
.exe | Win32 Executable Delphi generic (10)
.dll | Win32 Dynamic Link Library (generic) (4.6)
.exe | Win32 Executable (generic) (3.1)
.exe | Win16/32 Executable Delphi generic (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:12:20 14:16:50+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 86016
InitializedDataSize: 53760
UninitializedDataSize: -
EntryPoint: 0x16478
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.5.0.0
ProductVersionNumber: 1.5.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: AOMEI Technology Co., Ltd.
FileDescription:
FileVersion: 1.5
LegalCopyright:
ProductName:
ProductVersion: 1.5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
9
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start pxeboot.exe pxeboot.tmp pxeboot.exe no specs pxeboot.exe netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs pxeboot.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1052C:\WINDOWS\system32\netsh.exe advfirewall firewall add rule name = "ampxe" dir=in program = "C:\Program Files (x86)\AOMEI PXE Boot Free 1.5\PXEBoot.exe" action="allow"C:\Windows\SysWOW64\netsh.exePXEBoot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4040"C:\Users\admin\AppData\Local\Temp\is-FDVBS.tmp\PXEBoot.tmp" /SL5="$802C6,12730523,140800,C:\Users\admin\AppData\Local\Temp\PXEBoot.exe" C:\Users\admin\AppData\Local\Temp\is-FDVBS.tmp\PXEBoot.tmp
PXEBoot.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-fdvbs.tmp\pxeboot.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
4120C:\WINDOWS\system32\netsh.exe advfirewall firewall delete rule name = "ampxe"C:\Windows\SysWOW64\netsh.exePXEBoot.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4244"C:\Program Files (x86)\AOMEI PXE Boot Free 1.5\PXEBoot.exe" C:\Program Files (x86)\AOMEI PXE Boot Free 1.5\PXEBoot.exe
explorer.exe
User:
admin
Company:
AOMEI Tech Co., Ltd.
Integrity Level:
HIGH
Description:
AOMEI PXE Boot Free
Version:
1, 5, 0, 0
Modules
Images
c:\program files (x86)\aomei pxe boot free 1.5\pxeboot.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4892"C:\Users\admin\AppData\Local\Temp\PXEBoot.exe" C:\Users\admin\AppData\Local\Temp\PXEBoot.exe
explorer.exe
User:
admin
Company:
AOMEI Technology Co., Ltd.
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
1.5
Modules
Images
c:\users\admin\appdata\local\temp\pxeboot.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5548"C:\Program Files (x86)\AOMEI PXE Boot Free 1.5\PXEBoot.exe" C:\Program Files (x86)\AOMEI PXE Boot Free 1.5\PXEBoot.exeexplorer.exe
User:
admin
Company:
AOMEI Tech Co., Ltd.
Integrity Level:
MEDIUM
Description:
AOMEI PXE Boot Free
Exit code:
3221226540
Version:
1, 5, 0, 0
Modules
Images
c:\program files (x86)\aomei pxe boot free 1.5\pxeboot.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5868\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5968\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6728"C:\Users\admin\AppData\Local\Temp\PXEBoot.exe" C:\Users\admin\AppData\Local\Temp\PXEBoot.exeexplorer.exe
User:
admin
Company:
AOMEI Technology Co., Ltd.
Integrity Level:
MEDIUM
Description:
Exit code:
3221226540
Version:
1.5
Modules
Images
c:\users\admin\appdata\local\temp\pxeboot.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
833
Read events
810
Write events
23
Delete events
0

Modification events

(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AOMEI PXE Boot Free
Operation:writeName:AOMEI PXE Boot Free
Value:
1.0
(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AOMEI PXE Boot Free
Operation:writeName:UninstallString
Value:
C:\Program Files (x86)\AOMEI PXE Boot Free 1.5\unins000.exe
(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A83692F5-3E9B-4E95-9E7E-B5DF5566009D}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
5.4.3 (u)
(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A83692F5-3E9B-4E95-9E7E-B5DF5566009D}_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files (x86)\AOMEI PXE Boot Free 1.5
(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A83692F5-3E9B-4E95-9E7E-B5DF5566009D}_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\AOMEI PXE Boot Free 1.5\
(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A83692F5-3E9B-4E95-9E7E-B5DF5566009D}_is1
Operation:writeName:Inno Setup: Icon Group
Value:
AOMEI PXE Boot Free 1.5
(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A83692F5-3E9B-4E95-9E7E-B5DF5566009D}_is1
Operation:writeName:Inno Setup: User
Value:
admin
(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A83692F5-3E9B-4E95-9E7E-B5DF5566009D}_is1
Operation:writeName:Inno Setup: Selected Tasks
Value:
desktopicon,quicklaunchicon
(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A83692F5-3E9B-4E95-9E7E-B5DF5566009D}_is1
Operation:writeName:Inno Setup: Deselected Tasks
Value:
(PID) Process:(4040) PXEBoot.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{A83692F5-3E9B-4E95-9E7E-B5DF5566009D}_is1
Operation:writeName:Inno Setup: Language
Value:
en
Executable files
49
Suspicious files
50
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
4040PXEBoot.tmpC:\Users\admin\AppData\Local\Temp\is-A3AGH.tmp\_isetup\_setup64.tmpexecutable
MD5:4FF75F505FDDCC6A9AE62216446205D9
SHA256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
4040PXEBoot.tmpC:\Program Files (x86)\AOMEI PXE Boot Free 1.5\unins000.exeexecutable
MD5:0DF42DBD2137C225B14395F1F410AB6D
SHA256:E5474591299AE03DF404A005EBF03C394B92EEFD2DC747B9546E38F359E1E2D9
4040PXEBoot.tmpC:\Program Files (x86)\AOMEI PXE Boot Free 1.5\Comn.dllexecutable
MD5:0B6A86F331FAEC2C8415946797DE6BF0
SHA256:12C3E6A3C5EA1902537456AAC9DFC1916F61B968711AC0A38A28FC67FD951AF5
4040PXEBoot.tmpC:\Program Files (x86)\AOMEI PXE Boot Free 1.5\is-J4JAU.tmpexecutable
MD5:689D2164F44644B467B9784125641844
SHA256:08D7E0222B15B712A7BD26486928229436C329494FDC61AAA0D4FE92EA538708
4040PXEBoot.tmpC:\Program Files (x86)\AOMEI PXE Boot Free 1.5\is-ENMN4.tmpexecutable
MD5:0B6A86F331FAEC2C8415946797DE6BF0
SHA256:12C3E6A3C5EA1902537456AAC9DFC1916F61B968711AC0A38A28FC67FD951AF5
4040PXEBoot.tmpC:\Program Files (x86)\AOMEI PXE Boot Free 1.5\libeay32.dllexecutable
MD5:5495393517944DF416CB9AE91CEEBC52
SHA256:6910CEAA13667C3E6A1C54D6B2A9609CA664E1962265D5EC4E0D59372ED8D6A2
4040PXEBoot.tmpC:\Program Files (x86)\AOMEI PXE Boot Free 1.5\is-RG6A1.tmpexecutable
MD5:033978C19E56E970C32733EA725969EF
SHA256:3058E1C4C7E63A376072CE5D8C2B165AA12DE787799731C50EC1431E0744B03F
4040PXEBoot.tmpC:\Program Files (x86)\AOMEI PXE Boot Free 1.5\mfc80u.dllexecutable
MD5:CCC2E312486AE6B80970211DA472268B
SHA256:18BE5D3C656236B7E3CD6D619D62496FE3E7F66BF2859E460F8AC3D1A6BDAA9A
4040PXEBoot.tmpC:\Program Files (x86)\AOMEI PXE Boot Free 1.5\is-1R1TL.tmpexecutable
MD5:CCC2E312486AE6B80970211DA472268B
SHA256:18BE5D3C656236B7E3CD6D619D62496FE3E7F66BF2859E460F8AC3D1A6BDAA9A
4040PXEBoot.tmpC:\Program Files (x86)\AOMEI PXE Boot Free 1.5\is-KSBLI.tmpexecutable
MD5:5495393517944DF416CB9AE91CEEBC52
SHA256:6910CEAA13667C3E6A1C54D6B2A9609CA664E1962265D5EC4E0D59372ED8D6A2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.170:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6148
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6148
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.170:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.132:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
23.54.109.203:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6148
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.170
  • 23.48.23.164
  • 23.48.23.168
  • 23.48.23.160
  • 23.48.23.171
  • 23.48.23.174
  • 23.48.23.169
  • 23.48.23.173
  • 23.48.23.158
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.132
  • 20.190.160.128
  • 40.126.32.74
  • 40.126.32.133
  • 20.190.160.5
  • 20.190.160.17
  • 20.190.160.14
  • 20.190.160.3
whitelisted
ocsp.digicert.com
  • 23.54.109.203
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info