File name:

SDI_x64_R2503.exe

Full analysis: https://app.any.run/tasks/8c1fca1c-9f49-42bc-bb7e-62dab5baa7e8
Verdict: Malicious activity
Analysis date: April 25, 2025, 06:28:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
bittorrent
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 10 sections
MD5:

9EFE93E16003613E45640BBCFB661D9A

SHA1:

E64BF7DF324BD5B2773F166A37C96B9C107D8705

SHA256:

A7F9959E42293A5A1056F03800C25C28B86D78CA196F6E9F9A24244AA5C444E9

SSDEEP:

98304:pJaF7p0B80o4rBpp7Ef9CKY+DGPfJWoDNE0nk+dtSDk8qmoHfj4SMkUMrbQC4UMa:/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • BITTORRENT has been detected (SURICATA)

      • SDI_x64_R2503.exe (PID: 7572)
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • SDI_x64_R2503.exe (PID: 7572)
    • Potential Corporate Privacy Violation

      • SDI_x64_R2503.exe (PID: 7572)
    • Connects to unusual port

      • SDI_x64_R2503.exe (PID: 7572)
    • Reads security settings of Internet Explorer

      • SDI_x64_R2503.exe (PID: 7572)
    • Starts CMD.EXE for commands execution

      • SDI_x64_R2503.exe (PID: 7572)
    • Reads the date of Windows installation

      • SDI_x64_R2503.exe (PID: 7572)
  • INFO

    • The sample compiled with english language support

      • SDI_x64_R2503.exe (PID: 7572)
    • Reads Environment values

      • SDI_x64_R2503.exe (PID: 7572)
    • Checks supported languages

      • SDI_x64_R2503.exe (PID: 7572)
    • Reads the computer name

      • SDI_x64_R2503.exe (PID: 7572)
    • Create files in a temporary directory

      • SDI_x64_R2503.exe (PID: 7572)
    • Process checks computer location settings

      • SDI_x64_R2503.exe (PID: 7572)
    • Reads the software policy settings

      • slui.exe (PID: 7652)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.3)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:03:07 15:17:36+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 2.25
CodeSize: 4171776
InitializedDataSize: 5518336
UninitializedDataSize: 186368
EntryPoint: 0x1500
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
FileVersionNumber: 1.25.3.2503
ProductVersionNumber: 1.25.3.2503
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: www.SamLab.ws
FileDescription: Snappy Driver Installer
FileVersion: 1.25 1.25.3
LegalCopyright: GNU GPL v3
OriginalFileName: SDI_1.25.3.exe
ProductName: Snappy Driver Installer
ProductVersion: 1.25.3
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
9
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #BITTORRENT sdi_x64_r2503.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs sdi_x64_r2503.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1164\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2108"C:\Windows\System32\cmd.exe" /c rd /s /q updateC:\Windows\System32\cmd.exeSDI_x64_R2503.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
2568"C:\Windows\System32\cmd.exe" /c del indexes\SDI\_*.binC:\Windows\System32\cmd.exeSDI_x64_R2503.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
4380\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7464"C:\Users\admin\AppData\Local\Temp\SDI_x64_R2503.exe" C:\Users\admin\AppData\Local\Temp\SDI_x64_R2503.exeexplorer.exe
User:
admin
Company:
www.SamLab.ws
Integrity Level:
MEDIUM
Description:
Snappy Driver Installer
Exit code:
3221226540
Version:
1.25 1.25.3
Modules
Images
c:\users\admin\appdata\local\temp\sdi_x64_r2503.exe
c:\windows\system32\ntdll.dll
7572"C:\Users\admin\AppData\Local\Temp\SDI_x64_R2503.exe" C:\Users\admin\AppData\Local\Temp\SDI_x64_R2503.exe
explorer.exe
User:
admin
Company:
www.SamLab.ws
Integrity Level:
HIGH
Description:
Snappy Driver Installer
Version:
1.25 1.25.3
Modules
Images
c:\users\admin\appdata\local\temp\sdi_x64_r2503.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7584\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSDI_x64_R2503.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7612C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7652"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 632
Read events
2 632
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
140
Text files
238
Unknown types
0

Dropped files

PID
Process
Filename
Type
7572SDI_x64_R2503.exeC:\Users\admin\AppData\Local\Temp\update\SDI_RUS\indexes\SDI\DP_WLAN-WiFi_25030.binbinary
MD5:EDB98E9E31CE5258BB16441A045ED110
SHA256:C0ECD0DC52EB58316D06E6B1F74054C56BF06DF47AB1068AD76DFFB606766E52
7572SDI_x64_R2503.exeC:\Users\admin\AppData\Local\Temp\update\SDI_RUS\indexes\SDI\DP_Monitor_25030.binbinary
MD5:D6F2BB86275397EBE5F9F81CC7250171
SHA256:67E82413ABC325037DBB7E4185FA6DEC956447AD12D1D7A67AD95EE7182A7B66
7572SDI_x64_R2503.exeC:\Users\admin\AppData\Local\Temp\logs\2025_04_25__06_28_29__DESKTOP-JGLLJLD_state.snpbinary
MD5:A6C2A03D092AF05FE64E2A35199E1BED
SHA256:6891738B7943135E23F62FFCEB8E1C1F425A78324CBC9CFB8B13C4F519DE6BC5
7572SDI_x64_R2503.exeC:\Windows\INF\c_diskdrive.PNFbinary
MD5:46C721C4B5C76531BEEDD67F77025D23
SHA256:5FEECEB625F66967C9D9264E463F612976A109967F4B4B2A89F824D4D051FEF6
7572SDI_x64_R2503.exeC:\Windows\INF\display.PNFbinary
MD5:F0EF7B8986F812DC4F6BD50A670ED00D
SHA256:99E1EE8E113BAF527D32560C223C0036E3F2459104B850BA238B831128C8A7AD
7572SDI_x64_R2503.exeC:\Users\admin\AppData\Local\Temp\update\SDI_RUS\indexes\SDI\DP_LAN_Realtek-NT_25030.binbinary
MD5:0D1FAA512B7E4191205357B1FB69616D
SHA256:C5396C9AD045A62C43038F7C6FD6C375E73226E5864FEF90150B1FCF25D23C6A
7572SDI_x64_R2503.exeC:\Windows\INF\wvid.PNFbinary
MD5:108D2FAE49AF6F278B92AAC4404EC91A
SHA256:267FE449DBF70DA2C61DAE23D9DD7777105D5088496487F2B6763779CEC833CE
7572SDI_x64_R2503.exeC:\Users\admin\AppData\Local\Temp\update\SDI_RUS\drivers\DP_TV_Beholder_25000.7zbinary
MD5:61155A680201924B470C02ED7ED16391
SHA256:DBFA765A85F0429E22331BA4C5A8E72FEE2CB25EBF31E38B699620F9666EA69D
7572SDI_x64_R2503.exeC:\Users\admin\AppData\Local\Temp\update\SDI_RUS\indexes\SDI\DP_Misc_25030.binbinary
MD5:721E0A953E30F06EAE8503A55F2C1BA9
SHA256:A028C2B2EC0E8F0FDB336182F6139C2785151AFC7E46AD139EC89A9A0AC64E93
7572SDI_x64_R2503.exeC:\Users\admin\AppData\Local\Temp\update\SDI_RUS\indexes\SDI\DP_Sounds_Realtek_25020.binbinary
MD5:E747905EB1509C5D6D4D7B417D0A3934
SHA256:DA3F6BD3D813AA8B869DE937B02070348062D3F1B68512E3D27D4AF81880324F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
597
DNS requests
21
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
92.122.244.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.56.30.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7572
SDI_x64_R2503.exe
GET
200
185.26.122.80:80
http://sdi.com.ru/SDI_Update.torrent
unknown
unknown
7572
SDI_x64_R2503.exe
GET
200
185.230.4.150:1337
http://p4p.arenabg.com:1337/announce?info_hash=%93.%1a%fd%23%be%a5u%ce%7c%8b%ce%82%7f%19%9f%c6%95%d0_&peer_id=-LT1000-INg1lF7h8.xN&port=50171&uploaded=0&downloaded=0&left=47362897092&corrupt=0&key=14EAD1AB&event=started&numwant=200&compact=1&no_peer_id=1&supportcrypto=1&redundant=0
unknown
whitelisted
7388
SIHClient.exe
GET
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7388
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7572
SDI_x64_R2503.exe
GET
200
185.230.4.150:1337
http://p4p.arenabg.com:1337/announce?info_hash=%93.%1a%fd%23%be%a5u%ce%7c%8b%ce%82%7f%19%9f%c6%95%d0_&peer_id=-LT1000-INg1lF7h8.xN&port=50171&uploaded=0&downloaded=21795844&left=47341109248&corrupt=0&key=14EAD1AB&event=stopped&numwant=0&compact=1&no_peer_id=1&supportcrypto=1&redundant=0
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
92.122.244.32:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.56.30.102:80
www.microsoft.com
AKAMAI-AS
HK
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown
6544
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
23.63.118.230:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.206
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 92.122.244.32
  • 92.122.244.42
whitelisted
www.microsoft.com
  • 23.56.30.102
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.14
  • 20.190.160.64
  • 20.190.160.132
  • 20.190.160.22
  • 20.190.160.20
  • 20.190.160.130
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 23.63.118.230
whitelisted
router.bittorrent.com
  • 67.215.246.10
whitelisted
router.utorrent.com
  • 82.221.103.244
whitelisted
router.bitcomet.com
unknown

Threats

PID
Process
Class
Message
7572
SDI_x64_R2503.exe
Potential Corporate Privacy Violation
ET P2P Possible Torrent Download via HTTP Request
7572
SDI_x64_R2503.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent - Torrent File Downloaded
7572
SDI_x64_R2503.exe
Potential Corporate Privacy Violation
GPL P2P BitTorrent announce request
7572
SDI_x64_R2503.exe
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
7572
SDI_x64_R2503.exe
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
No debug info