File name:

rufus-4.11.exe

Full analysis: https://app.any.run/tasks/f97087b4-df3a-4b33-b513-3574b7fda2c9
Verdict: Malicious activity
Analysis date: November 09, 2025, 00:02:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 3 sections
MD5:

5B86D4F2CE7D2AB212914C634D20F714

SHA1:

FD96FD51231E449678D71C7A5F8A2308B1C88375

SHA256:

ABBF04D50A44A9612C027FC8072F6DA67F5BCDA2B826F1F852C9C24D7A1FCDFF

SSDEEP:

98304:/tLadtyVqWVX1+JhThc5lBH9IR3/kxjcLjhs4ArFt/a6M7dMI9IDi6pBYcyXnoA2:Fg4Cly

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the Windows auto-update feature

      • rufus-4.11.exe (PID: 7736)
  • SUSPICIOUS

    • Executes as Windows Service

      • vds.exe (PID: 7872)
    • Reads security settings of Internet Explorer

      • rufus-4.11.exe (PID: 7736)
  • INFO

    • Reads the machine GUID from the registry

      • rufus-4.11.exe (PID: 7736)
    • Process checks whether UAC notifications are on

      • rufus-4.11.exe (PID: 7736)
    • Reads the computer name

      • rufus-4.11.exe (PID: 7736)
      • vlc.exe (PID: 5144)
    • Checks supported languages

      • rufus-4.11.exe (PID: 7736)
      • vlc.exe (PID: 5144)
    • Create files in a temporary directory

      • rufus-4.11.exe (PID: 7736)
    • UPX packer has been detected

      • rufus-4.11.exe (PID: 7736)
    • Manual execution by a user

      • vlc.exe (PID: 5144)
      • WINWORD.EXE (PID: 8000)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2095:05:10 17:21:16+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.44
CodeSize: 1884160
InitializedDataSize: 45056
UninitializedDataSize: 3776512
EntryPoint: 0x5658c0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 4.11.2285.0
ProductVersionNumber: 4.11.2285.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: https://rufus.ie
CompanyName: Akeo Consulting
FileDescription: Rufus
FileVersion: 4.11.2285
InternalName: Rufus
LegalCopyright: © 2011-2025 Pete Batard (GPL v3)
LegalTrademarks: https://www.gnu.org/licenses/gpl-3.0.html
OriginalFileName: rufus-4.11.exe
ProductName: Rufus
ProductVersion: 4.11.2285
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
164
Monitored processes
8
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rufus-4.11.exe vdsldr.exe no specs vds.exe no specs vlc.exe winword.exe ai.exe no specs slui.exe no specs rufus-4.11.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1664C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5144"C:\Program Files\VideoLAN\VLC\vlc.exe" C:\Program Files\VideoLAN\VLC\vlc.exe
explorer.exe
User:
admin
Company:
VideoLAN
Integrity Level:
MEDIUM
Description:
VLC media player
Exit code:
0
Version:
3.0.11
Modules
Images
c:\program files\videolan\vlc\vlc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\program files\videolan\vlc\libvlc.dll
c:\windows\system32\rpcrt4.dll
5540"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "D60EFDDD-E761-4766-8F77-72B9CAEB5F0F" "D3B3A6AD-4F06-43D5-9F5B-6BDE55C16425" "8000"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Exit code:
0
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\sechost.dll
7576"C:\Users\admin\AppData\Local\Temp\rufus-4.11.exe" C:\Users\admin\AppData\Local\Temp\rufus-4.11.exeexplorer.exe
User:
admin
Company:
Akeo Consulting
Integrity Level:
MEDIUM
Description:
Rufus
Exit code:
3221226540
Version:
4.11.2285
Modules
Images
c:\users\admin\appdata\local\temp\rufus-4.11.exe
c:\windows\system32\ntdll.dll
7736"C:\Users\admin\AppData\Local\Temp\rufus-4.11.exe" C:\Users\admin\AppData\Local\Temp\rufus-4.11.exe
explorer.exe
User:
admin
Company:
Akeo Consulting
Integrity Level:
HIGH
Description:
Rufus
Version:
4.11.2285
Modules
Images
c:\users\admin\appdata\local\temp\rufus-4.11.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7832C:\WINDOWS\System32\vdsldr.exe -EmbeddingC:\Windows\System32\vdsldr.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Virtual Disk Service Loader
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vdsldr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7872C:\WINDOWS\System32\vds.exeC:\Windows\System32\vds.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Virtual Disk Service
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vds.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
8000"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Desktop\marketsoperations.rtf" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\rpcrt4.dll
Total events
12 632
Read events
12 271
Write events
303
Delete events
58

Modification events

(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\AppHVSI
Operation:writeName:AllowAppHVSI_ProviderSet
Value:
0
(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\EdgeUpdate
Operation:writeName:UpdateDefault
Value:
0
(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\Windows\Network Connections
Operation:writeName:NC_DoNotShowLocalOnlyIcon
Value:
1
(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\Windows\System
Operation:writeName:EnableSmartScreen
Value:
0
(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\Windows\System
Operation:writeName:**del.ShellSmartScreenLevel
Value:
(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\Windows\Windows Feeds
Operation:writeName:EnableFeeds
Value:
0
(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:WUServer
Value:
http://neverupdatewindows10.com
(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:WUStatusServer
Value:
http://neverupdatewindows10.com
(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:UpdateServiceUrlAlternate
Value:
http://neverupdatewindows10.com
(PID) Process:(7736) rufus-4.11.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{616F0CE8-4A78-4CD3-B496-9BB27100664A}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:**del.FillEmptyContentUrls
Value:
Executable files
3
Suspicious files
31
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
7736rufus-4.11.exeC:\Users\admin\AppData\Local\Temp\Ruf2426.tmptext
MD5:727ED48003879D07D5CC9D0EE5F41ECF
SHA256:F63525DEE1D721CF2C766E964AA85A6C156B3EE5B434AAD01C8AADB40BB6AFB9
7736rufus-4.11.exeC:\Windows\System32\GroupPolicy\gpt.initext
MD5:1C2D4956F25997CEA7C091A6A4F8BEDF
SHA256:EA889DF210FF232993BD7791C23372E0F4AE0A9CD43DD27A1D91103BE40591C6
7736rufus-4.11.exeC:\Windows\System32\GroupPolicy\Machine\Registry.polbinary
MD5:39E5BE35CC598F9086924A39E1105BF8
SHA256:1C26BCB05CA50C85751D3023494D2E4D35F56D74451AC47880FD239F3B54F171
8000WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\marketsoperations.rtf.LNKbinary
MD5:06240A6B9BBFF84E71F9B26E6F299541
SHA256:E65A46E8C103CA81A2744A670B40EFD5935BB2404107A64E34D2BBC15EAF08C6
8000WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\5475cb191e478c39370a215b2da98a37e9dc813d.tbresbinary
MD5:FC06CD682168493A914A73AB317523C6
SHA256:ACA56A23BCF39313C8EF1AC99C67A758E6FCF84E4FB2431963B5875780BE2F2C
8000WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\FontCache\4\PreviewFont\flat_officeFontsPreview_4_42.ttfbinary
MD5:8BDF396FED21EED0F788CB9A23775A1E
SHA256:BD6575CBCF808C13421BF03886E008624B85B6CE23651949BCFBD10EBD8452BE
8000WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:60BD1C10BAD1383B6FB973BD487075C6
SHA256:CE2E0C3B14D0714C13FCDB4FBA73B20BFFB2144C96D6A99AB76CAF005DDE9D46
8000WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:1A396CBDD7DBA5CC9F6F98BB5C6A9ED5
SHA256:038B4A2C31FAD1D9E27D4B3392F0BC9EC97F6FAE6EA19205DF75611F43E85189
8000WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\FontCache\4\Catalog\ListAll.Jsonbinary
MD5:7C5578BC58BDE6DC855D5C929CF54232
SHA256:A48ACBE81F33E5918B096A6B89687E505DA0E79196F74DC48B6E068708378A3F
8000WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Personalization\Governance\Anonymous\floodgatecampaigns.json.tmpbinary
MD5:762442E5C8FD24550CA6962D9788BE92
SHA256:A88B7E4F527375E94168100344297A76A1FF2715AD6B5304A474ADB8A732C271
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
34
DNS requests
25
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
932
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5656
svchost.exe
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7288
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl
unknown
whitelisted
7288
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.3.crl
unknown
whitelisted
8000
WINWORD.EXE
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7288
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
unknown
whitelisted
8000
WINWORD.EXE
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5656
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6168
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5596
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7088
SearchApp.exe
2.16.241.218:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2276
svchost.exe
224.0.0.252:5355
whitelisted
2276
svchost.exe
224.0.0.251:5353
whitelisted
5656
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5656
svchost.exe
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 4.231.128.59
whitelisted
www.bing.com
  • 2.16.241.218
  • 2.16.241.205
  • 2.16.241.201
whitelisted
google.com
  • 142.250.186.46
whitelisted
crl.microsoft.com
  • 95.101.78.32
  • 95.101.78.42
whitelisted
login.live.com
  • 40.126.32.133
  • 20.190.160.67
  • 20.190.160.128
  • 20.190.160.66
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.136
  • 20.190.160.5
whitelisted
ocsp.digicert.com
  • 23.63.118.230
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 20.165.94.63
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
Process
Message
rufus-4.11.exe
*** Rufus init ***
rufus-4.11.exe
App dir: 'C:\Users\admin\AppData\Local\Temp\'
rufus-4.11.exe
Tmp dir: 'C:\Users\admin\AppData\Local\Temp\'
rufus-4.11.exe
Dat dir: 'C:\Users\admin\AppData\Local'
rufus-4.11.exe
Cur dir: 'C:\Users\admin\AppData\Local\Temp\'
rufus-4.11.exe
Sys dir: 'C:\WINDOWS\system32'
rufus-4.11.exe
Usr dir: 'C:\Users\admin'
rufus-4.11.exe
Will use settings from registry
rufus-4.11.exe
Binary executable is signed by 'Akeo Consulting'
rufus-4.11.exe
loc file not found in current directory - embedded one will be used