File name:

dnd.exe

Full analysis: https://app.any.run/tasks/673b84aa-c1ac-427b-a3f1-603e07ec078b
Verdict: Malicious activity
Analysis date: September 03, 2025, 23:39:30
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

5758296F3834B8FE8DD1FB88BE88462C

SHA1:

5D15481E5A6E027FBBB8CF0EE20AA203AAD89C31

SHA256:

B147ACCAB90C0BA26F94D76D77D7DDB05DD298B9E3A3FC691352EF59FD92A4CD

SSDEEP:

98304:A6C17v/ZTws/+QOUOkFnmdDlSJdPuGeQVfZQ6H/El/C9nFSUhuqwhAXF5YgUqhTB:RrCBOLhUE8kaajA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • dnd.exe (PID: 6256)
      • dnd.exe (PID: 1212)
    • The process drops C-runtime libraries

      • dnd.exe (PID: 6256)
    • Executable content was dropped or overwritten

      • dnd.exe (PID: 6256)
    • Process drops python dynamic module

      • dnd.exe (PID: 6256)
    • Process drops legitimate windows executable

      • dnd.exe (PID: 6256)
    • Loads Python modules

      • dnd.exe (PID: 1212)
    • Application launched itself

      • dnd.exe (PID: 6256)
  • INFO

    • The sample compiled with english language support

      • dnd.exe (PID: 6256)
    • Reads the computer name

      • dnd.exe (PID: 6256)
      • dnd.exe (PID: 1212)
    • Checks supported languages

      • dnd.exe (PID: 6256)
      • dnd.exe (PID: 1212)
    • Checks proxy server information

      • dnd.exe (PID: 1212)
      • slui.exe (PID: 3620)
    • PyInstaller has been detected (YARA)

      • dnd.exe (PID: 6256)
      • dnd.exe (PID: 1212)
    • Reads the software policy settings

      • slui.exe (PID: 3620)
    • Create files in a temporary directory

      • dnd.exe (PID: 6256)
    • Reads the machine GUID from the registry

      • dnd.exe (PID: 1212)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:19 21:38:26+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 172032
InitializedDataSize: 149504
UninitializedDataSize: -
EntryPoint: 0xcdb0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.9.7.30920
ProductVersionNumber: 1.9.7.30920
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Apache Software Foundation
FileDescription: svn
FileVersion: 1.9.7
InternalName: SVN
LegalCopyright: Copyright (c) The Apache Software Foundation
OriginalFileName: svn.exe
ProductName: Subversion
ProductVersion: 1.9.7 (r1800392)
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dnd.exe dnd.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1212"C:\Users\admin\Desktop\dnd.exe" C:\Users\admin\Desktop\dnd.exe
dnd.exe
User:
admin
Company:
Apache Software Foundation
Integrity Level:
MEDIUM
Description:
svn
Version:
1.9.7
Modules
Images
c:\users\admin\desktop\dnd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3620C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6256"C:\Users\admin\Desktop\dnd.exe" C:\Users\admin\Desktop\dnd.exe
explorer.exe
User:
admin
Company:
Apache Software Foundation
Integrity Level:
MEDIUM
Description:
svn
Version:
1.9.7
Modules
Images
c:\users\admin\desktop\dnd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
3 821
Read events
3 821
Write events
0
Delete events
0

Modification events

No data
Executable files
59
Suspicious files
1
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\_bz2.pydexecutable
MD5:A991152FD5B8F2A0EB6C34582ADF7111
SHA256:7301FC2447E7E6D599472D2C52116FBE318A9FF9259B8A85981C419BFD20E3EF
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\_hashlib.pydexecutable
MD5:88E2BF0A590791891FB5125FFCF5A318
SHA256:E7AECB61A54DCC77B6D9CAFE9A51FD1F8D78B2194CC3BAF6304BBD1EDFD0AEE6
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\_brotli.cp39-win_amd64.pydexecutable
MD5:3F4FF03457DE6D751C912B43231DDCC2
SHA256:6C00E3C64C4B30D127474BF7DEE5250F5123C91B992B1AD04482223DE510F37B
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\_decimal.pydexecutable
MD5:3CCE2CA89817962AEA5B6A98891EEA1C
SHA256:0809DE4A8DEE3B6CF6DDC40A10C52D53867EE47BF5A6769D16027F2AB766B5CF
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\_queue.pydexecutable
MD5:F19D9A56DF14AEA465E7EAD84751EA5F
SHA256:17CCD37DFBA38BBA706189D12ED28CA32C7330CC60DB7BF203BF7198287073E4
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\_cffi_backend.cp39-win_amd64.pydexecutable
MD5:1D426469974F80F68CFFEA594560D10B
SHA256:FB759CB37C785BC286F8DE4CA4679E887FB3981A74F458449553E0DF6956CFA9
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\_ctypes.pydexecutable
MD5:7322F8245B5C8551D67C337C0DC247C9
SHA256:4FCF4C9C98B75A07A7779C52E1F7DFF715AE8A2F8A34574E9DAC66243FB86763
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\VCRUNTIME140.dllexecutable
MD5:18049F6811FC0F94547189A9E104F5D2
SHA256:C865C3366A98431EC3A5959CB5AC3966081A43B82DFCD8BFEFAFE0146B1508DB
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:B826AC6E0225DB2CFB753D12B527EED3
SHA256:40F595ADE9F60CA8630870D9122BF5EFC85C1A52AADAD4E4E5ABA3156FA868D5
6256dnd.exeC:\Users\admin\AppData\Local\Temp\_MEI62562\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:7816039FC35232C815B933C47D864C88
SHA256:9C8F443B3A42E9E1AAA110B12C85F99B3D42CE22849CC3072CF56E29CCDD8401
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
38
TCP/UDP connections
47
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
400
40.126.32.134:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
unknown
POST
400
20.190.160.20:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
unknown
5944
MoUsoCoreWorker.exe
GET
200
23.216.77.10:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.10:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3400
RUXIMICS.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
400
20.190.160.132:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
unknown
GET
304
135.233.95.144:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
unknown
2228
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3400
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.216.77.10:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.216.77.10:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.3.109.244:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3400
RUXIMICS.exe
23.3.109.244:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
23.3.109.244:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.72.205.209
whitelisted
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 23.216.77.10
  • 23.216.77.29
  • 23.216.77.19
  • 23.216.77.23
  • 23.216.77.21
  • 23.216.77.18
  • 23.216.77.30
whitelisted
www.microsoft.com
  • 23.3.109.244
  • 95.101.149.131
whitelisted
github.com
  • 140.82.121.4
whitelisted
api.github.com
  • 140.82.121.6
whitelisted
login.live.com
  • 20.190.160.131
  • 40.126.32.140
  • 40.126.32.136
  • 40.126.32.74
  • 20.190.160.65
  • 20.190.160.17
  • 20.190.160.4
  • 40.126.32.134
whitelisted
slscr.update.microsoft.com
  • 74.178.76.128
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
self.events.data.microsoft.com
  • 20.189.173.23
whitelisted

Threats

No threats detected
No debug info