| File name: | Init.exe |
| Full analysis: | https://app.any.run/tasks/b2fb3c44-7ed6-456c-82db-8b1077d387eb |
| Verdict: | Malicious activity |
| Analysis date: | December 19, 2025, 21:55:14 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections |
| MD5: | 59F6256BF2B2EDE02BEEED2E4417B937 |
| SHA1: | E25EF1BBECA7976FAAC54468E30086A24E5819DD |
| SHA256: | C772C49F7A0298935208E1ECC9E95850183A76A06780B5661DF418E16FA26F4F |
| SSDEEP: | 49152:/4Y2A1wjRsB5CExEf7BswBaTnqwsnQiDbdu4Y2A1wjRsB5CExEf7BswBaTnhwsng:XzutsBUnPAexHdSzutsBUnPAdxRp1bU5 |
| .exe | | | UPX compressed Win32 Executable (39.3) |
|---|---|---|
| .exe | | | Win32 EXE Yoda's Crypter (38.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (9.5) |
| .exe | | | Win32 Executable (generic) (6.5) |
| .exe | | | Generic Win/DOS Executable (2.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1970:01:01 15:50:05+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 274432 |
| InitializedDataSize: | 86016 |
| UninitializedDataSize: | 536576 |
| EntryPoint: | 0xc5e80 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.3.8.1 |
| ProductVersionNumber: | 3.3.8.1 |
| FileFlagsMask: | 0x0017 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Unknown |
| FileSubtype: | - |
| LanguageCode: | English (British) |
| CharacterSet: | Unicode |
| FileDescription: | - |
| FileVersion: | 3, 3, 8, 1 |
| CompiledScript: | AutoIt v3 Script: 3, 3, 8, 1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 7416 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7624 | "C:\Users\admin\Desktop\Init.exe" | C:\Users\admin\Desktop\Init.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 3, 3, 8, 1 Modules
| |||||||||||||||
| 7744 | "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Init.exe" | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Init.exe | — | Init.exe | |||||||||||
User: admin Integrity Level: MEDIUM Version: 3, 3, 8, 1 Modules
| |||||||||||||||
| (PID) Process: | (7624) Init.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | KILL |
Value: C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Init.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7624 | Init.exe | C:\Users\admin\autorun.inf | text | |
MD5:B857246B81E65E2CB81875F744B38D0B | SHA256:3E3BD49B26D1320EAB7D04C13A888F9A989DA05AF998C7DC578298E10048DD8C | |||
| 7624 | Init.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Init.exe | executable | |
MD5:59F6256BF2B2EDE02BEEED2E4417B937 | SHA256:C772C49F7A0298935208E1ECC9E95850183A76A06780B5661DF418E16FA26F4F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4332 | svchost.exe | POST | 404 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | — | 341 b | whitelisted |
4332 | svchost.exe | POST | 404 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | — | 341 b | whitelisted |
4332 | svchost.exe | POST | 404 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | — | 341 b | whitelisted |
4332 | svchost.exe | POST | 404 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | — | 341 b | whitelisted |
4332 | svchost.exe | POST | 404 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | — | 341 b | whitelisted |
4332 | svchost.exe | POST | 404 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | — | 341 b | whitelisted |
4332 | svchost.exe | POST | 404 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | — | 341 b | whitelisted |
4332 | svchost.exe | POST | 404 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | — | 341 b | whitelisted |
4332 | svchost.exe | POST | 404 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | — | 341 b | whitelisted |
5468 | SIHClient.exe | GET | 404 | 20.3.187.198:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | 341 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4288 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:137 | — | Not routed | — | whitelisted |
6768 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4636 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:138 | — | Not routed | — | whitelisted |
3412 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4332 | svchost.exe | 20.190.159.68:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6712 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5468 | SIHClient.exe | 74.178.240.61:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5468 | SIHClient.exe | 20.3.187.198:443 | fe3cr.delivery.mp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
198.187.3.20.in-addr.arpa |
| whitelisted |
d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |