File name:

ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe

Full analysis: https://app.any.run/tasks/08c07c78-91c8-427c-955a-04469bb2d416
Verdict: Malicious activity
Analysis date: August 01, 2025, 02:33:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
zombie
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 5 sections
MD5:

890E2D2EC3525A52614FA174FD0F7022

SHA1:

BBFCE2EBC71E7EF6B56BB7373988F2B9C634FD52

SHA256:

CE5D8BDF32F9F4471E4E77291DC6E826604063211B52C81EADFE3F5CE400ADA8

SSDEEP:

1536:QPlbc9F8xi59F8xi6iai2LBbPtkCi7qdKsYAfyAsbdetE7BLeSyl880Qv:al/IdetyCS+sE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZOMBIE has been detected (YARA)

      • ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe (PID: 1976)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe (PID: 1976)
    • Executable content was dropped or overwritten

      • ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe (PID: 1976)
    • The process creates files with name similar to system file names

      • ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe (PID: 1976)
  • INFO

    • Creates files or folders in the user directory

      • ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe (PID: 1976)
    • Checks supported languages

      • ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe (PID: 1976)
    • Checks proxy server information

      • slui.exe (PID: 2692)
    • Reads the software policy settings

      • slui.exe (PID: 2692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.4)
.exe | Win16/32 Executable Delphi generic (19.5)
.exe | Generic Win/DOS Executable (18.8)
.exe | DOS Executable Generic (18.8)
.vxd | VXD Driver (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: -
CodeSize: -
InitializedDataSize: -
UninitializedDataSize: -
EntryPoint: 0x2130
OSVersion: 1
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ZOMBIE ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1976"C:\Users\admin\Desktop\ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe" C:\Users\admin\Desktop\ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2692C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 481
Read events
3 481
Write events
0
Delete events
0

Modification events

No data
Executable files
1 834
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exe
MD5:
SHA256:
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.tmpexecutable
MD5:E80375CC699DC1AF9D9C48025F9FDD59
SHA256:C2A1CF285255B5320649D31D351DBA65C6C2245CC36AADE6E1FDA7935D10A5C3
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exeC:\Users\admin\AppData\Local\VirtualStore\bootmgr.tmpexecutable
MD5:A361526EDCAD44091093FED351732DB8
SHA256:202BB783A8B6BCA62FBE63D39654C21CDAB2020104D7D41FC438317A79F99970
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.exeexecutable
MD5:DB4C6E98DAD7A5A3B1C6C9A4B9E31571
SHA256:8A2EBA459B2D5CB11EADD900654B59D47E2C43A9497901378CB14A437F1C7239
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exeC:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmpexecutable
MD5:3379FABBDFF9F77272E751246F3E55F6
SHA256:157408DA8A3345B5D629AC2DA2F11AD3581FDE96169C5F8DCC62011BF9BC42DA
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.tmpexecutable
MD5:DB4C6E98DAD7A5A3B1C6C9A4B9E31571
SHA256:8A2EBA459B2D5CB11EADD900654B59D47E2C43A9497901378CB14A437F1C7239
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\AcroCEF.exe.tmpexecutable
MD5:63D2A72C590B0D2B3444FFFBA946F5D5
SHA256:7E804579A2C0403AC32E7C3B9E8333BA3EAF1EDF1D15C16FDE95CFA0A8C9DFBC
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\A3DUtils.dll.tmpexecutable
MD5:2B81570B539BF1CF73CE5E11EF67C947
SHA256:890B23F01BC68214C5BC17B15433CCB8D765FA9FC4DE67C192E249E65A7A3121
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcrobatRes.dll.tmpexecutable
MD5:7573F977FB0D0E3DF1F270C7608C037B
SHA256:7CED55A1928E6FABE8DDE9660A13D78F36A0E607A5AE42F811EE986D643A6CEC
1976ce5d8bdf32f9f4471e4e77291dc6e826604063211b52c81eadfe3f5ce400ada8.exeC:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe.tmpexecutable
MD5:B3E54F3DC111AE56E7E5BF84BCD0143B
SHA256:6222C0CB2D68115A9346713DCA67591F2C53BA233BEF8ACE6593145BE7B179AB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
22
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4024
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4024
RUXIMICS.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4024
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4024
RUXIMICS.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
self.events.data.microsoft.com
  • 52.182.141.63
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info