File name:

CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe

Full analysis: https://app.any.run/tasks/5d8f49f4-33b1-477b-89c8-5d9164b37df6
Verdict: Malicious activity
Analysis date: June 30, 2025, 20:47:46
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
schoolboy
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

23545DFD8FFA9D9FB3E190FDFC58BCE5

SHA1:

00837687B222D64D9E99153F73E2287FDA1B5F7A

SHA256:

CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0

SSDEEP:

98304:l8grUF6B0a9nXoP/0thZ0jORJFubbjSowvP5opaM3EYAOEO3mcXRjQatsT2Lg909:5HY9nrskJwk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SCHOOLBOY has been found (auto)

      • CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe (PID: 2160)
    • Executing a file with an untrusted certificate

      • CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe (PID: 2160)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • The sample compiled with english language support

      • CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe (PID: 2160)
    • Reads CPU info

      • CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe (PID: 2160)
    • Creates files or folders in the user directory

      • CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe (PID: 2160)
    • Reads the machine GUID from the registry

      • CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe (PID: 2160)
    • Reads the computer name

      • CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe (PID: 2160)
    • Checks supported languages

      • CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe (PID: 2160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (83)
.exe | Win32 Executable (generic) (9)
.exe | Generic Win/DOS Executable (3.9)
.exe | DOS Executable Generic (3.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:10:02 05:06:08+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 6518272
InitializedDataSize: 2956800
UninitializedDataSize: -
EntryPoint: 0x5c183b
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 11.3.300.273
ProductVersionNumber: 11.3.300.273
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Adobe Systems, Inc.
FileDescription: Adobe Flash Player 11.3 r300
FileVersion: 11,3,300,273
InternalName: Adobe Flash Player 11.3
LegalCopyright: Adobe® Flash® Player. Copyright © 1996 Adobe Systems Incorporated. All Rights Reserved. Adobe and Flash are either trademarks or registered trademarks in the United States and/or other countries.
LegalTrademarks: Adobe Flash Player
OriginalFileName: SAFlashPlayer.exe
ProductName: Shockwave Flash
ProductVersion: 11,3,300,273
Debugger: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ce9dc508a6ad12c8db0e79628cad2414af846c86ab8d8b9be69636f0285784c0.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1612C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2160"C:\Users\admin\AppData\Local\Temp\CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exe" C:\Users\admin\AppData\Local\Temp\CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exeexplorer.exe
User:
admin
Company:
Adobe Systems, Inc.
Integrity Level:
MEDIUM
Description:
Adobe Flash Player 11.3 r300
Version:
11,3,300,273
Modules
Images
c:\users\admin\appdata\local\temp\ce9dc508a6ad12c8db0e79628cad2414af846c86ab8d8b9be69636f0285784c0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
563
Read events
563
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
12

Dropped files

PID
Process
Filename
Type
2160CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.solsol
MD5:257B2A4303BE82056B8788B57624BF88
SHA256:B36E861A7CCCE8377ED480FF1B7EEEBF30C7385D4BC8648D1A0B203F0B17C70B
2160CE9DC508A6AD12C8DB0E79628CAD2414AF846C86AB8D8B9BE69636F0285784C0.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxxsol
MD5:257B2A4303BE82056B8788B57624BF88
SHA256:B36E861A7CCCE8377ED480FF1B7EEEBF30C7385D4BC8648D1A0B203F0B17C70B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
17
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1688
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7104
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7104
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7004
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
1688
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1688
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.110
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.2
  • 20.190.159.64
  • 20.190.159.129
  • 20.190.159.128
  • 40.126.31.131
  • 40.126.31.0
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.22
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info