File name:

RyuuManifestTool.exe

Full analysis: https://app.any.run/tasks/7e8284d6-2052-45ac-836d-5c302a801cc1
Verdict: Malicious activity
Analysis date: June 04, 2025, 07:56:38
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

624CBA1C6538F6E5C61D0304CEBA78A7

SHA1:

12C81D2483DD6D71501A0499D8A624569260B9D4

SHA256:

E7913A1867BD9AE40AD16F661D81C0DC29843DF1AFFDA9CE00A6A0D3709517D8

SSDEEP:

98304:BJ3x30LYvI9yf+8Gm14vpm+Jak3Gm4jSmZUMUwitHfktEzafhOsE+XZ0TvGnRig1:FFfr0h7DGckQBObuTy9I6Nz4l0k/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • RyuuManifestTool.exe (PID: 4220)
    • Process drops legitimate windows executable

      • RyuuManifestTool.exe (PID: 4220)
    • Application launched itself

      • RyuuManifestTool.exe (PID: 4220)
    • Loads Python modules

      • RyuuManifestTool.exe (PID: 3268)
    • Process drops python dynamic module

      • RyuuManifestTool.exe (PID: 4220)
    • Executable content was dropped or overwritten

      • RyuuManifestTool.exe (PID: 4220)
  • INFO

    • Checks supported languages

      • RyuuManifestTool.exe (PID: 4220)
      • RyuuManifestTool.exe (PID: 3268)
    • Reads the computer name

      • RyuuManifestTool.exe (PID: 4220)
      • RyuuManifestTool.exe (PID: 3268)
    • Create files in a temporary directory

      • RyuuManifestTool.exe (PID: 4220)
      • RyuuManifestTool.exe (PID: 3268)
    • Checks proxy server information

      • RyuuManifestTool.exe (PID: 3268)
      • slui.exe (PID: 2392)
    • Reads the software policy settings

      • slui.exe (PID: 2392)
    • The sample compiled with english language support

      • RyuuManifestTool.exe (PID: 4220)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:12 18:12:51+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.41
CodeSize: 172032
InitializedDataSize: 302080
UninitializedDataSize: -
EntryPoint: 0xce20
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ryuumanifesttool.exe ryuumanifesttool.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2392C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3268"C:\Users\admin\Desktop\RyuuManifestTool.exe" C:\Users\admin\Desktop\RyuuManifestTool.exe
RyuuManifestTool.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\ryuumanifesttool.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4220"C:\Users\admin\Desktop\RyuuManifestTool.exe" C:\Users\admin\Desktop\RyuuManifestTool.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\ryuumanifesttool.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
3 651
Read events
3 651
Write events
0
Delete events
0

Modification events

No data
Executable files
62
Suspicious files
1
Text files
15
Unknown types
0

Dropped files

PID
Process
Filename
Type
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\VCRUNTIME140.dllexecutable
MD5:862F820C3251E4CA6FC0AC00E4092239
SHA256:36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\VCRUNTIME140_1.dllexecutable
MD5:68156F41AE9A04D89BB6625A5CD222D4
SHA256:82A2F9AE1E6146AE3CB0F4BC5A62B7227E0384209D9B1AEF86BBCC105912F7CD
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_socket.pydexecutable
MD5:DC5A5AB89E6E2B48CB50B463B214FD89
SHA256:0E2C1089974A2757426DAC3295201A33C990C36F3C09593F8A2B6E07FD36B99C
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_bz2.pydexecutable
MD5:03BAD8289D9AA18E859ED7270A719E92
SHA256:178C6EEB30843E656CC407AAF53AE6D0F170966E4E0BDD2EE1BEDE73962275CD
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_decimal.pydexecutable
MD5:C68FC0D5C1878D02069503280234E969
SHA256:847E2B2C69CA623E0F96BBDA0F421CA978FBB5925BEEC4CC5E4C5D9C966C4BBC
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_hashlib.pydexecutable
MD5:5B08C2DCBE1B1DEA46ABBD6C9425878E
SHA256:823717926ADCE6B36F9C13B6555EAEAF5714C4756828F11CFFC1CE0BEF970A7E
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:E8B9D74BFD1F6D1CC1D99B24F44DA796
SHA256:B1B3FD40AB437A43C8DB4994CCFFC7F88000CC8BB6E34A2BCBFF8E2464930C59
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_cffi_backend.cp312-win_amd64.pydexecutable
MD5:FCB71CE882F99EC085D5875E1228BDC1
SHA256:86F136553BA301C70E7BADA8416B77EB4A07F76CCB02F7D73C2999A38FA5FA5B
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_ssl.pydexecutable
MD5:25D4B1C6CA053C573A55D68AE3DB5CE2
SHA256:81344E3E16CF6F2D5B24CC0CF92E95C5FD0592E4A3859BB00C3F5891E2482128
4220RyuuManifestTool.exeC:\Users\admin\AppData\Local\Temp\_MEI42202\_queue.pydexecutable
MD5:6F8624F0746FA31CF72EF568D6A121F1
SHA256:37622CA591FB8E45A894DB9C0DA99BFCB18A820A48F028E4949D9256B69247E3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
40
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
736
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
GET
200
4.175.87.197:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
compressed
23.9 Kb
whitelisted
GET
304
4.175.87.197:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
7224
RUXIMICS.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
20.190.159.68:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
7224
RUXIMICS.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
200
20.190.159.68:443
https://login.live.com/RST2.srf
unknown
xml
11.0 Kb
whitelisted
736
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
736
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
GET
200
40.69.42.241:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
7224
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
7224
RUXIMICS.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
7224
RUXIMICS.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
3268
RyuuManifestTool.exe
188.114.96.3:443
generator.ryuu.lol
CLOUDFLARENET
NL
unknown
6544
svchost.exe
20.190.160.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
736
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 23.35.229.160
whitelisted
generator.ryuu.lol
  • 188.114.96.3
  • 188.114.97.3
unknown
login.live.com
  • 20.190.160.4
  • 20.190.160.17
  • 20.190.160.5
  • 20.190.160.20
  • 40.126.32.136
  • 20.190.160.128
  • 40.126.32.140
  • 20.190.160.22
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
  • 40.91.76.224
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
self.events.data.microsoft.com
  • 52.182.143.213
whitelisted

Threats

No threats detected
No debug info