File name:

FRST64.exe

Full analysis: https://app.any.run/tasks/750b03dd-7556-4680-8022-d65b957d7ace
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 22, 2025, 08:57:02
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
stealer
arch-scr
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

17D675A43629DB93B11D22E177DC1C3D

SHA1:

357625372C9436424C99B6114CCEFBF10FFFD67D

SHA256:

3729710A0A53885916D9D167CF2B237836BF87AF174125D2C1152A8EA9BD713F

SSDEEP:

98304:X9rem5Oidd2kgm2Q40w/uJggpeFAcYIgiXGw+nZy1G+RaRvuKHYT2471ZbX2FGJX:Jr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • FRST64.exe (PID: 300)
      • FRST64.exe (PID: 300)
    • Steals credentials from Web Browsers

      • FRST64.exe (PID: 300)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • FRST64.exe (PID: 300)
    • Starts CMD.EXE for commands execution

      • FRST64.exe (PID: 300)
    • Executes as Windows Service

      • VSSVC.exe (PID: 5436)
    • There is functionality for taking screenshot (YARA)

      • FRST64.exe (PID: 300)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2644)
      • cmd.exe (PID: 2064)
      • cmd.exe (PID: 4000)
      • cmd.exe (PID: 736)
      • cmd.exe (PID: 1196)
      • cmd.exe (PID: 3268)
      • cmd.exe (PID: 1272)
      • cmd.exe (PID: 1184)
      • cmd.exe (PID: 1812)
    • Reads security settings of Internet Explorer

      • FRST64.exe (PID: 300)
    • Read startup parameters

      • FRST64.exe (PID: 300)
    • Potential Corporate Privacy Violation

      • FRST64.exe (PID: 300)
    • Adds/modifies Windows certificates

      • FRST64.exe (PID: 300)
    • The process checks if it is being run in the virtual environment

      • FRST64.exe (PID: 300)
    • Reads the date of Windows installation

      • FRST64.exe (PID: 300)
    • Searches for installed software

      • FRST64.exe (PID: 300)
    • Detected use of alternative data streams (AltDS)

      • FRST64.exe (PID: 300)
  • INFO

    • Reads mouse settings

      • FRST64.exe (PID: 300)
    • Reads the computer name

      • FRST64.exe (PID: 300)
    • Create files in a temporary directory

      • FRST64.exe (PID: 300)
    • The sample compiled with english language support

      • FRST64.exe (PID: 300)
    • The process uses AutoIt

      • FRST64.exe (PID: 300)
    • Checks supported languages

      • FRST64.exe (PID: 300)
    • Checks proxy server information

      • FRST64.exe (PID: 300)
      • slui.exe (PID: 2560)
    • Reads the machine GUID from the registry

      • FRST64.exe (PID: 300)
    • Reads Environment values

      • FRST64.exe (PID: 300)
    • Reads the software policy settings

      • slui.exe (PID: 6372)
      • FRST64.exe (PID: 300)
      • slui.exe (PID: 2560)
    • Creates files or folders in the user directory

      • FRST64.exe (PID: 300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:01 10:17:32+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.16
CodeSize: 734208
InitializedDataSize: 1669632
UninitializedDataSize: -
EntryPoint: 0x2549c
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 1.4.2025.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
FileVersion: 1.4.2025.0
Comments: http://www.autoitscript.com/autoit3/
FileDescription: Farbar Recovery Scan Tool
ProductName: FRST64
ProductVersion: 01-04-2025
CompanyName: Farbar
LegalCopyright: ©Farbar
OriginalFileName: FRST64.exe
InternalName: FRST64
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
182
Monitored processes
44
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start frst64.exe sppextcomobj.exe no specs slui.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs bcdedit.exe no specs vssvc.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs slui.exe cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs bcdedit.exe no specs cmd.exe no specs conhost.exe no specs bcdedit.exe no specs frst64.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Users\admin\AppData\Local\Temp\FRST64.exe" C:\Users\admin\AppData\Local\Temp\FRST64.exe
explorer.exe
User:
admin
Company:
Farbar
Integrity Level:
HIGH
Description:
Farbar Recovery Scan Tool
Version:
1.4.2025.0
Modules
Images
c:\users\admin\appdata\local\temp\frst64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\msvcrt.dll
680"C:\Users\admin\AppData\Local\Temp\FRST64.exe" C:\Users\admin\AppData\Local\Temp\FRST64.exeexplorer.exe
User:
admin
Company:
Farbar
Integrity Level:
MEDIUM
Description:
Farbar Recovery Scan Tool
Exit code:
3221226540
Version:
1.4.2025.0
Modules
Images
c:\users\admin\appdata\local\temp\frst64.exe
c:\windows\system32\ntdll.dll
736C:\WINDOWS\system32\cmd.exe /c reg load hklm\v8Wg5Zj4Y C:\FRST\h4Ay8Ui6Rp4\DEFAULTC:\Windows\System32\cmd.exeFRST64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
960C:\WINDOWS\system32\cmd.exe /u /c echo 2C:\Windows\System32\cmd.exeFRST64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
1116C:\WINDOWS\system32\bcdedit /export C:\FRST\Hives\BCDC:\Windows\System32\bcdedit.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Boot Configuration Data Editor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cryptsp.dll
1168reg load hklm\v8Wg5Zj4Y C:\FRST\h4Ay8Ui6Rp4\SYSTEMC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1184C:\WINDOWS\system32\cmd.exe /c reg load hklm\f5Hn2Bl5Gy6 C:\FRST\j8Ej1Ws1Wk8\systemC:\Windows\System32\cmd.exeFRST64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1196C:\WINDOWS\system32\cmd.exe /c reg load hklm\v8Wg5Zj4Y C:\FRST\h4Ay8Ui6Rp4\SAMC:\Windows\System32\cmd.exeFRST64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1272C:\WINDOWS\system32\cmd.exe /c reg load hklm\v8Wg5Zj4Y C:\FRST\h4Ay8Ui6Rp4\COMPONENTSC:\Windows\System32\cmd.exeFRST64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1812C:\WINDOWS\system32\cmd.exe /c reg load hklm\v8Wg5Zj4Y C:\FRST\h4Ay8Ui6Rp4\SYSTEMC:\Windows\System32\cmd.exeFRST64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
43 930
Read events
43 616
Write events
278
Delete events
36

Modification events

(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:writeName:Element
Value:
0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000
(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Operation:delete keyName:(default)
Value:
(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Operation:writeName:Element
Value:
\EFI\Microsoft\Boot\bootmgfw.efi
(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\11000001
Operation:delete keyName:(default)
Value:
(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\11000001
Operation:writeName:Element
Value:
0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000
(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\12000002
Operation:delete keyName:(default)
Value:
(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\12000002
Operation:writeName:Element
Value:
\EFI\Boot\Loader.efi
(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Description
Operation:delete keyName:(default)
Value:
(PID) Process:(1116) bcdedit.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\24000001
Operation:delete keyName:(default)
Value:
Executable files
1
Suspicious files
52
Text files
23
Unknown types
1

Dropped files

PID
Process
Filename
Type
300FRST64.exeC:\FRST\h4Ay8Ui6Rp4\SOFTWARE
MD5:
SHA256:
300FRST64.exeC:\FRST\h4Ay8Ui6Rp4\SOFTWARE.LOG1
MD5:
SHA256:
300FRST64.exeC:\FRST\h4Ay8Ui6Rp4\SOFTWARE.LOG2
MD5:
SHA256:
300FRST64.exeC:\FRST\Hives\SOFTWARE
MD5:
SHA256:
300FRST64.exeC:\FRST\h4Ay8Ui6Rp4\SYSTEM
MD5:
SHA256:
300FRST64.exeC:\FRST\Hives\SYSTEM
MD5:
SHA256:
300FRST64.exeC:\Users\admin\AppData\Local\Temp\aut1E33.tmpbinary
MD5:C65D2BFEE6F33857980F95BBF647D5C0
SHA256:90403EFC1FAC06E52D94B11473837C9C09D4F17F6892EA265B4A2E2968CCA49D
300FRST64.exeC:\FRST\h4Ay8Ui6Rp4\COMPONENTS
MD5:
SHA256:
300FRST64.exeC:\FRST\h4Ay8Ui6Rp4\COMPONENTS.LOG1
MD5:
SHA256:
300FRST64.exeC:\FRST\h4Ay8Ui6Rp4\COMPONENTS.LOG2
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
38
DNS requests
18
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.17.147.64:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6620
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6620
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
300
FRST64.exe
GET
200
142.250.185.195:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
300
FRST64.exe
GET
200
142.250.185.195:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
300
FRST64.exe
GET
301
172.67.2.229:80
http://download.bleepingcomputer.com/farbar/up64
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.160.66:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.17.147.64:80
crl.microsoft.com
Akamai International B.V.
CZ
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3304
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
login.live.com
  • 20.190.160.66
  • 20.190.160.5
  • 40.126.32.134
  • 20.190.160.130
  • 20.190.160.2
  • 20.190.160.3
  • 20.190.160.14
  • 20.190.160.17
whitelisted
crl.microsoft.com
  • 2.17.147.64
  • 2.17.147.99
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 2.19.217.218
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
300
FRST64.exe
Potential Corporate Privacy Violation
ET INFO Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile
No debug info