File name:

release.exe

Full analysis: https://app.any.run/tasks/5c741676-d5f5-40a1-a078-d2b9c46088ae
Verdict: Malicious activity
Analysis date: May 27, 2025, 20:51:27
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

EDC85FCBD8F79E61687081AD99C9DB93

SHA1:

B44643D580A9DBB10F66409F84DB0FD43678F3A4

SHA256:

41B1D1CD846AD2D038C7FF9F062AADAA2036E3C2202B7A57DCE45B2A9E2FECEE

SSDEEP:

49152:BFgBnQWSkg1MU907V+0CjbgiG+vITnTpUlZvEl6wKNm2b/yqK:BFgBnQWSH19NblG+oEJElkAxV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • release.exe (PID: 6620)
      • release.exe (PID: 7460)
      • dllhost.exe (PID: 7300)
      • release.exe (PID: 3896)
      • dllhost.exe (PID: 7284)
      • release.exe (PID: 4740)
      • random.exe (PID: 6940)
      • random.exe (PID: 4152)
      • dllhost.exe (PID: 9124)
      • random.exe (PID: 10280)
      • random.exe (PID: 10796)
      • random.exe (PID: 11032)
      • random.exe (PID: 10480)
      • random.exe (PID: 5984)
      • random.exe (PID: 10444)
      • random.exe (PID: 10344)
      • random.exe (PID: 9336)
      • random.exe (PID: 11284)
      • random.exe (PID: 12040)
      • random.exe (PID: 12172)
      • random.exe (PID: 12252)
      • random.exe (PID: 10604)
      • random.exe (PID: 11220)
      • random.exe (PID: 9688)
      • random.exe (PID: 11568)
      • random.exe (PID: 9136)
      • random.exe (PID: 12168)
      • random.exe (PID: 12284)
      • random.exe (PID: 10924)
      • random.exe (PID: 12216)
      • random.exe (PID: 10944)
      • random.exe (PID: 10716)
      • random.exe (PID: 11560)
      • random.exe (PID: 8860)
      • random.exe (PID: 11120)
      • random.exe (PID: 2244)
      • random.exe (PID: 9600)
      • random.exe (PID: 9388)
    • Process drops legitimate windows executable

      • release.exe (PID: 6620)
      • release.exe (PID: 3896)
      • random.exe (PID: 4152)
      • random.exe (PID: 10796)
      • random.exe (PID: 10280)
      • random.exe (PID: 11032)
      • random.exe (PID: 10480)
      • random.exe (PID: 5984)
      • random.exe (PID: 10444)
      • random.exe (PID: 10344)
      • random.exe (PID: 9336)
      • random.exe (PID: 11284)
      • random.exe (PID: 11568)
      • random.exe (PID: 10944)
      • random.exe (PID: 11120)
      • random.exe (PID: 2244)
    • Reads security settings of Internet Explorer

      • release.exe (PID: 6620)
      • release.exe (PID: 3896)
    • Reads the date of Windows installation

      • release.exe (PID: 6620)
      • release.exe (PID: 3896)
    • Drops a system driver (possible attempt to evade defenses)

      • release.exe (PID: 7460)
      • release.exe (PID: 4740)
      • random.exe (PID: 6940)
      • random.exe (PID: 12172)
      • random.exe (PID: 12252)
      • random.exe (PID: 11220)
      • random.exe (PID: 9688)
      • random.exe (PID: 9136)
      • random.exe (PID: 12040)
      • random.exe (PID: 10604)
      • random.exe (PID: 12168)
      • random.exe (PID: 9388)
      • random.exe (PID: 12284)
      • random.exe (PID: 10924)
      • random.exe (PID: 12216)
      • random.exe (PID: 10716)
      • random.exe (PID: 9600)
      • random.exe (PID: 11560)
      • random.exe (PID: 8860)
    • Starts CMD.EXE for commands execution

      • release.exe (PID: 7460)
    • Hides command output

      • cmd.exe (PID: 7756)
      • cmd.exe (PID: 7848)
      • cmd.exe (PID: 7968)
      • cmd.exe (PID: 7660)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 7756)
      • cmd.exe (PID: 7848)
      • cmd.exe (PID: 7660)
      • cmd.exe (PID: 7968)
    • Windows service management via SC.EXE

      • sc.exe (PID: 7820)
      • sc.exe (PID: 8032)
    • Creates a new Windows service

      • sc.exe (PID: 7940)
    • Stops a currently running service

      • sc.exe (PID: 7728)
  • INFO

    • Reads the machine GUID from the registry

      • release.exe (PID: 6620)
      • release.exe (PID: 3896)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 7300)
      • mmc.exe (PID: 7428)
      • dllhost.exe (PID: 7284)
      • mmc.exe (PID: 7660)
    • The sample compiled with english language support

      • release.exe (PID: 6620)
      • dllhost.exe (PID: 7300)
      • release.exe (PID: 7460)
      • release.exe (PID: 3896)
      • dllhost.exe (PID: 7284)
      • random.exe (PID: 4152)
      • dllhost.exe (PID: 9124)
      • random.exe (PID: 10280)
      • random.exe (PID: 10796)
      • random.exe (PID: 11032)
      • random.exe (PID: 10480)
      • random.exe (PID: 5984)
      • random.exe (PID: 10444)
      • random.exe (PID: 10344)
      • random.exe (PID: 9336)
      • random.exe (PID: 11284)
      • random.exe (PID: 11568)
      • random.exe (PID: 10944)
      • random.exe (PID: 11120)
      • random.exe (PID: 2244)
    • Checks supported languages

      • release.exe (PID: 6620)
      • release.exe (PID: 7460)
      • release.exe (PID: 3896)
      • random.exe (PID: 6940)
      • release.exe (PID: 4740)
      • random.exe (PID: 4152)
      • random.exe (PID: 4164)
      • random.exe (PID: 4728)
      • random.exe (PID: 7884)
      • random.exe (PID: 7152)
      • random.exe (PID: 8056)
      • random.exe (PID: 7300)
      • random.exe (PID: 7980)
      • random.exe (PID: 8100)
      • random.exe (PID: 8128)
      • random.exe (PID: 5436)
      • random.exe (PID: 7476)
      • random.exe (PID: 4188)
      • random.exe (PID: 732)
      • random.exe (PID: 5308)
      • random.exe (PID: 2268)
      • random.exe (PID: 6676)
      • random.exe (PID: 4464)
      • random.exe (PID: 2772)
      • random.exe (PID: 6652)
      • random.exe (PID: 5332)
    • Checks transactions between databases Windows and Oracle

      • release.exe (PID: 6620)
      • release.exe (PID: 3896)
    • Process checks computer location settings

      • release.exe (PID: 6620)
      • release.exe (PID: 3896)
    • Reads Microsoft Office registry keys

      • release.exe (PID: 6620)
      • release.exe (PID: 3896)
    • Reads the computer name

      • release.exe (PID: 6620)
      • release.exe (PID: 3896)
    • Manual execution by a user

      • chrome.exe (PID: 4844)
      • release.exe (PID: 3896)
      • random.exe (PID: 6940)
      • random.exe (PID: 4728)
      • random.exe (PID: 4152)
      • random.exe (PID: 8056)
      • random.exe (PID: 7884)
      • random.exe (PID: 7300)
      • random.exe (PID: 7980)
      • random.exe (PID: 4164)
      • random.exe (PID: 7152)
      • random.exe (PID: 8100)
      • random.exe (PID: 8128)
      • random.exe (PID: 7476)
      • random.exe (PID: 5308)
      • random.exe (PID: 5436)
      • random.exe (PID: 732)
      • random.exe (PID: 4188)
      • random.exe (PID: 2268)
      • random.exe (PID: 2772)
      • random.exe (PID: 4464)
      • random.exe (PID: 6676)
      • random.exe (PID: 6652)
      • random.exe (PID: 5332)
      • random.exe (PID: 2100)
      • random.exe (PID: 3032)
      • random.exe (PID: 7212)
      • random.exe (PID: 6816)
      • random.exe (PID: 4988)
      • random.exe (PID: 3132)
      • random.exe (PID: 1052)
      • random.exe (PID: 1020)
      • random.exe (PID: 3304)
      • random.exe (PID: 2896)
      • random.exe (PID: 2568)
      • random.exe (PID: 1600)
      • random.exe (PID: 2316)
      • random.exe (PID: 5036)
      • random.exe (PID: 7260)
      • random.exe (PID: 7512)
      • random.exe (PID: 7856)
      • random.exe (PID: 664)
      • random.exe (PID: 8316)
      • random.exe (PID: 8644)
      • random.exe (PID: 8652)
      • random.exe (PID: 3480)
      • random.exe (PID: 8636)
      • random.exe (PID: 8808)
      • random.exe (PID: 9024)
      • random.exe (PID: 9064)
      • random.exe (PID: 2040)
      • random.exe (PID: 8804)
      • random.exe (PID: 5796)
      • random.exe (PID: 8816)
      • random.exe (PID: 1196)
      • random.exe (PID: 8900)
      • random.exe (PID: 8404)
      • random.exe (PID: 8720)
      • random.exe (PID: 8568)
      • random.exe (PID: 8540)
      • random.exe (PID: 1276)
      • random.exe (PID: 2600)
      • random.exe (PID: 7612)
      • random.exe (PID: 8380)
      • random.exe (PID: 7376)
      • random.exe (PID: 8368)
      • random.exe (PID: 9012)
      • random.exe (PID: 9000)
      • random.exe (PID: 9080)
      • random.exe (PID: 7700)
      • random.exe (PID: 8776)
      • random.exe (PID: 9228)
      • random.exe (PID: 9528)
      • random.exe (PID: 9392)
      • random.exe (PID: 9464)
      • random.exe (PID: 9888)
      • random.exe (PID: 9748)
      • random.exe (PID: 9588)
      • random.exe (PID: 9656)
      • random.exe (PID: 9648)
      • random.exe (PID: 10136)
      • random.exe (PID: 9904)
      • random.exe (PID: 10144)
      • random.exe (PID: 10592)
      • random.exe (PID: 10280)
      • random.exe (PID: 10524)
      • random.exe (PID: 10788)
      • random.exe (PID: 10796)
      • random.exe (PID: 11032)
      • random.exe (PID: 10624)
      • random.exe (PID: 10444)
      • random.exe (PID: 5984)
      • random.exe (PID: 10480)
      • random.exe (PID: 9336)
      • random.exe (PID: 11284)
      • random.exe (PID: 11568)
      • random.exe (PID: 11992)
      • random.exe (PID: 10344)
      • random.exe (PID: 10512)
      • random.exe (PID: 12244)
      • random.exe (PID: 11384)
      • random.exe (PID: 10944)
      • random.exe (PID: 10164)
      • random.exe (PID: 8416)
      • random.exe (PID: 11120)
      • random.exe (PID: 4032)
      • random.exe (PID: 2244)
      • random.exe (PID: 7748)
      • random.exe (PID: 9316)
    • Application launched itself

      • chrome.exe (PID: 4844)
    • Reads the software policy settings

      • slui.exe (PID: 5024)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:26 19:47:06+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 295936
InitializedDataSize: 697344
UninitializedDataSize: -
EntryPoint: 0x1a724
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
625
Monitored processes
308
Malicious processes
1
Suspicious processes
7

Behavior graph

Click at the process to see the details
start release.exe sppextcomobj.exe no specs slui.exe Copy/Move/Rename/Delete/Link Object mmc.exe no specs mmc.exe release.exe cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs release.exe slui.exe no specs Copy/Move/Rename/Delete/Link Object mmc.exe no specs mmc.exe release.exe random.exe random.exe no specs random.exe random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs Copy/Move/Rename/Delete/Link Object random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe random.exe no specs random.exe no specs random.exe no specs random.exe no specs random.exe random.exe random.exe random.exe mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs random.exe mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs random.exe mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs random.exe mmc.exe no specs mmc.exe no specs random.exe no specs random.exe mmc.exe no specs random.exe mmc.exe mmc.exe no specs mmc.exe no specs mmc.exe mmc.exe no specs mmc.exe mmc.exe mmc.exe no specs random.exe no specs mmc.exe no specs mmc.exe mmc.exe no specs random.exe mmc.exe no specs random.exe mmc.exe no specs mmc.exe random.exe no specs random.exe mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe mmc.exe no specs random.exe mmc.exe mmc.exe random.exe mmc.exe mmc.exe no specs mmc.exe random.exe random.exe no specs mmc.exe random.exe random.exe random.exe random.exe random.exe mmc.exe no specs random.exe mmc.exe no specs mmc.exe no specs random.exe random.exe no specs mmc.exe no specs mmc.exe mmc.exe no specs mmc.exe no specs mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe no specs random.exe random.exe random.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs random.exe mmc.exe random.exe mmc.exe mmc.exe no specs random.exe mmc.exe no specs mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe no specs mmc.exe no specs mmc.exe mmc.exe no specs mmc.exe no specs mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs random.exe no specs mmc.exe no specs mmc.exe mmc.exe no specs mmc.exe no specs mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe no specs mmc.exe mmc.exe mmc.exe mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs mmc.exe no specs random.exe mmc.exe mmc.exe mmc.exe mmc.exe mmc.exe random.exe no specs random.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
540"C:\WINDOWS\system32\mmc.exe" "C:\Windows\System32\WmiMgmt.msc" C:\Windows\System32\mmc.exerandom.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Management Console
Exit code:
3221226540
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mmc.exe
c:\windows\system32\ntdll.dll
664"C:\Users\admin\Desktop\random.exe" C:\Users\admin\Desktop\random.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\random.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
732"C:\Users\admin\Desktop\random.exe" C:\Users\admin\Desktop\random.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\random.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
1020"C:\Users\admin\Desktop\random.exe" C:\Users\admin\Desktop\random.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\random.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
1052"C:\Users\admin\Desktop\random.exe" C:\Users\admin\Desktop\random.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\random.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
1056"C:\WINDOWS\system32\mmc.exe" "C:\Windows\System32\WmiMgmt.msc" C:\Windows\System32\mmc.exerandom.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Management Console
Exit code:
3221226540
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mmc.exe
c:\windows\system32\ntdll.dll
1176"C:\WINDOWS\system32\mmc.exe" "C:\Windows\System32\WmiMgmt.msc" C:\Windows\System32\mmc.exe
random.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Management Console
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mmc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1196"C:\Users\admin\Desktop\random.exe" C:\Users\admin\Desktop\random.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\random.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
1228"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2516 --field-trial-handle=1412,i,9922085217746745380,5377115346004076997,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1276"C:\Users\admin\Desktop\random.exe" C:\Users\admin\Desktop\random.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\random.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
Total events
95 880
Read events
95 674
Write events
201
Delete events
5

Modification events

(PID) Process:(6620) release.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msc\OpenWithProgids
Operation:writeName:MSCFile
Value:
(PID) Process:(4844) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4844) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(4844) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(4844) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(4844) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(4844) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1F
Value:
1
(PID) Process:(8008) chrome.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(8008) chrome.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
0E000000040000000300000000000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF
(PID) Process:(8008) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
114
Executable files
39
Suspicious files
114
Text files
53
Unknown types
12

Dropped files

PID
Process
Filename
Type
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF10f510.TMP
MD5:
SHA256:
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF10f510.TMP
MD5:
SHA256:
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF10f520.TMP
MD5:
SHA256:
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF10f520.TMP
MD5:
SHA256:
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10f520.TMP
MD5:
SHA256:
4844chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
58
DNS requests
49
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8048
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.48.23.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8048
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
23.48.23.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.176
  • 23.48.23.170
  • 23.48.23.166
  • 23.48.23.175
  • 23.48.23.180
  • 23.48.23.173
  • 23.48.23.162
  • 23.48.23.174
  • 23.48.23.177
whitelisted
www.microsoft.com
  • 2.23.181.156
  • 95.101.149.131
whitelisted
google.com
  • 142.250.186.78
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.64
  • 40.126.31.130
  • 40.126.31.73
  • 40.126.31.128
  • 20.190.159.68
  • 40.126.31.67
  • 20.190.159.129
  • 40.126.31.129
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
clientservices.googleapis.com
  • 142.250.185.227
whitelisted
accounts.google.com
  • 64.233.184.84
whitelisted
www.google.com
  • 142.250.186.68
whitelisted

Threats

PID
Process
Class
Message
6240
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
6240
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
6240
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] hCaptcha Enterprise Challenge
6240
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] hCaptcha Enterprise Challenge
No debug info