File name:

2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer

Full analysis: https://app.any.run/tasks/709be403-d3b9-4c8f-801a-a28b562a405c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 14, 2024, 03:26:41
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
floxif
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

43489D98026BBB6A05FF3C30FE70054D

SHA1:

D27EAC9AB652C8EEF0B8413E15BC1117FC5126B0

SHA256:

04CB7083F53D03EA14E80FE0D2E13B6435B7CBA6BDF7CABF91D7AAD1AEC75D3D

SSDEEP:

12288:n6e8FSTUEetVL4c4pYR/gx32ZZyEmB3iTUU0kxi9jP8arunAms7SlNvokpYfvOTA:Q3yhVOzLg5r

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
    • Connects to the CnC server

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
    • FLOXIF has been detected (SURICATA)

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
    • Executable content was dropped or overwritten

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
      • SamsungDeXSetupWin.exe (PID: 2976)
      • SamsungDeXSetupWin.exe (PID: 188)
    • Reads security settings of Internet Explorer

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
      • SamsungDeXSetupWin.exe (PID: 188)
    • Contacting a server suspected of hosting an CnC

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
    • Executes application which crashes

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
    • The process creates files with name similar to system file names

      • SamsungDeXSetupWin.exe (PID: 188)
    • Searches for installed software

      • SamsungDeXSetupWin.exe (PID: 188)
  • INFO

    • The sample compiled with english language support

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
      • SamsungDeXSetupWin.exe (PID: 188)
      • SamsungDeXSetupWin.exe (PID: 2976)
    • Create files in a temporary directory

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
      • SamsungDeXSetupWin.exe (PID: 2976)
      • SamsungDeXSetupWin.exe (PID: 188)
    • Reads the computer name

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
      • identity_helper.exe (PID: 5964)
      • SamsungDeXSetupWin.exe (PID: 188)
    • Checks supported languages

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
      • identity_helper.exe (PID: 5964)
      • SamsungDeXSetupWin.exe (PID: 2976)
      • SamsungDeXSetupWin.exe (PID: 188)
    • Checks proxy server information

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
    • Sends debugging messages

      • 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe (PID: 6328)
    • Reads Environment values

      • identity_helper.exe (PID: 5964)
    • Application launched itself

      • msedge.exe (PID: 6720)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6720)
    • The process uses the downloaded file

      • msedge.exe (PID: 1856)
      • msedge.exe (PID: 6720)
    • Reads the machine GUID from the registry

      • SamsungDeXSetupWin.exe (PID: 188)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:04:20 12:28:54+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.25
CodeSize: 103936
InitializedDataSize: 843776
UninitializedDataSize: -
EntryPoint: 0x7283
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.8
ProductVersionNumber: 1.0.0.8
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Samsung Electronics Co., Ltd.
FileDescription: Samsung DeX EasySetup
FileVersion: 1, 0, 0, 8
InternalName: Samsung DeX EasySetup
LegalCopyright: Copyright (c) Samsung Electronics Co., Ltd. All rights reserved.
OriginalFileName: SamsungDeXEasySetup.exe
ProductName: Samsung DeX EasySetup
ProductVersion: 1, 0, 0, 8
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
165
Monitored processes
40
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #FLOXIF 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe msedge.exe msedge.exe no specs werfault.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs samsungdexsetupwin.exe samsungdexsetupwin.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188"C:\Users\admin\AppData\Local\Temp\{619CA26A-597B-4EE4-A831-3FEAF01D81B5}\.cr\SamsungDeXSetupWin.exe" -burn.clean.room="C:\Users\admin\Downloads\SamsungDeXSetupWin.exe" -burn.filehandle.attached=584 -burn.filehandle.self=596 C:\Users\admin\AppData\Local\Temp\{619CA26A-597B-4EE4-A831-3FEAF01D81B5}\.cr\SamsungDeXSetupWin.exe
SamsungDeXSetupWin.exe
User:
admin
Company:
Samsung Electronics Co., Ltd.
Integrity Level:
MEDIUM
Description:
Samsung DeX
Version:
2.4.1.27
Modules
Images
c:\users\admin\appdata\local\temp\{619ca26a-597b-4ee4-a831-3feaf01d81b5}\.cr\samsungdexsetupwin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1476"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5400 --field-trial-handle=2324,i,5009419778567493299,14044129722062033053,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1512"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=5472 --field-trial-handle=2324,i,5009419778567493299,14044129722062033053,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1556"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6100 --field-trial-handle=2324,i,5009419778567493299,14044129722062033053,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1856"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5700 --field-trial-handle=2324,i,5009419778567493299,14044129722062033053,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2216"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6380 --field-trial-handle=2324,i,5009419778567493299,14044129722062033053,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2380"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5700 --field-trial-handle=2324,i,5009419778567493299,14044129722062033053,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2976"C:\Users\admin\Downloads\SamsungDeXSetupWin.exe" C:\Users\admin\Downloads\SamsungDeXSetupWin.exe
msedge.exe
User:
admin
Company:
Samsung Electronics Co., Ltd.
Integrity Level:
MEDIUM
Description:
Samsung DeX
Version:
2.4.1.27
Modules
Images
c:\users\admin\downloads\samsungdexsetupwin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3288"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5456 --field-trial-handle=2324,i,5009419778567493299,14044129722062033053,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3888"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7340 --field-trial-handle=2324,i,5009419778567493299,14044129722062033053,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
10 997
Read events
10 979
Write events
18
Delete events
0

Modification events

(PID) Process:(6328) 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6328) 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6328) 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6328) 2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(6720) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6720) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6720) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6720) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
AE4BA3CDC8872F00
(PID) Process:(6720) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6720) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
441CAACDC8872F00
Executable files
44
Suspicious files
122
Text files
110
Unknown types
2

Dropped files

PID
Process
Filename
Type
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF13812a.TMP
MD5:
SHA256:
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF13812a.TMP
MD5:
SHA256:
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF138139.TMP
MD5:
SHA256:
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF138139.TMP
MD5:
SHA256:
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF138178.TMP
MD5:
SHA256:
6720msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
63
TCP/UDP connections
54
DNS requests
55
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6328
2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe
GET
403
45.56.79.23:80
http://www.aieov.com/logo.gif
unknown
malicious
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6076
svchost.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6076
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6328
2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe
GET
45.56.79.23:80
http://www.aieov.com/logo.gif
unknown
malicious
GET
401
13.107.6.158:443
https://business.bing.com/api/v1/user/token/microsoftgraph?&clienttype=edge-omnibox
unknown
unknown
GET
301
2.16.252.53:443
https://www.samsung.com/global/download/SamsungDeXWin
unknown
unknown
GET
302
146.56.156.103:443
https://org.downloadcenter.samsung.com/downloadfile/ContentsFile.aspx?CDSite=UNI_IN&OriginYN=N&ModelType=N&ModelName=EE-MG950&CttFileID=10008631&CDCttType=SW&VPath=SW%2F202412%2F20241202182951562%2FSamsungDeXSetupWin.exe
unknown
unknown
7052
msedge.exe
GET
301
2.23.196.47:80
http://www.samsung.com/global/download/SamsungDeXWin
unknown
whitelisted
GET
304
13.107.21.239:443
https://edge.microsoft.com/abusiveadblocking/api/v1/blocklist
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6076
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1544
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.209.187:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4
System
192.168.100.255:138
whitelisted
6328
2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe
45.56.79.23:80
www.aieov.com
Linode, LLC
US
malicious
4712
MoUsoCoreWorker.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6076
svchost.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6076
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
  • 20.73.194.208
whitelisted
www.bing.com
  • 2.23.209.187
  • 2.23.209.130
  • 2.23.209.133
  • 2.23.209.182
  • 2.21.110.146
  • 2.21.110.139
whitelisted
google.com
  • 142.250.185.78
whitelisted
5isohu.com
whitelisted
www.aieov.com
  • 45.56.79.23
  • 198.58.118.167
  • 45.33.23.183
  • 96.126.123.244
  • 45.79.19.196
  • 45.33.2.79
  • 173.255.194.134
  • 72.14.185.43
  • 45.33.18.44
  • 45.33.30.197
  • 72.14.178.174
  • 45.33.20.235
malicious
crl.microsoft.com
  • 2.16.164.106
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
www.samsung.com
  • 2.23.196.47
whitelisted
edge.microsoft.com
  • 13.107.21.239
  • 204.79.197.239
whitelisted

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
Process
Message
2024-12-14_43489d98026bbb6a05ff3c30fe70054d_avoslocker_floxif_luca-stealer.exe
[SamsungDeXEasySetup] 42