File name:

2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop

Full analysis: https://app.any.run/tasks/26a6ac28-a724-416f-8d22-430ba5e6c0ab
Verdict: Malicious activity
Threats:

BlackMoon also known as KrBanker is a trojan aimed at stealing payment credentials. It specializes in man-in-the-browser (MitB) attacks, web injection, and credential theft to compromise users' online banking accounts. It was first noticed in early 2014 attacking banks in South Korea and has impressively evolved since by adding a number of new infiltration techniques and information stealing methods.

Analysis date: June 12, 2025, 16:30:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
blackmoon
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

025E4347FCF7276D463B652E957CD711

SHA1:

72B358856427D4D445FF27F7921C0BB366F91757

SHA256:

074E707CB1D9F2F9A1D1AC27BB6121DB88BCC90CEF65089793B1F70110FB25F7

SSDEEP:

49152:XFxUhnky7BM7W88988Nt5KBBDhzsf9hS1Sx5F2b35tZOP3E/4VhH3QLBf8XcHZ8M:3Uhnkyi8qDpsVhS1Sx5HPznWnNHq2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • BLACKMOON has been detected (YARA)

      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • rmkmpf.exe (PID: 768)
  • SUSPICIOUS

    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
    • Application launched itself

      • rmkmpf.exe (PID: 6684)
      • 897660.exe (PID: 2604)
      • 607856.exe (PID: 2980)
      • 996560.exe (PID: 592)
      • 255568.exe (PID: 7224)
      • 959998.exe (PID: 7296)
      • 592242.exe (PID: 7788)
      • 508680.exe (PID: 7900)
      • 821756.exe (PID: 7980)
      • 510074.exe (PID: 8152)
      • 464092.exe (PID: 8072)
      • 100787.exe (PID: 5372)
      • 482852.exe (PID: 1932)
      • 537834.exe (PID: 7824)
      • 953917.exe (PID: 7032)
      • 457526.exe (PID: 7968)
      • 346844.exe (PID: 1896)
      • 973980.exe (PID: 7244)
      • 757230.exe (PID: 5780)
      • 490666.exe (PID: 7344)
      • 627009.exe (PID: 2512)
      • 732942.exe (PID: 2980)
      • 625173.exe (PID: 7904)
      • 013087.exe (PID: 3900)
      • 956231.exe (PID: 7224)
      • 539209.exe (PID: 5620)
      • 917338.exe (PID: 7424)
      • 384126.exe (PID: 7508)
      • 552374.exe (PID: 8104)
      • 352010.exe (PID: 8136)
      • 697873.exe (PID: 5168)
      • 825307.exe (PID: 2620)
      • 214911.exe (PID: 7260)
      • 837991.exe (PID: 7816)
      • 642994.exe (PID: 7484)
      • 186778.exe (PID: 7832)
      • 079029.exe (PID: 7940)
      • 298269.exe (PID: 5564)
      • 858862.exe (PID: 7512)
      • 715506.exe (PID: 7516)
      • 634355.exe (PID: 8048)
      • 876624.exe (PID: 7212)
      • 770324.exe (PID: 7240)
      • 620642.exe (PID: 8184)
      • 668734.exe (PID: 7904)
      • 602099.exe (PID: 6192)
      • 045680.exe (PID: 8072)
      • 616374.exe (PID: 6236)
      • 081137.exe (PID: 7232)
      • 152089.exe (PID: 8164)
    • Executable content was dropped or overwritten

      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • rmkmpf.exe (PID: 768)
    • Reads the date of Windows installation

      • rmkmpf.exe (PID: 6684)
      • rmkmpf.exe (PID: 768)
    • Reads security settings of Internet Explorer

      • rmkmpf.exe (PID: 768)
      • 897660.exe (PID: 2604)
      • 607856.exe (PID: 2980)
      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • 996560.exe (PID: 592)
      • 255568.exe (PID: 7224)
      • 959998.exe (PID: 7296)
      • 592242.exe (PID: 7788)
      • 464092.exe (PID: 8072)
      • 508680.exe (PID: 7900)
      • 821756.exe (PID: 7980)
      • 510074.exe (PID: 8152)
      • 537834.exe (PID: 7824)
      • 100787.exe (PID: 5372)
      • 081137.exe (PID: 7232)
      • 482852.exe (PID: 1932)
      • 953917.exe (PID: 7032)
      • 457526.exe (PID: 7968)
    • Starts itself from another location

      • rmkmpf.exe (PID: 768)
      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
    • Searches for installed software

      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
    • Explorer used for Indirect Command Execution

      • explorer.exe (PID: 6836)
    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 1644)
    • Executing commands from a ".bat" file

      • explorer.exe (PID: 1644)
    • There is functionality for taking screenshot (YARA)

      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • rmkmpf.exe (PID: 768)
  • INFO

    • Reads the computer name

      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • rmkmpf.exe (PID: 768)
      • 897660.exe (PID: 2604)
      • 996560.exe (PID: 592)
      • 607856.exe (PID: 2980)
      • 255568.exe (PID: 7224)
      • 592242.exe (PID: 7788)
      • 959998.exe (PID: 7296)
      • identity_helper.exe (PID: 7488)
      • 508680.exe (PID: 7900)
      • 821756.exe (PID: 7980)
      • 464092.exe (PID: 8072)
      • 510074.exe (PID: 8152)
      • 100787.exe (PID: 5372)
      • 081137.exe (PID: 7232)
      • 537834.exe (PID: 7824)
      • 482852.exe (PID: 1932)
      • 953917.exe (PID: 7032)
      • 457526.exe (PID: 7968)
    • The sample compiled with chinese language support

      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • rmkmpf.exe (PID: 768)
    • Reads Environment values

      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • identity_helper.exe (PID: 7488)
    • Process checks computer location settings

      • rmkmpf.exe (PID: 6684)
      • rmkmpf.exe (PID: 768)
      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • 897660.exe (PID: 2604)
      • 996560.exe (PID: 592)
      • 607856.exe (PID: 2980)
      • 592242.exe (PID: 7788)
      • 959998.exe (PID: 7296)
      • 508680.exe (PID: 7900)
      • 464092.exe (PID: 8072)
      • 510074.exe (PID: 8152)
      • 821756.exe (PID: 7980)
      • 255568.exe (PID: 7224)
      • 100787.exe (PID: 5372)
      • 482852.exe (PID: 1932)
      • 081137.exe (PID: 7232)
      • 953917.exe (PID: 7032)
      • 537834.exe (PID: 7824)
      • 457526.exe (PID: 7968)
    • Checks supported languages

      • rmkmpf.exe (PID: 768)
      • 897660.exe (PID: 2604)
      • rmkmpf.exe (PID: 6684)
      • 897660.exe (PID: 5232)
      • 607856.exe (PID: 2980)
      • 607856.exe (PID: 3460)
      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • 996560.exe (PID: 592)
      • 996560.exe (PID: 6980)
      • 255568.exe (PID: 7224)
      • 959998.exe (PID: 7296)
      • 255568.exe (PID: 7268)
      • 959998.exe (PID: 7340)
      • identity_helper.exe (PID: 7488)
      • 592242.exe (PID: 7788)
      • 592242.exe (PID: 7832)
      • 508680.exe (PID: 7900)
      • 508680.exe (PID: 7944)
      • 821756.exe (PID: 8028)
      • 464092.exe (PID: 8072)
      • 510074.exe (PID: 8152)
      • 464092.exe (PID: 8116)
      • 821756.exe (PID: 7980)
      • 510074.exe (PID: 592)
      • 100787.exe (PID: 5372)
      • 100787.exe (PID: 4580)
      • 482852.exe (PID: 7740)
      • 081137.exe (PID: 7232)
      • 537834.exe (PID: 7824)
      • 081137.exe (PID: 7292)
      • 482852.exe (PID: 1932)
      • 953917.exe (PID: 6680)
      • 537834.exe (PID: 7832)
      • 953917.exe (PID: 7032)
      • 457526.exe (PID: 7968)
      • 457526.exe (PID: 7996)
    • Reads the machine GUID from the registry

      • rmkmpf.exe (PID: 768)
    • Creates files or folders in the user directory

      • rmkmpf.exe (PID: 768)
    • Create files in a temporary directory

      • 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe (PID: 6004)
      • rmkmpf.exe (PID: 768)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 1644)
    • Application launched itself

      • msedge.exe (PID: 6148)
      • msedge.exe (PID: 2044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:08:17 08:34:04+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 368640
InitializedDataSize: 1241088
UninitializedDataSize: -
EntryPoint: 0x4fd00
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.6.1.1
ProductVersionNumber: 5.6.1.1
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileVersion: 5.6.1.1
FileDescription:
ProductName:
ProductVersion: 5.6.1.1
CompanyName:
LegalCopyright:
Comments: 本程序使用易语言编写(http://www.dywt.com.cn)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
270
Monitored processes
135
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #BLACKMOON 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exe rmkmpf.exe no specs #BLACKMOON rmkmpf.exe 897660.exe no specs 897660.exe no specs 607856.exe no specs 607856.exe no specs msedge.exe no specs explorer.exe no specs msedge.exe explorer.exe no specs cmd.exe no specs conhost.exe no specs 996560.exe no specs 996560.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs 255568.exe no specs 255568.exe no specs 959998.exe no specs 959998.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs 592242.exe no specs 592242.exe no specs msedge.exe no specs 508680.exe no specs 508680.exe no specs 821756.exe no specs 821756.exe no specs 464092.exe no specs 464092.exe no specs 510074.exe no specs 510074.exe no specs 100787.exe no specs 100787.exe no specs 081137.exe no specs 081137.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs 482852.exe no specs 482852.exe no specs 537834.exe no specs 537834.exe no specs 953917.exe no specs 953917.exe no specs 457526.exe no specs 457526.exe no specs slui.exe 757230.exe no specs 757230.exe no specs 346844.exe no specs 346844.exe no specs 352010.exe no specs 352010.exe no specs 627009.exe no specs 627009.exe no specs 973980.exe no specs 973980.exe no specs 956231.exe no specs 956231.exe no specs msedge.exe no specs 490666.exe no specs 490666.exe no specs msedge.exe no specs 732942.exe no specs 732942.exe no specs 625173.exe no specs 625173.exe no specs 013087.exe no specs 013087.exe no specs msedge.exe no specs 917338.exe no specs 917338.exe no specs 384126.exe no specs 384126.exe no specs 539209.exe no specs 539209.exe no specs 552374.exe no specs 552374.exe no specs msedge.exe no specs 152089.exe no specs 152089.exe no specs 298269.exe no specs 298269.exe no specs 697873.exe no specs 697873.exe no specs 770324.exe no specs 770324.exe no specs 825307.exe no specs 825307.exe no specs 214911.exe no specs 214911.exe no specs msedge.exe no specs 642994.exe no specs 642994.exe no specs 837991.exe no specs 837991.exe no specs 186778.exe no specs 186778.exe no specs 079029.exe no specs 079029.exe no specs 668734.exe no specs 668734.exe no specs 602099.exe no specs 602099.exe no specs msedge.exe no specs 634355.exe no specs 634355.exe no specs msedge.exe no specs 715506.exe no specs 715506.exe no specs 858862.exe no specs 858862.exe no specs 045680.exe no specs 045680.exe no specs 616374.exe no specs 616374.exe no specs 620642.exe no specs 620642.exe no specs 876624.exe no specs 876624.exe no specs 208143.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
592"C:\Users\admin\AppData\Roaming\Download\996560.exe" /ShorttailedrestartC:\Users\admin\AppData\Roaming\Download\996560.exermkmpf.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\996560.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
592"C:\Users\admin\AppData\Roaming\Download\510074.exe" C:\Users\admin\AppData\Roaming\Download\510074.exe510074.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\510074.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
620"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2408,i,14579844833229892728,11084918241456617391,262144 --variations-seed-version --mojo-platform-channel-handle=2404 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
760"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3632,i,14579844833229892728,11084918241456617391,262144 --variations-seed-version --mojo-platform-channel-handle=3684 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
768"C:\Users\admin\AppData\Local\Temp\rmkmpf.exe" /jsjczxztcqC:\Users\admin\AppData\Local\Temp\rmkmpf.exe
rmkmpf.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\local\temp\rmkmpf.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
868"C:\Users\admin\AppData\Roaming\Download\956231.exe" C:\Users\admin\AppData\Roaming\Download\956231.exe956231.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\956231.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
888"C:\Users\admin\AppData\Roaming\Download\552374.exe" C:\Users\admin\AppData\Roaming\Download\552374.exe552374.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\552374.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
1208"C:\Users\admin\AppData\Roaming\Download\208143.exe" /ShorttailedrestartC:\Users\admin\AppData\Roaming\Download\208143.exermkmpf.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\208143.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
1332"C:\Users\admin\AppData\Roaming\Download\825307.exe" C:\Users\admin\AppData\Roaming\Download\825307.exe825307.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\825307.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
1512C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\ldsajdklsajdlkjsalkda.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
Total events
36 521
Read events
36 476
Write events
45
Delete events
0

Modification events

(PID) Process:(6004) 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings
Operation:writeName:JITDebug
Value:
0
(PID) Process:(6004) 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6004) 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6004) 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6004) 2025-06-12_025e4347fcf7276d463b652e957cd711_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6684) rmkmpf.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6684) rmkmpf.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6684) rmkmpf.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6684) rmkmpf.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(768) rmkmpf.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
54
Suspicious files
283
Text files
68
Unknown types
31

Dropped files

PID
Process
Filename
Type
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old~RF1785d9.TMP
MD5:
SHA256:
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old
MD5:
SHA256:
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Variationsbinary
MD5:CDDDC745A8C954DC438C931889999BDB
SHA256:3DC9043838386F5363AC96A01477CF3163B5118B80191576A11B32CE9894314C
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF1785f9.TMP
MD5:
SHA256:
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF1785f9.TMP
MD5:
SHA256:
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF1785d9.TMP
MD5:
SHA256:
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
2044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF178608.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
214
TCP/UDP connections
233
DNS requests
183
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.204.141:443
https://copilot.microsoft.com/c/api/user/eligibility
unknown
binary
25 b
whitelisted
1268
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7052
RUXIMICS.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5600
msedge.exe
GET
301
101.198.2.134:80
http://hao.360.cn/?src=lm&ls=n6abbbb598c
unknown
whitelisted
7052
RUXIMICS.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
13.107.42.16:443
https://config.edge.skype.com/config/v1/Edge/133.0.3065.92?clientId=4489578223053569932&agents=EdgeFirstRun%2CEdgeFirstRunConfig&osname=win&client=edge&channel=stable&scpfre=0&osarch=x86_64&osver=10.0.19045&wu=1&devicefamily=desktop&uma=0&sessionid=51&mngd=0&installdate=1661339457&edu=0&soobedate=1504771245&bphint=2&fg=1&lbfgdate=1741678270&lafgdate=0
unknown
binary
1.16 Kb
whitelisted
GET
200
2.16.241.201:443
https://www.bing.com/api/shopping/v1/user/shoppingsettings
unknown
binary
1.02 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7052
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
7052
RUXIMICS.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
7052
RUXIMICS.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
dt.hebchengjiu.com
unknown
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
hao.360.cn
  • 101.198.2.134
whitelisted
copilot.microsoft.com
  • 2.16.204.153
  • 2.16.204.141
whitelisted
hao.360.com
  • 106.63.24.67
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Possible Chrome Plugin install
No debug info