URL:

https://driverpack.io/en

Full analysis: https://app.any.run/tasks/429ebd40-2ced-44ec-a048-5da622d127a1
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 29, 2025, 14:43:33
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
pua
adware
qrcode
Indicators:
MD5:

13926593A3E552F931023BD6407FC738

SHA1:

0A189532D99B8DB9496E55EC0A0F431B42706402

SHA256:

118DA9067C083D6167D0D955ABEE981C42FC4427834D7228910E0788CA668FC4

SSDEEP:

3:N8PMM5OL+u:28qu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads files via BITSADMIN.EXE

      • cmd.exe (PID: 3304)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7084)
    • ADWARE has been detected (SURICATA)

      • svchost.exe (PID: 2196)
      • aria2c.exe (PID: 8536)
      • aria2c.exe (PID: 9080)
      • aria2c.exe (PID: 8428)
      • aria2c.exe (PID: 8360)
      • aria2c.exe (PID: 7580)
      • aria2c.exe (PID: 11120)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 2108)
    • Starts Visual C# compiler

      • powershell.exe (PID: 7084)
    • Registers / Runs the DLL via REGSVR32.EXE

      • cmd.exe (PID: 5408)
  • SUSPICIOUS

    • Process requests binary or script from the Internet

      • mshta.exe (PID: 684)
      • mshta.exe (PID: 7416)
      • aria2c.exe (PID: 8536)
      • aria2c.exe (PID: 9080)
      • aria2c.exe (PID: 8900)
      • aria2c.exe (PID: 8360)
      • aria2c.exe (PID: 7580)
      • aria2c.exe (PID: 8428)
      • aria2c.exe (PID: 8980)
      • aria2c.exe (PID: 9004)
      • 360tsNew.exe (PID: 9544)
      • aria2c.exe (PID: 11120)
    • Query Microsoft Defender status

      • mshta.exe (PID: 684)
      • cmd.exe (PID: 6388)
    • Found strings related to reading or modifying Windows Defender settings

      • mshta.exe (PID: 684)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 6388)
      • cmd.exe (PID: 2108)
    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 684)
      • mshta.exe (PID: 1348)
      • cmd.exe (PID: 4212)
      • RuntimePack.exe (PID: 8856)
      • cmd.exe (PID: 5408)
      • DirectX.exe (PID: 10868)
    • Cmdlet gets the status of antimalware software installed on the computer

      • cmd.exe (PID: 6388)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7724)
      • cmd.exe (PID: 3304)
      • cmd.exe (PID: 1348)
      • cmd.exe (PID: 6436)
      • cmd.exe (PID: 4040)
      • cmd.exe (PID: 4692)
      • cmd.exe (PID: 7708)
      • cmd.exe (PID: 2392)
      • cmd.exe (PID: 4692)
    • The process verifies whether the antivirus software is installed

      • mshta.exe (PID: 684)
    • The executable file from the user directory is run by the CMD process

      • 7za.exe (PID: 5556)
      • driverpack-wget.exe (PID: 6244)
      • driverpack-wget.exe (PID: 4572)
      • driverpack-wget.exe (PID: 5172)
      • driverpack-wget.exe (PID: 5744)
      • driverpack-wget.exe (PID: 8000)
      • driverpack-wget.exe (PID: 6660)
      • driverpack-wget.exe (PID: 7744)
      • driverpack-wget.exe (PID: 3012)
      • driverpack-wget.exe (PID: 8272)
      • driverpack-wget.exe (PID: 5172)
      • driverpack-wget.exe (PID: 9060)
      • driverpack-wget.exe (PID: 8772)
      • driverpack-wget.exe (PID: 8792)
      • driverpack-wget.exe (PID: 3800)
      • driverpack-wget.exe (PID: 8520)
      • driverpack-wget.exe (PID: 9160)
      • driverpack-wget.exe (PID: 8544)
      • driverpack-wget.exe (PID: 5008)
      • driverpack-wget.exe (PID: 2896)
      • driverpack-wget.exe (PID: 5204)
      • driverpack-wget.exe (PID: 672)
      • driverpack-wget.exe (PID: 8196)
      • driverpack-wget.exe (PID: 9184)
      • driverpack-wget.exe (PID: 9172)
      • driverpack-wget.exe (PID: 8328)
      • driverpack-wget.exe (PID: 1240)
      • driverpack-wget.exe (PID: 8240)
      • driverpack-wget.exe (PID: 9124)
      • driverpack-wget.exe (PID: 8596)
      • driverpack-wget.exe (PID: 8208)
      • aria2c.exe (PID: 8428)
      • aria2c.exe (PID: 8900)
      • aria2c.exe (PID: 8536)
      • aria2c.exe (PID: 9080)
      • aria2c.exe (PID: 8980)
      • driverpack-wget.exe (PID: 8732)
      • driverpack-wget.exe (PID: 1240)
      • driverpack-wget.exe (PID: 7148)
      • driverpack-wget.exe (PID: 1272)
      • driverpack-wget.exe (PID: 6404)
      • driverpack-wget.exe (PID: 720)
      • driverpack-wget.exe (PID: 5728)
      • driverpack-wget.exe (PID: 8128)
      • driverpack-wget.exe (PID: 8836)
      • driverpack-wget.exe (PID: 9152)
      • driverpack-wget.exe (PID: 8080)
      • driverpack-wget.exe (PID: 8648)
      • driverpack-wget.exe (PID: 2984)
      • SearcherBar.exe (PID: 8516)
      • driverpack-wget.exe (PID: 8916)
      • driverpack-wget.exe (PID: 7956)
      • driverpack-wget.exe (PID: 5204)
      • driverpack-wget.exe (PID: 9000)
      • driverpack-wget.exe (PID: 2244)
      • driverpack-wget.exe (PID: 8684)
      • driverpack-wget.exe (PID: 5328)
      • driverpack-wget.exe (PID: 8924)
      • driverpack-wget.exe (PID: 8532)
      • aria2c.exe (PID: 8360)
      • driverpack-wget.exe (PID: 1548)
      • driverpack-wget.exe (PID: 5124)
      • driverpack-wget.exe (PID: 4276)
      • aria2c.exe (PID: 7580)
      • Chrone.exe (PID: 1188)
      • driverpack-wget.exe (PID: 8792)
      • driverpack-wget.exe (PID: 3804)
      • driverpack-wget.exe (PID: 2664)
      • driverpack-wget.exe (PID: 8432)
      • driverpack-wget.exe (PID: 9140)
      • aria2c.exe (PID: 9004)
      • driverpack-wget.exe (PID: 8688)
      • driverpack-wget.exe (PID: 9204)
      • driverpack-wget.exe (PID: 8168)
      • driverpack-wget.exe (PID: 2776)
      • driverpack-wget.exe (PID: 4304)
      • OperaBlink64.exe (PID: 9208)
      • driverpack-wget.exe (PID: 3140)
      • driverpack-wget.exe (PID: 5260)
      • driverpack-wget.exe (PID: 9156)
      • driverpack-wget.exe (PID: 8548)
      • driverpack-wget.exe (PID: 456)
      • driverpack-wget.exe (PID: 8828)
      • driverpack-wget.exe (PID: 5772)
      • driverpack-wget.exe (PID: 9148)
      • driverpack-wget.exe (PID: 8804)
      • driverpack-wget.exe (PID: 4976)
      • RuntimePack.exe (PID: 8856)
      • DriverPack-Alice.exe (PID: 6456)
      • driverpack-wget.exe (PID: 10168)
      • driverpack-wget.exe (PID: 10060)
      • driverpack-wget.exe (PID: 10224)
      • DirectX.exe (PID: 10868)
      • driverpack-wget.exe (PID: 9228)
      • aria2c.exe (PID: 11120)
      • driverpack-wget.exe (PID: 9932)
      • driverpack-wget.exe (PID: 4408)
      • 360tsNew.exe (PID: 9544)
      • driverpack-wget.exe (PID: 10532)
      • driverpack-wget.exe (PID: 7624)
      • driverpack-wget.exe (PID: 1004)
      • driverpack-wget.exe (PID: 11100)
      • driverpack-wget.exe (PID: 10932)
      • driverpack-wget.exe (PID: 10536)
      • driverpack-wget.exe (PID: 9856)
      • driverpack-wget.exe (PID: 10960)
      • driverpack-wget.exe (PID: 10304)
      • driverpack-wget.exe (PID: 9064)
      • driverpack-wget.exe (PID: 9476)
      • driverpack-wget.exe (PID: 2564)
      • driverpack-wget.exe (PID: 11104)
      • driverpack-wget.exe (PID: 1004)
      • driverpack-wget.exe (PID: 2204)
      • driverpack-wget.exe (PID: 1040)
      • driverpack-wget.exe (PID: 10444)
      • driverpack-wget.exe (PID: 10108)
      • driverpack-wget.exe (PID: 10728)
      • driverpack-wget.exe (PID: 10772)
      • driverpack-wget.exe (PID: 9308)
      • driverpack-wget.exe (PID: 10592)
      • driverpack-wget.exe (PID: 8156)
      • driverpack-wget.exe (PID: 9856)
      • driverpack-wget.exe (PID: 9148)
      • driverpack-wget.exe (PID: 11204)
      • driverpack-wget.exe (PID: 10092)
      • driverpack-wget.exe (PID: 3160)
      • driverpack-wget.exe (PID: 8380)
    • Drops 7-zip archiver for unpacking

      • expand.exe (PID: 780)
      • 7za.exe (PID: 5556)
    • Executable content was dropped or overwritten

      • 7za.exe (PID: 5556)
      • expand.exe (PID: 780)
      • csc.exe (PID: 7760)
      • SearcherBar.exe (PID: 8516)
      • Chrone.exe (PID: 1188)
      • mshta.exe (PID: 1348)
      • OperaBlink64.exe (PID: 8680)
      • aria2c.exe (PID: 8536)
      • aria2c.exe (PID: 9004)
      • OperaBlink64.exe (PID: 8044)
      • OperaBlink64.exe (PID: 8224)
      • assistant_package_sfx.exe (PID: 7584)
      • OperaBlink64.exe (PID: 8376)
      • installer.exe (PID: 2332)
      • RuntimePack.exe (PID: 8856)
      • installer.exe (PID: 9204)
      • assistant_installer.exe (PID: 8824)
      • cmd.exe (PID: 5408)
      • 360tsNew.exe (PID: 9544)
      • csc.exe (PID: 10780)
      • DirectX.exe (PID: 10868)
      • launcher.exe (PID: 8768)
      • installer.exe (PID: 8744)
      • OperaBlink64.exe (PID: 9208)
      • xcopy.exe (PID: 10264)
      • 360TS_Setup.exe (PID: 11072)
      • xcopy.exe (PID: 9736)
      • 360TS_Setup.exe (PID: 10256)
      • opera_autoupdate.exe (PID: 7020)
      • xcopy.exe (PID: 11020)
      • xcopy.exe (PID: 7740)
    • Process drops legitimate windows executable

      • 7za.exe (PID: 5556)
      • Chrone.exe (PID: 1188)
      • assistant_package_sfx.exe (PID: 7584)
      • RuntimePack.exe (PID: 8856)
      • assistant_installer.exe (PID: 8824)
      • cmd.exe (PID: 5408)
      • DirectX.exe (PID: 10868)
    • Executing commands from a ".bat" file

      • mshta.exe (PID: 684)
      • cmd.exe (PID: 4212)
    • Application launched itself

      • cmd.exe (PID: 4212)
      • mshta.exe (PID: 684)
      • OperaBlink64.exe (PID: 9208)
      • OperaBlink64.exe (PID: 8224)
      • assistant_installer.exe (PID: 7036)
      • installer.exe (PID: 9204)
      • assistant_installer.exe (PID: 8824)
      • assistant_installer.exe (PID: 8908)
      • browser_assistant.exe (PID: 9288)
      • cmd.exe (PID: 5408)
      • opera.exe (PID: 1240)
      • opera.exe (PID: 9472)
      • opera_autoupdate.exe (PID: 10008)
      • opera_autoupdate.exe (PID: 7020)
    • Unpacks CAB file

      • expand.exe (PID: 780)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 2108)
    • Executing commands from ".cmd" file

      • mshta.exe (PID: 1348)
      • RuntimePack.exe (PID: 8856)
      • DirectX.exe (PID: 10868)
    • The process hide an interactive prompt from the user

      • cmd.exe (PID: 2108)
    • Get information on the list of running processes

      • cmd.exe (PID: 2108)
    • The process hides Powershell's copyright startup banner

      • cmd.exe (PID: 2108)
    • Access to an unwanted program domain was detected

      • svchost.exe (PID: 2196)
      • aria2c.exe (PID: 8536)
      • aria2c.exe (PID: 8428)
      • aria2c.exe (PID: 9080)
      • aria2c.exe (PID: 7580)
      • aria2c.exe (PID: 8360)
      • aria2c.exe (PID: 11120)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 2108)
    • Uses .NET C# to load dll

      • powershell.exe (PID: 7084)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 7760)
      • csc.exe (PID: 10780)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • cmd.exe (PID: 1096)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • cmd.exe (PID: 7920)
    • Starts application with an unusual extension

      • cmd.exe (PID: 8484)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 8484)
    • Potential Corporate Privacy Violation

      • aria2c.exe (PID: 8428)
      • aria2c.exe (PID: 9080)
      • aria2c.exe (PID: 8980)
      • aria2c.exe (PID: 8360)
      • aria2c.exe (PID: 7580)
      • aria2c.exe (PID: 9004)
      • aria2c.exe (PID: 8536)
      • aria2c.exe (PID: 8900)
      • 360tsNew.exe (PID: 9544)
      • aria2c.exe (PID: 11120)
    • Starts itself from another location

      • OperaBlink64.exe (PID: 9208)
      • 360TS_Setup.exe (PID: 11072)
    • The process drops C-runtime libraries

      • RuntimePack.exe (PID: 8856)
      • cmd.exe (PID: 5408)
    • The process executes via Task Scheduler

      • launcher.exe (PID: 8768)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 5408)
    • Connects to unusual port

      • opera.exe (PID: 9352)
  • INFO

    • Checks supported languages

      • identity_helper.exe (PID: 4740)
      • 7za.exe (PID: 5556)
      • expand.exe (PID: 780)
    • Application launched itself

      • msedge.exe (PID: 5576)
    • Reads the computer name

      • identity_helper.exe (PID: 4740)
      • 7za.exe (PID: 5556)
    • Reads Environment values

      • identity_helper.exe (PID: 4740)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 5576)
    • Checks proxy server information

      • mshta.exe (PID: 684)
      • mshta.exe (PID: 1348)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 684)
      • mshta.exe (PID: 1348)
    • Uses BITSADMIN.EXE

      • cmd.exe (PID: 7724)
      • cmd.exe (PID: 1348)
      • cmd.exe (PID: 6436)
      • cmd.exe (PID: 4040)
      • cmd.exe (PID: 4692)
      • cmd.exe (PID: 7708)
      • cmd.exe (PID: 2392)
      • cmd.exe (PID: 4692)
    • The sample compiled with english language support

      • expand.exe (PID: 780)
      • 7za.exe (PID: 5556)
      • aria2c.exe (PID: 8980)
      • msedge.exe (PID: 7148)
      • Chrone.exe (PID: 1188)
      • aria2c.exe (PID: 9004)
      • OperaBlink64.exe (PID: 8680)
      • OperaBlink64.exe (PID: 9208)
      • OperaBlink64.exe (PID: 8224)
      • OperaBlink64.exe (PID: 8044)
      • assistant_package_sfx.exe (PID: 7584)
      • installer.exe (PID: 2332)
      • RuntimePack.exe (PID: 8856)
      • installer.exe (PID: 9204)
      • assistant_installer.exe (PID: 8824)
      • cmd.exe (PID: 5408)
      • 360tsNew.exe (PID: 9544)
      • DirectX.exe (PID: 10868)
      • launcher.exe (PID: 8768)
      • installer.exe (PID: 8744)
      • OperaBlink64.exe (PID: 8376)
      • xcopy.exe (PID: 10264)
      • xcopy.exe (PID: 9736)
      • opera_autoupdate.exe (PID: 7020)
      • xcopy.exe (PID: 11020)
      • xcopy.exe (PID: 7740)
    • Create files in a temporary directory

      • expand.exe (PID: 780)
      • 7za.exe (PID: 5556)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 6184)
    • The sample compiled with russian language support

      • 7za.exe (PID: 5556)
    • Reads the machine GUID from the registry

      • expand.exe (PID: 780)
    • Changes the display of characters in the console

      • cmd.exe (PID: 8484)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 7148)
    • The sample compiled with german language support

      • RuntimePack.exe (PID: 8856)
      • cmd.exe (PID: 5408)
    • The sample compiled with spanish language support

      • RuntimePack.exe (PID: 8856)
      • cmd.exe (PID: 5408)
    • The sample compiled with Italian language support

      • RuntimePack.exe (PID: 8856)
      • cmd.exe (PID: 5408)
    • The sample compiled with japanese language support

      • RuntimePack.exe (PID: 8856)
      • cmd.exe (PID: 5408)
    • Manual execution by a user

      • assistant_installer.exe (PID: 8908)
      • opera.exe (PID: 1240)
    • Checks operating system version

      • cmd.exe (PID: 5408)
    • The sample compiled with french language support

      • RuntimePack.exe (PID: 8856)
      • cmd.exe (PID: 5408)
    • The sample compiled with korean language support

      • RuntimePack.exe (PID: 8856)
      • cmd.exe (PID: 5408)
    • The sample compiled with chinese language support

      • RuntimePack.exe (PID: 8856)
      • cmd.exe (PID: 5408)
      • 360TS_Setup.exe (PID: 10256)
      • 360TS_Setup.exe (PID: 11072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
882
Monitored processes
739
Malicious processes
23
Suspicious processes
16

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs mshta.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs expand.exe cmd.exe no specs conhost.exe no specs 7za.exe msedge.exe no specs msedge.exe no specs cmd.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs mshta.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs #ADWARE svchost.exe cmd.exe no specs rundll32.exe no specs conhost.exe no specs mshta.exe netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs csc.exe cvtres.exe no specs slui.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe msedge.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe msedge.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-7za.exe no specs conhost.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe rundll32.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs #ADWARE aria2c.exe aria2c.exe #ADWARE aria2c.exe #ADWARE aria2c.exe aria2c.exe msedge.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe msedge.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe msedge.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs #ADWARE aria2c.exe searcherbar.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe msedge.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs #ADWARE aria2c.exe chrone.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs aria2c.exe driverpack-alice.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs operablink64.exe operablink64.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe operablink64.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe operablink64.exe operablink64.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe msedge.exe no specs assistant_package_sfx.exe assistant_installer.exe no specs assistant_installer.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe msedge.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs installer.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe installer.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs runtimepack.exe UIAutomationCrossBitnessHook32 Class no specs assistant_installer.exe assistant_installer.exe no specs assistant_installer.exe no specs cmd.exe conhost.exe no specs assistant_installer.exe no specs browser_assistant.exe launcher.exe no specs launcher.exe no specs browser_assistant.exe no specs launcher.exe no specs launcher.exe no specs opera.exe no specs cmd.exe no specs launcher.exe no specs launcher.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe regsvr32.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe msedge.exe no specs regsvr32.exe no specs cmd.exe no specs conhost.exe no specs 360tsnew.exe opera_crashreporter.exe no specs opera_gx_splash.exe no specs regsvr32.exe no specs opera.exe no specs opera.exe no specs regsvr32.exe no specs opera.exe opera_crashreporter.exe no specs opera_gx_splash.exe no specs regsvr32.exe no specs opera.exe no specs opera.exe opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs csc.exe regsvr32.exe no specs cmd.exe no specs conhost.exe no specs directx.exe regsvr32.exe no specs cvtres.exe no specs regsvr32.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs #ADWARE aria2c.exe conhost.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs regsvr32.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe regsvr32.exe no specs driverpack-wget.exe driverpack-wget.exe regsvr32.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs regsvr32.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs launcher.exe opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera_autoupdate.exe opera_autoupdate.exe no specs regsvr32.exe no specs regedit.exe no specs compact.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe compact.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs opera.exe no specs compact.exe no specs installer.exe compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs msedge.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs compact.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs compact.exe no specs opera_autoupdate.exe opera_autoupdate.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe opera.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe opera.exe no specs opera.exe no specs opera.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs msedge.exe no specs conhost.exe no specs opera.exe no specs xcopy.exe 360ts_setup.exe opera.exe no specs xcopy.exe cmd.exe no specs conhost.exe no specs driverpack-wget.exe xcopy.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe 360ts_setup.exe installer.exe no specs xcopy.exe opera.exe no specs opera.exe no specs opera.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
456\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
456"C:\Windows\System32\cmd.exe" /c ""tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Users\admin\AppData\Local\Temp\beetle-cab\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/EXPERT-CONFIGURATOR-1.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_48420.log" & echo DONE > "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_finished_48420.txt""C:\Windows\SysWOW64\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
456"tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Users\admin\AppData\Local\Temp\beetle-cab\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/STORIES-all-1.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_75791.log" C:\Users\admin\AppData\Local\Temp\beetle-cab\DriverPack\Tools\driverpack-wget.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\beetle-cab\driverpack\tools\driverpack-wget.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
456C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}C:\Windows\SysWOW64\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
472"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=8108 --field-trial-handle=2416,i,18103883788985558289,2221836753756272233,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
472findstr /R /V "^f7f81a39-5f63-5b42-9efd-1f13b5431005quot; C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
496"C:\Windows\System32\cmd.exe" /c ""tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Users\admin\AppData\Local\Temp\beetle-cab\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/COMPILATION-1.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_5871.log" & echo DONE > "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_finished_5871.txt""C:\Windows\SysWOW64\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
496\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
496\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
110 694
Read events
108 364
Write events
1 929
Delete events
401

Modification events

(PID) Process:(5576) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5576) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5576) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5576) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5576) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
25D82F1C82922F00
(PID) Process:(5576) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
FEED3B1C82922F00
(PID) Process:(5576) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197346
Operation:writeName:WindowTabManagerFileMappingId
Value:
{7D7B31EF-A7CB-4D55-BFEF-B6679BA2CE15}
(PID) Process:(5576) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197346
Operation:writeName:WindowTabManagerFileMappingId
Value:
{7A3CD701-F330-47E6-8DEF-092C95835FD6}
(PID) Process:(5576) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197346
Operation:writeName:WindowTabManagerFileMappingId
Value:
{017330F2-23D6-40CB-87AD-13AB8C4C8AC2}
(PID) Process:(5576) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197346
Operation:writeName:WindowTabManagerFileMappingId
Value:
{DB0247FF-B325-4F22-B4C3-95D5AD5FC74D}
Executable files
745
Suspicious files
2 687
Text files
1 569
Unknown types
2

Dropped files

PID
Process
Filename
Type
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10d071.TMP
MD5:
SHA256:
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10d081.TMP
MD5:
SHA256:
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10d0a0.TMP
MD5:
SHA256:
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10d0a0.TMP
MD5:
SHA256:
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10d10d.TMP
MD5:
SHA256:
5576msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1 373
TCP/UDP connections
785
DNS requests
255
Threats
601

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
72.246.169.155:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
684
mshta.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/step1_av.html
unknown
whitelisted
7668
SIHClient.exe
GET
200
72.246.169.155:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7668
SIHClient.exe
GET
200
72.246.169.155:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
684
mshta.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js
unknown
whitelisted
684
mshta.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/style.css
unknown
whitelisted
684
mshta.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/client_ip.js
unknown
whitelisted
684
mshta.exe
GET
200
46.137.15.86:80
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.js
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.18:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
72.246.169.155:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
20.190.159.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5576
msedge.exe
239.255.255.250:1900
whitelisted
7364
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7364
msedge.exe
104.20.168.62:443
driverpack.io
CLOUDFLARENET
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.19
  • 23.216.77.25
  • 23.216.77.8
  • 2.19.11.120
  • 2.19.11.105
whitelisted
google.com
  • 142.250.185.78
whitelisted
www.microsoft.com
  • 72.246.169.155
  • 23.219.150.101
whitelisted
login.live.com
  • 20.190.159.131
  • 20.190.159.0
  • 20.190.159.23
  • 20.190.159.4
  • 20.190.159.75
  • 40.126.31.0
  • 20.190.159.128
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
driverpack.io
  • 104.20.168.62
  • 104.20.169.62
malicious
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted

Threats

PID
Process
Class
Message
7364
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge
7364
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge
7364
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud Application Platform (.herokuapp .com)
7364
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud Application Platform (.herokuapp .com)
7364
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud Application Platform (.herokuapp .com)
7364
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud Application Platform (.herokuapp .com)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud Application Platform (.herokuapp .com)
684
mshta.exe
A Network Trojan was detected
SUSPICIOUS [ANY.RUN] VBS is used to run Shell
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud-Hosted Matomo Analytics (matomo .cloud)
684
mshta.exe
A Network Trojan was detected
SUSPICIOUS [ANY.RUN] VBS is used to run Shell
No debug info