URL:

evotoaisystem.com

Full analysis: https://app.any.run/tasks/606fb92a-2524-42ec-a3e8-35ec19d88f60
Verdict: Malicious activity
Threats:

Rhadamanthys is a C++ information-stealing malware that extracts sensitive data from infiltrated machines. Its layered operational chain and advanced evasion tactics make it a major risk in cybersecurity landscapes.

Analysis date: August 22, 2024, 15:43:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
crypto-regex
python
opendir
rhadamanthys
stealer
Indicators:
MD5:

7A5B2A067917EAB33C7A833A31382ED8

SHA1:

76CE48EE5A4E194E7B25BAD8C87561FDE7DE44C6

SHA256:

25BB21DAD3C062217FE9814655096E64F772EF2880499BB2F1979F4645854F4F

SSDEEP:

3:2OcWYKI:2zWYKI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • msiexec.exe (PID: 6276)
    • RHADAMANTHYS has been detected (SURICATA)

      • OpenWith.exe (PID: 7468)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 8124)
      • ITSMService.exe (PID: 2324)
      • WmiApSrv.exe (PID: 5304)
      • RmmService.exe (PID: 6304)
    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 6276)
      • python_x86_Lib.exe (PID: 6112)
      • RmmService.exe (PID: 3140)
    • The process verifies whether the antivirus software is installed

      • msiexec.exe (PID: 5544)
      • msiexec.exe (PID: 6280)
      • conhost.exe (PID: 2816)
      • msiexec.exe (PID: 6276)
      • ITSMAgent.exe (PID: 2268)
      • ITSMAgent.exe (PID: 5724)
      • ITSMAgent.exe (PID: 4680)
      • RmmService.exe (PID: 3696)
      • ITSMService.exe (PID: 2324)
      • RmmService.exe (PID: 6304)
      • cmd.exe (PID: 7904)
      • RmmService.exe (PID: 3840)
      • cmd.exe (PID: 3672)
      • RmmService.exe (PID: 3140)
      • python_x86_Lib.exe (PID: 6112)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6276)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 6276)
    • The process creates files with name similar to system file names

      • msiexec.exe (PID: 6276)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6276)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 6276)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 2900)
      • python_x86_Lib.exe (PID: 6112)
      • RmmService.exe (PID: 3140)
      • RmmService.exe (PID: 3840)
    • Process drops python dynamic module

      • python_x86_Lib.exe (PID: 6112)
    • Executable content was dropped or overwritten

      • python_x86_Lib.exe (PID: 6112)
      • RmmService.exe (PID: 3140)
    • Reads security settings of Internet Explorer

      • python_x86_Lib.exe (PID: 6112)
    • Executing commands from ".cmd" file

      • python_x86_Lib.exe (PID: 6112)
    • Reads the date of Windows installation

      • python_x86_Lib.exe (PID: 6112)
    • Searches for installed software

      • ITSMService.exe (PID: 2324)
    • Found regular expressions for crypto-addresses (YARA)

      • ITSMService.exe (PID: 2324)
    • Loads Python modules

      • RmmService.exe (PID: 3696)
      • RmmService.exe (PID: 6304)
      • RmmService.exe (PID: 3840)
      • RmmService.exe (PID: 3140)
    • Application launched itself

      • RmmService.exe (PID: 6304)
    • The process checks if it is being run in the virtual environment

      • RmmService.exe (PID: 6304)
      • OpenWith.exe (PID: 7468)
    • The executable file from the user directory is run by the CMD process

      • AutoIt3.exe (PID: 5148)
      • AutoIt3.exe (PID: 6260)
    • Executes application which crashes

      • MicrosoftEdgeUpdateCore.exe (PID: 6552)
      • MicrosoftEdgeUpdateCore.exe (PID: 4100)
    • Contacting a server suspected of hosting an CnC

      • OpenWith.exe (PID: 7468)
  • INFO

    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 6560)
    • Checks supported languages

      • identity_helper.exe (PID: 7736)
      • msiexec.exe (PID: 6276)
      • msiexec.exe (PID: 6280)
      • msiexec.exe (PID: 2900)
      • python_x86_Lib.exe (PID: 6112)
      • ITSMService.exe (PID: 2324)
      • ITSMAgent.exe (PID: 5724)
      • ITSMAgent.exe (PID: 4680)
      • ITSMAgent.exe (PID: 2268)
      • RmmService.exe (PID: 3696)
      • RmmService.exe (PID: 6304)
      • RmmService.exe (PID: 3140)
      • RmmService.exe (PID: 3840)
      • AutoIt3.exe (PID: 6260)
      • MicrosoftEdgeUpdateCore.exe (PID: 4100)
      • MicrosoftEdgeUpdateCore.exe (PID: 6552)
      • AutoIt3.exe (PID: 5148)
    • The process uses the downloaded file

      • msedge.exe (PID: 6560)
      • msedge.exe (PID: 780)
    • Reads the computer name

      • msiexec.exe (PID: 6276)
      • identity_helper.exe (PID: 7736)
      • msiexec.exe (PID: 6280)
      • python_x86_Lib.exe (PID: 6112)
      • ITSMService.exe (PID: 2324)
      • ITSMAgent.exe (PID: 5724)
      • ITSMAgent.exe (PID: 4680)
      • ITSMAgent.exe (PID: 2268)
      • RmmService.exe (PID: 3696)
      • RmmService.exe (PID: 6304)
      • RmmService.exe (PID: 3140)
      • RmmService.exe (PID: 3840)
      • msiexec.exe (PID: 2900)
    • Reads Environment values

      • identity_helper.exe (PID: 7736)
      • ITSMService.exe (PID: 2324)
    • Reads the software policy settings

      • msiexec.exe (PID: 5544)
      • msiexec.exe (PID: 6276)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 5544)
    • Application launched itself

      • msedge.exe (PID: 6560)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 6276)
      • ITSMService.exe (PID: 2324)
      • RmmService.exe (PID: 3840)
      • RmmService.exe (PID: 3140)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6276)
    • Creates files in the program directory

      • python_x86_Lib.exe (PID: 6112)
      • ITSMService.exe (PID: 2324)
      • RmmService.exe (PID: 3696)
      • RmmService.exe (PID: 6304)
      • RmmService.exe (PID: 3840)
      • RmmService.exe (PID: 3140)
    • Create files in a temporary directory

      • python_x86_Lib.exe (PID: 6112)
      • RmmService.exe (PID: 3840)
      • RmmService.exe (PID: 3140)
    • Process checks computer location settings

      • python_x86_Lib.exe (PID: 6112)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6276)
    • Checks proxy server information

      • RmmService.exe (PID: 3840)
      • RmmService.exe (PID: 3140)
    • Reads CPU info

      • AutoIt3.exe (PID: 6260)
      • AutoIt3.exe (PID: 5148)
    • Reads Windows Product ID

      • AutoIt3.exe (PID: 6260)
      • AutoIt3.exe (PID: 5148)
    • Reads mouse settings

      • AutoIt3.exe (PID: 6260)
      • AutoIt3.exe (PID: 5148)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
233
Monitored processes
82
Malicious processes
16
Suspicious processes
1

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msiexec.exe no specs msiexec.exe vssvc.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msedge.exe no specs msiexec.exe no specs cmd.exe no specs conhost.exe no specs python_x86_lib.exe msedge.exe no specs cmd.exe no specs conhost.exe no specs THREAT itsmservice.exe itsmagent.exe itsmagent.exe itsmagent.exe wmiapsrv.exe no specs rmmservice.exe no specs conhost.exe no specs rmmservice.exe rmmservice.exe rmmservice.exe conhost.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs autoit3.exe no specs autoit3.exe no specs microsoftedgeupdatecore.exe microsoftedgeupdatecore.exe openwith.exe no specs #RHADAMANTHYS openwith.exe werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs oobe-maintenance.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
460"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5584 --field-trial-handle=2420,i,4698734022829198231,10326577520936011705,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
780"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5468 --field-trial-handle=2420,i,4698734022829198231,10326577520936011705,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1064\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeRmmService.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1072"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6808 --field-trial-handle=2420,i,4698734022829198231,10326577520936011705,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1104"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=5464 --field-trial-handle=2420,i,4698734022829198231,10326577520936011705,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1360"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5672 --field-trial-handle=2420,i,4698734022829198231,10326577520936011705,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1440\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeRmmService.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2144"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7184 --field-trial-handle=2420,i,4698734022829198231,10326577520936011705,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2268"C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMAgent.exe"C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMAgent.exe
ITSMService.exe
User:
admin
Company:
COMODO
Integrity Level:
MEDIUM
Description:
Endpoint Manager Tray Application
Exit code:
0
Version:
9.1.48792.24030
Modules
Images
c:\program files (x86)\comodo\endpoint manager\itsmagent.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
2324"C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMService.exe"C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMService.exe
services.exe
User:
SYSTEM
Company:
COMODO
Integrity Level:
SYSTEM
Description:
Endpoint Manager Service Application
Version:
9.1.48792.24030
Modules
Images
c:\program files (x86)\comodo\endpoint manager\itsmservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
38 605
Read events
37 929
Write events
652
Delete events
24

Modification events

(PID) Process:(6560) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6560) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6560) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(6560) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(6560) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6560) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(6560) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6560) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
(PID) Process:(6560) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:usagestats
Value:
0
(PID) Process:(6560) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:urlstats
Value:
0
Executable files
89
Suspicious files
601
Text files
2 366
Unknown types
75

Dropped files

PID
Process
Filename
Type
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF11db59.TMP
MD5:
SHA256:
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF11db59.TMP
MD5:
SHA256:
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF11db59.TMP
MD5:
SHA256:
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF11db78.TMP
MD5:
SHA256:
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF11db88.TMP
MD5:
SHA256:
6560msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
42
TCP/UDP connections
86
DNS requests
77
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1080
svchost.exe
HEAD
200
2.19.126.155:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/062b65bc-b6a4-4f5a-8413-7218292237fe?P1=1724898807&P2=404&P3=2&P4=MS%2fKXR7x6itw0iYCtDwrta2q%2bX2FHXA8hm%2bO6GJhpdsdqARsGkPVhhedjsP1P%2biRcsr4pboNTvAHUV3KVbBAFQ%3d%3d
unknown
whitelisted
2628
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8152
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
1080
svchost.exe
GET
206
2.19.126.155:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/062b65bc-b6a4-4f5a-8413-7218292237fe?P1=1724898807&P2=404&P3=2&P4=MS%2fKXR7x6itw0iYCtDwrta2q%2bX2FHXA8hm%2bO6GJhpdsdqARsGkPVhhedjsP1P%2biRcsr4pboNTvAHUV3KVbBAFQ%3d%3d
unknown
whitelisted
1080
svchost.exe
GET
206
2.19.126.155:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/062b65bc-b6a4-4f5a-8413-7218292237fe?P1=1724898807&P2=404&P3=2&P4=MS%2fKXR7x6itw0iYCtDwrta2q%2bX2FHXA8hm%2bO6GJhpdsdqARsGkPVhhedjsP1P%2biRcsr4pboNTvAHUV3KVbBAFQ%3d%3d
unknown
whitelisted
6412
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1080
svchost.exe
GET
206
2.19.126.155:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/062b65bc-b6a4-4f5a-8413-7218292237fe?P1=1724898807&P2=404&P3=2&P4=MS%2fKXR7x6itw0iYCtDwrta2q%2bX2FHXA8hm%2bO6GJhpdsdqARsGkPVhhedjsP1P%2biRcsr4pboNTvAHUV3KVbBAFQ%3d%3d
unknown
whitelisted
1080
svchost.exe
HEAD
200
2.19.126.155:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/8f2381c2-652d-48a2-86f6-19cb7757f5dc?P1=1724898807&P2=404&P3=2&P4=jhGB4nyA2GshX7DRJd1O0QzfAWrRbiK94d4m3jcEEz9tt1zHhcCoqfXL1WkPgex%2fCUWgoG2okzaWtGwuov32Uw%3d%3d
unknown
whitelisted
1080
svchost.exe
GET
206
2.19.126.155:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/062b65bc-b6a4-4f5a-8413-7218292237fe?P1=1724898807&P2=404&P3=2&P4=MS%2fKXR7x6itw0iYCtDwrta2q%2bX2FHXA8hm%2bO6GJhpdsdqARsGkPVhhedjsP1P%2biRcsr4pboNTvAHUV3KVbBAFQ%3d%3d
unknown
whitelisted
1080
svchost.exe
HEAD
200
2.19.126.155:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/b5b66fb2-bcb3-4c8f-913d-3090036ab0d5?P1=1724918036&P2=404&P3=2&P4=m5SgnNZeG1axSxn7cRE3rkFBpqjwq0lEVLcFRJmKFAeJoEmY%2belxg%2feHerKNiPyfrMml3lsfNXaElUNdn%2bHISw%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4200
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
1356
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6892
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6560
msedge.exe
239.255.255.250:1900
whitelisted
6892
msedge.exe
89.208.103.60:80
evotoaisystem.com
AEZA GROUP Ltd
DE
unknown
6892
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
6892
msedge.exe
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6892
msedge.exe
89.208.103.60:443
evotoaisystem.com
AEZA GROUP Ltd
DE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 172.217.23.110
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
evotoaisystem.com
  • 89.208.103.60
unknown
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.67
whitelisted
bzib.nelreports.net
  • 23.48.23.26
  • 23.48.23.51
  • 23.50.131.74
  • 23.50.131.78
whitelisted
www.bing.com
  • 92.123.104.59
  • 92.123.104.61
  • 92.123.104.67
  • 92.123.104.51
  • 92.123.104.58
  • 92.123.104.66
  • 92.123.104.60
  • 92.123.104.52
  • 92.123.104.65
  • 2.23.209.166
  • 2.23.209.173
  • 2.23.209.171
  • 2.23.209.167
  • 2.23.209.168
  • 2.23.209.158
  • 2.23.209.169
  • 2.23.209.162
  • 2.23.209.160
  • 92.123.104.29
  • 92.123.104.37
  • 92.123.104.32
  • 92.123.104.47
  • 92.123.104.35
  • 92.123.104.28
  • 92.123.104.56
  • 92.123.104.49
whitelisted
xpaywalletcdn.azureedge.net
  • 13.107.246.67
whitelisted

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
Process
Message
ITSMService.exe
QCoreApplication::applicationDirPath: Please instantiate the QApplication object first
ITSMService.exe
Try to find oem.strings in "C:/Program Files (x86)/COMODO/Endpoint Manager/oem.strings"
ITSMService.exe
OEM strings file does not exists! "C:/Program Files (x86)/COMODO/Endpoint Manager/oem.strings"
ITSMService.exe
Log dir is 'C:/ProgramData/COMODO/Endpoint Manager'
ITSMAgent.exe
Try to find oem.strings in "C:/Program Files (x86)/COMODO/Endpoint Manager/oem.strings"
ITSMAgent.exe
OEM strings file does not exists! "C:/Program Files (x86)/COMODO/Endpoint Manager/oem.strings"
ITSMAgent.exe
Log dir is 'C:/ProgramData/COMODO/Endpoint Manager'
ITSMAgent.exe
Try to find oem.strings in "C:/Program Files (x86)/COMODO/Endpoint Manager/oem.strings"
ITSMAgent.exe
OEM strings file does not exists! "C:/Program Files (x86)/COMODO/Endpoint Manager/oem.strings"
ITSMAgent.exe
Try to find oem.strings in "C:/Program Files (x86)/COMODO/Endpoint Manager/oem.strings"