URL:

https://github.com/TheDarkMythos/windows-malware/blob/master/ILOVEYOU/LOVE-LETTER-FOR-YOU.TXT.vbs

Full analysis: https://app.any.run/tasks/f3245058-6b85-4b39-8bd3-3dff5b06f8f7
Verdict: Malicious activity
Analysis date: March 25, 2025, 07:30:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
github
autorun-download
Indicators:
MD5:

97E29D8592C1C1B76B723A853FFC0CA2

SHA1:

5B219FC527DCE39A1F84D444778B66904C48A09A

SHA256:

2EF8F14DF9DFEBC52DC0BCEA5DCFA3D143DE1CE1A4CBAA9F6AB18CD7C4B00E4B

SSDEEP:

3:N8tEdy/BzEvJcTEHEM0ydxbjq48Lwn:2u4/BzL+EEzK43n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • MSAGENT.EXE (PID: 1544)
      • tv_enua.exe (PID: 2480)
    • Executing a file with an untrusted certificate

      • MSAGENT.EXE (PID: 1544)
      • tv_enua.exe (PID: 2480)
    • Changes the autorun value in the registry

      • tv_enua.exe (PID: 2480)
  • SUSPICIOUS

    • The process executes VB scripts

      • msedge.exe (PID: 3480)
    • Process drops legitimate windows executable

      • BonziBuddy432.exe (PID: 2488)
      • MSAGENT.EXE (PID: 1544)
      • tv_enua.exe (PID: 2480)
    • Executable content was dropped or overwritten

      • BonziBuddy432.exe (PID: 2488)
      • MSAGENT.EXE (PID: 1544)
      • tv_enua.exe (PID: 2480)
    • There is functionality for taking screenshot (YARA)

      • BonziBuddy432.exe (PID: 1656)
      • BonziBuddy432.exe (PID: 2488)
      • BonziBuddy432.exe (PID: 3892)
      • BonziBuddy432.exe (PID: 3900)
    • Creates a software uninstall entry

      • BonziBuddy432.exe (PID: 2488)
      • tv_enua.exe (PID: 2480)
    • Creates/Modifies COM task schedule object

      • BonziBuddy432.exe (PID: 2488)
      • regsvr32.exe (PID: 2420)
      • regsvr32.exe (PID: 2024)
      • regsvr32.exe (PID: 2748)
      • regsvr32.exe (PID: 1396)
      • regsvr32.exe (PID: 2952)
      • regsvr32.exe (PID: 952)
      • regsvr32.exe (PID: 3344)
      • regsvr32.exe (PID: 2772)
      • regsvr32.exe (PID: 3232)
    • Reads the Internet Settings

      • BonziBuddy432.exe (PID: 2488)
    • Starts CMD.EXE for commands execution

      • BonziBuddy432.exe (PID: 2488)
    • Reads security settings of Internet Explorer

      • BonziBuddy432.exe (PID: 2488)
    • Executing commands from a ".bat" file

      • BonziBuddy432.exe (PID: 2488)
  • INFO

    • Autorun file from Downloads

      • msedge.exe (PID: 3292)
      • msedge.exe (PID: 3084)
      • msedge.exe (PID: 3480)
    • Create files in a temporary directory

      • BonziBuddy432.exe (PID: 1656)
      • BonziBuddy432.exe (PID: 3900)
      • BonziBuddy432.exe (PID: 2488)
      • MSAGENT.EXE (PID: 1544)
      • tv_enua.exe (PID: 2480)
    • Checks supported languages

      • BonziBuddy432.exe (PID: 1656)
      • BonziBuddy432.exe (PID: 3900)
      • BonziBuddy432.exe (PID: 3892)
      • BonziBuddy432.exe (PID: 2488)
      • tv_enua.exe (PID: 2480)
      • MSAGENT.EXE (PID: 1544)
      • AgentSvr.exe (PID: 3224)
      • BonziBDY_4.EXE (PID: 3260)
      • BonziBDY_2.EXE (PID: 2860)
      • BonziBDY_35.EXE (PID: 3432)
    • Reads the computer name

      • BonziBuddy432.exe (PID: 3900)
      • BonziBuddy432.exe (PID: 1656)
      • BonziBuddy432.exe (PID: 3892)
      • BonziBuddy432.exe (PID: 2488)
      • MSAGENT.EXE (PID: 1544)
      • tv_enua.exe (PID: 2480)
    • Creates files in the program directory

      • BonziBuddy432.exe (PID: 2488)
    • The sample compiled with english language support

      • BonziBuddy432.exe (PID: 2488)
      • MSAGENT.EXE (PID: 1544)
      • tv_enua.exe (PID: 2480)
    • Creates files or folders in the user directory

      • BonziBuddy432.exe (PID: 2488)
    • Reads mouse settings

      • BonziBuddy432.exe (PID: 2488)
    • Application launched itself

      • msedge.exe (PID: 3480)
      • msedge.exe (PID: 3272)
    • Manual execution by a user

      • BonziBDY_4.EXE (PID: 3260)
      • BonziBDY_2.EXE (PID: 2860)
      • BonziBDY_35.EXE (PID: 3432)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
95
Monitored processes
55
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wscript.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs bonzibuddy432.exe no specs bonzibuddy432.exe no specs bonzibuddy432.exe no specs bonzibuddy432.exe bonzibuddy432.exe bonzibuddy432.exe bonzibuddy432.exe no specs bonzibuddy432.exe msedge.exe no specs cmd.exe no specs msagent.exe tv_enua.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs agentsvr.exe no specs grpconv.exe no specs regsvr32.exe no specs regsvr32.exe no specs grpconv.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs bonzibdy_4.exe no specs bonzibdy_35.exe no specs bonzibdy_2.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
672"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1664 --field-trial-handle=1252,i,11055911708876039895,7097607087486091142,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
948"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1532 --field-trial-handle=1252,i,11055911708876039895,7097607087486091142,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
948grpconv.exe -oC:\Windows\System32\grpconv.exeMSAGENT.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Progman Group Converter
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\grpconv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
952regsvr32 /s "C:\Windows\msagent\AgentSR.dll"C:\Windows\System32\regsvr32.exeMSAGENT.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
960"C:\Users\admin\Downloads\BonziBuddy432.exe" C:\Users\admin\Downloads\BonziBuddy432.exemsedge.exe
User:
admin
Company:
Bonzi Software
Integrity Level:
MEDIUM
Description:
BonziBuddy432 4 Installation
Exit code:
3221226540
Version:
4
Modules
Images
c:\users\admin\downloads\bonzibuddy432.exe
c:\windows\system32\ntdll.dll
1372"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=4032 --field-trial-handle=1252,i,11055911708876039895,7097607087486091142,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1396regsvr32 /s "C:\Windows\msagent\AgentDP2.dll"C:\Windows\System32\regsvr32.exeMSAGENT.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1544MSAGENT.EXE C:\Program Files\BonziBuddy432\Runtimes\MSAGENT.EXE
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
4.71.1015.0
Modules
Images
c:\program files\bonzibuddy432\runtimes\msagent.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1656"C:\Users\admin\Downloads\BonziBuddy432.exe" C:\Users\admin\Downloads\BonziBuddy432.exe
msedge.exe
User:
admin
Company:
Bonzi Software
Integrity Level:
HIGH
Description:
BonziBuddy432 4 Installation
Exit code:
0
Version:
4
Modules
Images
c:\users\admin\downloads\bonzibuddy432.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1800"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1420 --field-trial-handle=1252,i,11055911708876039895,7097607087486091142,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
9 240
Read events
8 717
Write events
424
Delete events
99

Modification events

(PID) Process:(3480) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\IEToEdge
Operation:delete valueName:DisabledPendingAutoUpdateConsent
Value:
(PID) Process:(3480) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3480) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3480) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3480) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3480) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3480) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(3480) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3480) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
E0CAC0FABB8F2F00
(PID) Process:(3480) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\FirstNotDefault
Operation:delete valueName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
Executable files
84
Suspicious files
297
Text files
173
Unknown types
0

Dropped files

PID
Process
Filename
Type
3480msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF182778.TMP
MD5:
SHA256:
3480msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3480msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF1827c6.TMP
MD5:
SHA256:
3480msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
3480msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF1828d0.TMP
MD5:
SHA256:
3480msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
3480msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Last Versiontext
MD5:61FE7896F9494DCDF53480A325F4FB85
SHA256:ACFD3CD36E0DFCF1DCB67C7F31F2A5B9BA0815528A0C604D4330DFAA9E683E51
3480msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datbinary
MD5:C782147434522F2D11132EDC5ABD4ED8
SHA256:5D7501D5B5E6537D56B518A1EF57410DFFCF6AD8EE67DEB77DF91C060FEE324B
2812msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics.pmabinary
MD5:886E82F2CA62ECCCE64601B30592078A
SHA256:E5E13D53601100FF3D6BB71514CBCCC4C73FE9B7EF5E930100E644187B42948E
3480msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old~RF182853.TMPtext
MD5:5EF0F31B6E7675AE779CC7D73CBB1AA3
SHA256:4CA9894E5D3F96E2A7BC1654E87A6D2D88CAE9CA910A126E4350E5BAE17907DF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
38
DNS requests
47
Threats
10

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
1800
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3480
msedge.exe
239.255.255.250:1900
whitelisted
1800
msedge.exe
13.107.21.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1800
msedge.exe
140.82.121.4:443
github.com
GITHUB
US
whitelisted
1800
msedge.exe
185.199.108.154:443
github.githubassets.com
FASTLY
US
whitelisted
1800
msedge.exe
185.199.108.133:443
avatars.githubusercontent.com
FASTLY
US
whitelisted
1800
msedge.exe
2.19.122.11:443
www.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 13.107.21.239
  • 204.79.197.239
whitelisted
github.com
  • 140.82.121.4
  • 140.82.121.3
whitelisted
github.githubassets.com
  • 185.199.108.154
  • 185.199.111.154
  • 185.199.110.154
  • 185.199.109.154
whitelisted
avatars.githubusercontent.com
  • 185.199.108.133
  • 185.199.109.133
  • 185.199.111.133
  • 185.199.110.133
whitelisted
github-cloud.s3.amazonaws.com
  • 52.216.112.171
  • 3.5.13.31
  • 3.5.28.81
  • 54.231.170.25
  • 54.231.204.1
  • 52.217.234.161
  • 3.5.28.224
  • 3.5.25.67
whitelisted
user-images.githubusercontent.com
  • 185.199.108.133
  • 185.199.111.133
  • 185.199.110.133
  • 185.199.109.133
whitelisted
www.bing.com
  • 2.19.122.11
  • 2.19.122.20
  • 2.19.122.19
  • 2.19.122.15
  • 2.19.122.21
  • 2.19.122.22
  • 2.19.122.14
  • 2.19.122.25
  • 2.19.122.12
  • 2.19.122.67
  • 2.19.122.66
  • 2.19.122.8
  • 2.19.122.63
  • 2.19.122.9
  • 2.19.122.6
  • 2.19.122.4
  • 2.19.122.65
  • 2.19.122.5
whitelisted
collector.github.com
  • 140.82.114.22
whitelisted

Threats

PID
Process
Class
Message
1800
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
1800
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
1800
msedge.exe
Potentially Bad Traffic
ET DNS Query to a .tk domain - Likely Hostile
1800
msedge.exe
Potentially Bad Traffic
ET DNS Query to a .tk domain - Likely Hostile
1800
msedge.exe
Potentially Bad Traffic
ET DNS Query to a .tk domain - Likely Hostile
1800
msedge.exe
Potentially Bad Traffic
ET DNS Query to a .tk domain - Likely Hostile
1800
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
1800
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
1800
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
1800
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Process
Message
msedge.exe
[0325/073212.795:ERROR:exception_handler_server.cc(527)] ConnectNamedPipe: The pipe is being closed. (0xE8)