URL:

https://github.com/Itzsten/Malware-Respository/blob/main/Bonzify.exe

Full analysis: https://app.any.run/tasks/3b0fd35a-4605-4b9d-8070-dc8a501c9072
Verdict: Malicious activity
Analysis date: May 27, 2025, 13:56:43
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
github
Indicators:
MD5:

86ECB52B6853575FB3E8B92B36D9B775

SHA1:

C2CF00017F79784AD9FFC6B0A092C698DF3C9A8D

SHA256:

35D30A689B2A2BE499010EBBDB570325ACF251042A1E8C8522E21E435AA01E23

SSDEEP:

3:N8tEdaSP/JIERKj4An:2ux/Gs1An

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • INSTALLER.exe (PID: 7912)
      • INSTALLER.exe (PID: 8080)
    • Executing a file with an untrusted certificate

      • INSTALLER.exe (PID: 8080)
      • INSTALLER.exe (PID: 7912)
    • Antivirus name has been found in the command line (generic signature)

      • cmd.exe (PID: 8464)
      • cmd.exe (PID: 8844)
      • icacls.exe (PID: 8904)
      • takeown.exe (PID: 8564)
      • icacls.exe (PID: 8492)
      • takeown.exe (PID: 9072)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7804)
    • Takes ownership (TAKEOWN.EXE)

      • cmd.exe (PID: 7804)
      • cmd.exe (PID: 6668)
      • cmd.exe (PID: 924)
      • cmd.exe (PID: 3140)
      • cmd.exe (PID: 7348)
      • cmd.exe (PID: 6632)
      • cmd.exe (PID: 3032)
      • cmd.exe (PID: 6300)
      • cmd.exe (PID: 4180)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 5528)
      • cmd.exe (PID: 7764)
      • cmd.exe (PID: 6208)
      • cmd.exe (PID: 1168)
      • cmd.exe (PID: 616)
      • cmd.exe (PID: 7772)
      • cmd.exe (PID: 6416)
      • cmd.exe (PID: 5780)
      • cmd.exe (PID: 1040)
      • cmd.exe (PID: 7360)
      • cmd.exe (PID: 7596)
      • cmd.exe (PID: 7504)
      • cmd.exe (PID: 6592)
      • cmd.exe (PID: 2316)
      • cmd.exe (PID: 7628)
      • cmd.exe (PID: 7884)
      • cmd.exe (PID: 2984)
      • cmd.exe (PID: 7524)
      • cmd.exe (PID: 7824)
      • cmd.exe (PID: 7640)
      • cmd.exe (PID: 6668)
      • cmd.exe (PID: 8108)
      • cmd.exe (PID: 7396)
      • cmd.exe (PID: 7924)
      • cmd.exe (PID: 8180)
      • cmd.exe (PID: 6656)
      • cmd.exe (PID: 7460)
      • cmd.exe (PID: 5740)
      • cmd.exe (PID: 2984)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 5592)
      • cmd.exe (PID: 872)
      • cmd.exe (PID: 4220)
      • cmd.exe (PID: 6744)
      • cmd.exe (PID: 5528)
      • cmd.exe (PID: 7700)
      • cmd.exe (PID: 3968)
      • cmd.exe (PID: 7768)
      • cmd.exe (PID: 7592)
      • cmd.exe (PID: 7556)
      • cmd.exe (PID: 4736)
      • cmd.exe (PID: 900)
      • cmd.exe (PID: 7616)
      • cmd.exe (PID: 5804)
      • cmd.exe (PID: 7512)
      • cmd.exe (PID: 1196)
      • cmd.exe (PID: 2984)
      • cmd.exe (PID: 2332)
      • cmd.exe (PID: 1312)
      • cmd.exe (PID: 4288)
      • cmd.exe (PID: 5124)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 7412)
      • cmd.exe (PID: 1008)
      • cmd.exe (PID: 6812)
      • cmd.exe (PID: 4336)
      • cmd.exe (PID: 7792)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 7412)
      • cmd.exe (PID: 6600)
      • cmd.exe (PID: 2740)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 4420)
      • cmd.exe (PID: 552)
      • cmd.exe (PID: 2740)
      • cmd.exe (PID: 188)
      • cmd.exe (PID: 7432)
      • cmd.exe (PID: 5320)
      • cmd.exe (PID: 4756)
      • cmd.exe (PID: 6844)
      • cmd.exe (PID: 8348)
      • cmd.exe (PID: 8460)
      • cmd.exe (PID: 8572)
      • cmd.exe (PID: 8684)
      • cmd.exe (PID: 9012)
      • cmd.exe (PID: 8796)
      • cmd.exe (PID: 8904)
      • cmd.exe (PID: 8240)
      • cmd.exe (PID: 4112)
      • cmd.exe (PID: 8236)
      • cmd.exe (PID: 8284)
      • cmd.exe (PID: 8396)
      • cmd.exe (PID: 8488)
      • cmd.exe (PID: 8672)
      • cmd.exe (PID: 8784)
      • cmd.exe (PID: 8876)
      • cmd.exe (PID: 9124)
      • cmd.exe (PID: 8464)
      • cmd.exe (PID: 9208)
      • cmd.exe (PID: 8304)
      • cmd.exe (PID: 3992)
      • cmd.exe (PID: 6820)
      • cmd.exe (PID: 8376)
      • cmd.exe (PID: 9000)
      • cmd.exe (PID: 9112)
      • cmd.exe (PID: 9188)
      • cmd.exe (PID: 7104)
      • cmd.exe (PID: 5396)
      • cmd.exe (PID: 8620)
      • cmd.exe (PID: 8712)
      • cmd.exe (PID: 8824)
      • cmd.exe (PID: 8844)
      • cmd.exe (PID: 8324)
      • cmd.exe (PID: 8416)
      • cmd.exe (PID: 9004)
      • cmd.exe (PID: 8528)
      • cmd.exe (PID: 8700)
      • cmd.exe (PID: 8916)
      • cmd.exe (PID: 8812)
      • cmd.exe (PID: 2104)
      • cmd.exe (PID: 9208)
      • cmd.exe (PID: 7772)
      • cmd.exe (PID: 8360)
      • cmd.exe (PID: 9116)
      • cmd.exe (PID: 9176)
      • cmd.exe (PID: 8236)
      • cmd.exe (PID: 3580)
      • cmd.exe (PID: 8964)
      • cmd.exe (PID: 9088)
      • cmd.exe (PID: 9144)
      • cmd.exe (PID: 3804)
      • cmd.exe (PID: 8656)
      • cmd.exe (PID: 8544)
      • cmd.exe (PID: 8604)
      • cmd.exe (PID: 8884)
      • cmd.exe (PID: 8476)
      • cmd.exe (PID: 8768)
      • cmd.exe (PID: 8872)
      • cmd.exe (PID: 8876)
      • cmd.exe (PID: 3024)
      • cmd.exe (PID: 7536)
      • cmd.exe (PID: 8408)
      • cmd.exe (PID: 8488)
      • cmd.exe (PID: 7696)
      • cmd.exe (PID: 8340)
      • cmd.exe (PID: 7396)
      • cmd.exe (PID: 8504)
      • cmd.exe (PID: 8332)
      • cmd.exe (PID: 8208)
      • cmd.exe (PID: 9188)
      • cmd.exe (PID: 4628)
      • cmd.exe (PID: 8660)
      • cmd.exe (PID: 8700)
      • cmd.exe (PID: 8716)
    • Process drops legitimate windows executable

      • INSTALLER.exe (PID: 7912)
      • INSTALLER.exe (PID: 8080)
      • Bonzify.exe (PID: 5084)
    • Executable content was dropped or overwritten

      • INSTALLER.exe (PID: 7912)
      • Bonzify.exe (PID: 5084)
      • INSTALLER.exe (PID: 8080)
    • Starts a Microsoft application from unusual location

      • INSTALLER.exe (PID: 8080)
      • INSTALLER.exe (PID: 7912)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 7804)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 6668)
      • cmd.exe (PID: 924)
      • cmd.exe (PID: 7348)
      • cmd.exe (PID: 6632)
      • cmd.exe (PID: 3140)
      • cmd.exe (PID: 6300)
      • cmd.exe (PID: 3032)
      • cmd.exe (PID: 4180)
      • cmd.exe (PID: 7360)
      • cmd.exe (PID: 7764)
      • cmd.exe (PID: 5528)
      • cmd.exe (PID: 5780)
      • cmd.exe (PID: 1168)
      • cmd.exe (PID: 616)
      • cmd.exe (PID: 6208)
      • cmd.exe (PID: 7772)
      • cmd.exe (PID: 6416)
      • cmd.exe (PID: 7596)
      • cmd.exe (PID: 7504)
      • cmd.exe (PID: 6592)
      • cmd.exe (PID: 2316)
      • cmd.exe (PID: 7884)
      • cmd.exe (PID: 7628)
      • cmd.exe (PID: 2984)
      • cmd.exe (PID: 7824)
      • cmd.exe (PID: 1040)
      • cmd.exe (PID: 7524)
      • cmd.exe (PID: 7460)
      • cmd.exe (PID: 7640)
      • cmd.exe (PID: 6668)
      • cmd.exe (PID: 7924)
      • cmd.exe (PID: 8108)
      • cmd.exe (PID: 7396)
      • cmd.exe (PID: 8180)
      • cmd.exe (PID: 6656)
      • cmd.exe (PID: 5740)
      • cmd.exe (PID: 2984)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 5592)
      • cmd.exe (PID: 872)
      • cmd.exe (PID: 4220)
      • cmd.exe (PID: 6744)
      • cmd.exe (PID: 7700)
      • cmd.exe (PID: 5528)
      • cmd.exe (PID: 3968)
      • cmd.exe (PID: 7768)
      • cmd.exe (PID: 7592)
      • cmd.exe (PID: 7556)
      • cmd.exe (PID: 4736)
      • cmd.exe (PID: 1312)
      • cmd.exe (PID: 900)
      • cmd.exe (PID: 7616)
      • cmd.exe (PID: 7512)
      • cmd.exe (PID: 5804)
      • cmd.exe (PID: 4288)
      • cmd.exe (PID: 2984)
      • cmd.exe (PID: 2332)
      • cmd.exe (PID: 1196)
      • cmd.exe (PID: 5124)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 7412)
      • cmd.exe (PID: 1008)
      • cmd.exe (PID: 7412)
      • cmd.exe (PID: 6812)
      • cmd.exe (PID: 4336)
      • cmd.exe (PID: 7792)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 4756)
      • cmd.exe (PID: 6600)
      • cmd.exe (PID: 2740)
      • cmd.exe (PID: 2740)
      • cmd.exe (PID: 188)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 4420)
      • cmd.exe (PID: 552)
      • cmd.exe (PID: 5320)
      • cmd.exe (PID: 6844)
      • cmd.exe (PID: 8348)
      • cmd.exe (PID: 8240)
      • cmd.exe (PID: 8684)
      • cmd.exe (PID: 8460)
      • cmd.exe (PID: 8572)
      • cmd.exe (PID: 8796)
      • cmd.exe (PID: 8904)
      • cmd.exe (PID: 9012)
      • cmd.exe (PID: 7432)
      • cmd.exe (PID: 9124)
      • cmd.exe (PID: 8396)
      • cmd.exe (PID: 4112)
      • cmd.exe (PID: 8784)
      • cmd.exe (PID: 8284)
      • cmd.exe (PID: 8236)
      • cmd.exe (PID: 8672)
      • cmd.exe (PID: 8488)
      • cmd.exe (PID: 8876)
      • cmd.exe (PID: 9112)
      • cmd.exe (PID: 8304)
      • cmd.exe (PID: 9208)
      • cmd.exe (PID: 8376)
      • cmd.exe (PID: 6820)
      • cmd.exe (PID: 9000)
      • cmd.exe (PID: 3992)
      • cmd.exe (PID: 8620)
      • cmd.exe (PID: 8712)
      • cmd.exe (PID: 8824)
      • cmd.exe (PID: 8844)
      • cmd.exe (PID: 9188)
      • cmd.exe (PID: 7104)
      • cmd.exe (PID: 8464)
      • cmd.exe (PID: 8324)
      • cmd.exe (PID: 8416)
      • cmd.exe (PID: 8528)
      • cmd.exe (PID: 8700)
      • cmd.exe (PID: 8812)
      • cmd.exe (PID: 8916)
      • cmd.exe (PID: 5396)
      • cmd.exe (PID: 2104)
      • cmd.exe (PID: 9176)
      • cmd.exe (PID: 7772)
      • cmd.exe (PID: 8236)
      • cmd.exe (PID: 8360)
      • cmd.exe (PID: 8544)
      • cmd.exe (PID: 9004)
      • cmd.exe (PID: 9116)
      • cmd.exe (PID: 9208)
      • cmd.exe (PID: 8964)
      • cmd.exe (PID: 9088)
      • cmd.exe (PID: 9144)
      • cmd.exe (PID: 3804)
      • cmd.exe (PID: 8656)
      • cmd.exe (PID: 8604)
      • cmd.exe (PID: 8884)
      • cmd.exe (PID: 7536)
      • cmd.exe (PID: 8488)
      • cmd.exe (PID: 8408)
      • cmd.exe (PID: 8476)
      • cmd.exe (PID: 8768)
      • cmd.exe (PID: 8872)
      • cmd.exe (PID: 8876)
      • cmd.exe (PID: 3580)
      • cmd.exe (PID: 3024)
      • cmd.exe (PID: 9188)
      • cmd.exe (PID: 7396)
      • cmd.exe (PID: 8340)
      • cmd.exe (PID: 8332)
      • cmd.exe (PID: 8208)
      • cmd.exe (PID: 7696)
      • cmd.exe (PID: 4628)
      • cmd.exe (PID: 8504)
      • cmd.exe (PID: 8700)
      • cmd.exe (PID: 8660)
    • Executing commands from a ".bat" file

      • Bonzify.exe (PID: 5084)
    • Starts CMD.EXE for commands execution

      • Bonzify.exe (PID: 5084)
    • There is functionality for taking screenshot (YARA)

      • AgentSvr.exe (PID: 5136)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 4112)
  • INFO

    • Reads Environment values

      • identity_helper.exe (PID: 7960)
    • Launch of the file from Downloads directory

      • msedge.exe (PID: 5376)
      • msedge.exe (PID: 5508)
    • Checks supported languages

      • identity_helper.exe (PID: 7960)
      • Bonzify.exe (PID: 5084)
    • Application launched itself

      • msedge.exe (PID: 5508)
    • Reads the computer name

      • identity_helper.exe (PID: 7960)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 4608)
      • msedge.exe (PID: 5508)
    • Create files in a temporary directory

      • Bonzify.exe (PID: 5084)
    • The sample compiled with english language support

      • INSTALLER.exe (PID: 7912)
      • INSTALLER.exe (PID: 8080)
      • Bonzify.exe (PID: 5084)
    • Manual execution by a user

      • runonce.exe (PID: 4724)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
944
Monitored processes
690
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs bonzify.exe no specs bonzify.exe cmd.exe no specs conhost.exe no specs taskkill.exe no specs takeown.exe no specs icacls.exe no specs installer.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs agentsvr.exe no specs grpconv.exe no specs rundll32.exe no specs installer.exe regsvr32.exe no specs regsvr32.exe no specs cmd.exe no specs conhost.exe no specs grpconv.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs agentsvr.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs slui.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs startmenuexperiencehost.exe no specs textinputhost.exe no specs icacls.exe no specs tiworker.exe no specs searchapp.exe cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs mobsync.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs takeown.exe no specs plugscheduler.exe no specs runonce.exe runonce.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188icacls "C:\WINDOWS\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.4046.1.11\amd64_microsoft-windows-p..riencehost.appxmain_31bf3856ad364e35_10.0.19041.3996_none_9b93d97d472f017a\r\ppiexperiencehost.exe" /grant "everyone":(f)C:\Windows\SysWOW64\icacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
188icacls "C:\WINDOWS\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.4046.1.11\amd64_microsoft-windows-ppi-managementservice_31bf3856ad364e35_10.0.19041.3636_none_6479f6d4a5665556\f\ppimansvc.exe" /grant "everyone":(f)C:\Windows\SysWOW64\icacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
188takeown /f "C:\WINDOWS\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.4046.1.11\amd64_microsoft-windows-ppi-videoboarddump_31bf3856ad364e35_10.0.19041.3636_none_e6fe5834d57fd3ed\r\surfaceplatformlogs.exe"C:\Windows\SysWOW64\takeown.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Takes ownership of a file
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\takeown.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
188C:\WINDOWS\system32\cmd.exe /c C:\Users\admin\AppData\Local\Temp\TakeOwn.bat "C:\WINDOWS\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.4046.1.11\amd64_microsoft-windows-ppiwelcome.appxmain_31bf3856ad364e35_10.0.19041.3636_none_0229c46f5806b179\f\microsoft.ppi.welcome.exe"C:\Windows\SysWOW64\cmd.exeBonzify.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
208takeown /f "C:\WINDOWS\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.4046.1.11\amd64_microsoft-windows-dfsr-util-dfsrdiag_31bf3856ad364e35_10.0.19041.3996_none_4e3b2913a0eecc78\f\dfsrdiag.exe"C:\Windows\SysWOW64\takeown.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Takes ownership of a file
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\takeown.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
544"C:\WINDOWS\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mcaC:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\systemapps\microsoft.windows.startmenuexperiencehost_cw5n1h2txyewy\startmenuexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\wincorlib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
552takeown /f "C:\WINDOWS\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.4046.1.11\amd64_microsoft-windows-ppi-credentialmanager_31bf3856ad364e35_10.0.19041.3636_none_dae66a23a3c75d28\r\ppicredentialmanager.exe"C:\Windows\SysWOW64\takeown.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Takes ownership of a file
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\takeown.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
552takeown /f "C:\WINDOWS\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.4046.1.11\amd64_microsoft-windows-ppi-logcollection_31bf3856ad364e35_10.0.19041.3636_none_c335ca2a1764a9da\n\microsoft.ppi.logcollection.exe"C:\Windows\SysWOW64\takeown.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Takes ownership of a file
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\takeown.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
552takeown /f "C:\WINDOWS\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.4046.1.11\amd64_microsoft-windows-ppi-videoboarddump_31bf3856ad364e35_10.0.19041.3636_none_e6fe5834d57fd3ed\f\surfaceplatformlogs.exe"C:\Windows\SysWOW64\takeown.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Takes ownership of a file
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\takeown.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
552C:\WINDOWS\system32\cmd.exe /c C:\Users\admin\AppData\Local\Temp\TakeOwn.bat "C:\WINDOWS\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.4046.1.11\amd64_microsoft-windows-ppi-videoboarddump_31bf3856ad364e35_10.0.19041.3636_none_e6fe5834d57fd3ed\r\surfaceplatformlogs.exe"C:\Windows\SysWOW64\cmd.exeBonzify.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
30 790
Read events
30 545
Write events
223
Delete events
22

Modification events

(PID) Process:(5508) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5508) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5508) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5508) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5508) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
9EDE42B8B4942F00
(PID) Process:(5508) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
53873AB8B4942F00
(PID) Process:(5508) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\655996
Operation:writeName:WindowTabManagerFileMappingId
Value:
{C902B288-CA1A-40BE-B600-7DFAFF9B5249}
(PID) Process:(5508) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\655996
Operation:writeName:WindowTabManagerFileMappingId
Value:
{EDD78529-6FDB-4E90-BC53-3294A8EBAD50}
(PID) Process:(5508) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\655996
Operation:writeName:WindowTabManagerFileMappingId
Value:
{5080373E-6E56-44FE-A438-3EC91AF332CD}
(PID) Process:(5508) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\655996
Operation:writeName:WindowTabManagerFileMappingId
Value:
{970DFDFC-0BCD-4E77-9E50-2158D3C440C9}
Executable files
57
Suspicious files
326
Text files
131
Unknown types
83

Dropped files

PID
Process
Filename
Type
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10be7f.TMP
MD5:
SHA256:
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10beae.TMP
MD5:
SHA256:
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10beae.TMP
MD5:
SHA256:
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10bebe.TMP
MD5:
SHA256:
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10bebe.TMP
MD5:
SHA256:
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5508msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
94
DNS requests
90
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8148
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8148
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7508
svchost.exe
HEAD
200
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/5cbc98ff-b69b-4fda-ad94-17ec2f9cf48b?P1=1748897035&P2=404&P3=2&P4=MxEb0mGXHtOmqjCGFPH58WJic6L3XvqJvftmRHfKKIUT3S2Jg%2fcp8nEaLHWlUikd6dsxM8Abh%2fj76AkX60i5Cg%3d%3d
unknown
whitelisted
7508
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/5cbc98ff-b69b-4fda-ad94-17ec2f9cf48b?P1=1748897035&P2=404&P3=2&P4=MxEb0mGXHtOmqjCGFPH58WJic6L3XvqJvftmRHfKKIUT3S2Jg%2fcp8nEaLHWlUikd6dsxM8Abh%2fj76AkX60i5Cg%3d%3d
unknown
whitelisted
7508
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/5cbc98ff-b69b-4fda-ad94-17ec2f9cf48b?P1=1748897035&P2=404&P3=2&P4=MxEb0mGXHtOmqjCGFPH58WJic6L3XvqJvftmRHfKKIUT3S2Jg%2fcp8nEaLHWlUikd6dsxM8Abh%2fj76AkX60i5Cg%3d%3d
unknown
whitelisted
7508
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/5cbc98ff-b69b-4fda-ad94-17ec2f9cf48b?P1=1748897035&P2=404&P3=2&P4=MxEb0mGXHtOmqjCGFPH58WJic6L3XvqJvftmRHfKKIUT3S2Jg%2fcp8nEaLHWlUikd6dsxM8Abh%2fj76AkX60i5Cg%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5508
msedge.exe
239.255.255.250:1900
whitelisted
4608
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4608
msedge.exe
150.171.30.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.142
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 2.16.253.202
  • 95.101.149.131
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 20.73.194.208
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 150.171.30.11
  • 150.171.29.11
  • 150.171.28.11
  • 150.171.27.11
whitelisted
github.com
  • 140.82.121.4
whitelisted
edge-mobile-static.azureedge.net
  • 40.90.65.53
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
github.githubassets.com
  • 185.199.111.154
  • 185.199.108.154
  • 185.199.109.154
  • 185.199.110.154
whitelisted

Threats

PID
Process
Class
Message
4608
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
4608
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info