URL:

https://9trainers.com/resident-evil-7-biohazard-gold-edition-trainer-free-download/

Full analysis: https://app.any.run/tasks/bfa34beb-2c25-432b-8c57-6f7677c46b7d
Verdict: Malicious activity
Analysis date: May 18, 2025, 03:29:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
auto
generic
delphi
mpress
Indicators:
MD5:

F5A61F99B4D6706DCDCF6A1F5A55BCCE

SHA1:

D13A40CFBC1BBD116F34C0FB308C4FD0B45EC788

SHA256:

3A49EF9B99554EBF78885667B2F1DDDB3856EAA1866B654BCF1FD444BB497572

SSDEEP:

3:N8CUgRXEuRIKDMWMFTUMLXyFmn:2CUgquRIQ+y+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • WinRAR.exe (PID: 8160)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6872)
      • WinRAR.exe (PID: 5756)
    • Application launched itself

      • WinRAR.exe (PID: 5756)
    • Executable content was dropped or overwritten

      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 8556)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 6228)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 9064)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 5588)
      • Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE (PID: 968)
      • Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE (PID: 8932)
      • Rresident Evil 7 V1.0 +7 Trainer 64 Bit.EXE (PID: 496)
      • Rresident Evil 7 V1.0 +7 Trainer 64 Bit.EXE (PID: 9136)
    • Process drops legitimate windows executable

      • Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE (PID: 8932)
  • INFO

    • Application launched itself

      • msedge.exe (PID: 6656)
    • Checks supported languages

      • identity_helper.exe (PID: 8696)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 8556)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 6228)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 5164)
    • Reads the computer name

      • identity_helper.exe (PID: 8696)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 8556)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 5164)
    • Reads Environment values

      • identity_helper.exe (PID: 8696)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 6656)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6872)
      • WinRAR.exe (PID: 8160)
    • Create files in a temporary directory

      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 8556)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 6228)
    • The sample compiled with english language support

      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 6228)
      • WinRAR.exe (PID: 5756)
      • WinRAR.exe (PID: 8160)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 5588)
      • Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE (PID: 8932)
      • Rresident Evil 7 V1.0 +7 Trainer 64 Bit.EXE (PID: 496)
    • Manual execution by a user

      • WinRAR.exe (PID: 8160)
      • re7_upd2_tr.EXE (PID: 6676)
      • re7#3+6tr.exe (PID: 2516)
      • re7#3+6tr.exe (PID: 7888)
      • Resident Evil 7 Biohazard Trainer.exe (PID: 8324)
      • re7#3+6tr.exe (PID: 7936)
      • re7#3+6tr.exe (PID: 2332)
      • Resident Evil 7 Biohazard Trainer.exe (PID: 4304)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 3140)
      • re7gir489.exe (PID: 4572)
      • Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE (PID: 9064)
      • Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE (PID: 968)
      • Resident Evil 7 Biohazard.exe (PID: 5796)
      • Resident Evil 7 Biohazard.exe (PID: 300)
      • Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE (PID: 8912)
      • Rresident Evil 7 V1.0 +7 Trainer 64 Bit.EXE (PID: 8988)
      • Rresident Evil 7 V1.0 +7 Trainer 64 Bit.EXE (PID: 9136)
    • Compiled with Borland Delphi (YARA)

      • re7#3+6tr.exe (PID: 2332)
      • re7#3+6tr.exe (PID: 7936)
    • Mpress packer has been detected

      • re7#3+6tr.exe (PID: 7936)
      • re7#3+6tr.exe (PID: 2332)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
224
Monitored processes
83
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs winrar.exe no specs msedge.exe no specs msedge.exe no specs slui.exe winrar.exe resident evil 7 biohazard v1.0 cpy +5 trainer 64 bit.exe no specs resident evil 7 biohazard v1.0 cpy +5 trainer 64 bit.exe resident evil 7 biohazard v1.0 cpy +5 trainer 64 bit.exe resident evil 7 biohazard v1.0 cpy +5 trainer 64 bit.exe no specs msedge.exe no specs rundll32.exe no specs msedge.exe no specs #GENERIC winrar.exe msedge.exe no specs re7#3+6tr.exe no specs re7#3+6tr.exe re7#3+6tr.exe no specs re7#3+6tr.exe msedge.exe no specs re7_upd2_tr.exe no specs re7gir489.exe no specs resident evil 7 biohazard trainer.exe no specs resident evil 7 biohazard trainer.exe msedge.exe no specs resident evil 7 biohazard v1.0 cpy +5 trainer 64 bit.exe no specs resident evil 7 biohazard v1.0 cpy +5 trainer 64 bit.exe resident evil 7 biohazard v1.0 cpy +5 trainer 64 bit.exe msedge.exe no specs resident evil 7 biohazard v1.0 cpy +5 trainer 64 bit.exe no specs resident evil 7 biohazard.exe no specs resident evil 7 biohazard.exe rresident evil 7 v1.0 +7 trainer 32  bit.exe no specs rresident evil 7 v1.0 +7 trainer 32  bit.exe rresident evil 7 v1.0 +7 trainer 32  bit.exe rresident evil 7 v1.0 +7 trainer 32  bit.exe no specs rresident evil 7 v1.0 +7 trainer 64  bit.exe no specs rresident evil 7 v1.0 +7 trainer 64  bit.exe rresident evil 7 v1.0 +7 trainer 64  bit.exe rresident evil 7 v1.0 +7 trainer 64  bit.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
132"C:\Users\admin\AppData\Local\Temp\cetrainers\CETB1AF.tmp\extracted\Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE" "C:\Users\admin\AppData\Local\Temp\cetrainers\CETB1AF.tmp\extracted\CET_TRAINER.CETRAINER" "-ORIGIN:C:\Users\admin\Desktop\sa\"C:\Users\admin\AppData\Local\Temp\cetrainers\CETB1AF.tmp\extracted\Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXERresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE
User:
admin
Company:
Cheat Engine
Integrity Level:
HIGH
Description:
Cheat Engine
Exit code:
0
Version:
6.6.0.4880
Modules
Images
c:\users\admin\appdata\local\temp\cetrainers\cetb1af.tmp\extracted\rresident evil 7 v1.0 +7 trainer 32 bit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
300"C:\Users\admin\Desktop\sa\Resident Evil 7 Biohazard.exe" C:\Users\admin\Desktop\sa\Resident Evil 7 Biohazard.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\desktop\sa\resident evil 7 biohazard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
496"C:\Users\admin\AppData\Local\Temp\cetrainers\CETCEEC.tmp\Rresident Evil 7 V1.0 +7 Trainer 64 Bit.EXE" -ORIGIN:"C:\Users\admin\Desktop\sa\"C:\Users\admin\AppData\Local\Temp\cetrainers\CETCEEC.tmp\Rresident Evil 7 V1.0 +7 Trainer 64 Bit.EXE
Rresident Evil 7 V1.0 +7 Trainer 64 Bit.EXE
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\cetrainers\cetceec.tmp\rresident evil 7 v1.0 +7 trainer 64 bit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
896"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=50 --mojo-platform-channel-handle=7720 --field-trial-handle=2348,i,8180682120954856635,14261760418372892513,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
968"C:\Users\admin\Desktop\sa\Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE" C:\Users\admin\Desktop\sa\Rresident Evil 7 V1.0 +7 Trainer 32 Bit.EXE
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\sa\rresident evil 7 v1.0 +7 trainer 32 bit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
1020C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1128"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=7700 --field-trial-handle=2348,i,8180682120954856635,14261760418372892513,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1228"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=6924 --field-trial-handle=2348,i,8180682120954856635,14261760418372892513,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1512"C:\Users\admin\AppData\Local\Temp\Rar$EXa6872.34816\Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXE" C:\Users\admin\AppData\Local\Temp\Rar$EXa6872.34816\Resident Evil 7 biohazard V1.0 CPY +5 Trainer 64 Bit.EXEWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6872.34816\resident evil 7 biohazard v1.0 cpy +5 trainer 64 bit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2332"C:\Users\admin\Desktop\sa\re7#3+6tr.exe" C:\Users\admin\Desktop\sa\re7#3+6tr.exe
explorer.exe
User:
admin
Company:
Home of Gamehacking
Integrity Level:
HIGH
Description:
Resident Evil 7 Patch #3 +6 Trainer
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\sa\re7#3+6tr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
15 144
Read events
15 047
Write events
97
Delete events
0

Modification events

(PID) Process:(6656) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6656) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6656) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6656) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6656) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
62FCF0E7F6932F00
(PID) Process:(6656) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
3990F9E7F6932F00
(PID) Process:(6656) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262916
Operation:writeName:WindowTabManagerFileMappingId
Value:
{7FE6E926-C819-4590-9FE4-0DBC286709ED}
(PID) Process:(6656) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262916
Operation:writeName:WindowTabManagerFileMappingId
Value:
{4A06197E-0917-401D-BA7D-EA58F4BE0071}
(PID) Process:(6656) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262916
Operation:writeName:WindowTabManagerFileMappingId
Value:
{02623829-C90A-4F2C-BA5A-B473B62D0464}
(PID) Process:(6656) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262916
Operation:writeName:WindowTabManagerFileMappingId
Value:
{CA47EB77-1609-48AE-8057-D7DD517727D9}
Executable files
47
Suspicious files
325
Text files
62
Unknown types
0

Dropped files

PID
Process
Filename
Type
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10b5a6.TMP
MD5:
SHA256:
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10b5c5.TMP
MD5:
SHA256:
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10b5d5.TMP
MD5:
SHA256:
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10b5d5.TMP
MD5:
SHA256:
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10b5d5.TMP
MD5:
SHA256:
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
6656msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
26
TCP/UDP connections
99
DNS requests
112
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
7868
svchost.exe
GET
206
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1747700362&P2=404&P3=2&P4=JQYjz9iy4rRu1cCDAqVWR1b0hv1i4SV1Tp1OL6dxIjfsm%2fHTHyVcfIYYT030oOUSHSIyS3JacKJJq8RTw9LCgw%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
7436
msedge.exe
188.114.97.3:443
9trainers.com
unknown
7436
msedge.exe
142.250.185.72:443
www.googletagmanager.com
whitelisted
7436
msedge.exe
142.250.184.194:443
pagead2.googlesyndication.com
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 95.101.149.131
whitelisted
google.com
  • 142.250.185.238
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
9trainers.com
  • 188.114.97.3
  • 188.114.96.3
unknown
business.bing.com
  • 13.107.6.158
whitelisted
www.bing.com
  • 2.16.241.201
  • 2.16.241.218
  • 2.23.227.215
  • 2.23.227.208
  • 92.123.104.63
  • 92.123.104.32
  • 92.123.104.34
  • 92.123.104.38
whitelisted

Threats

PID
Process
Class
Message
7436
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7436
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7436
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7436
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7436
msedge.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
No debug info