URL:

https://mumu.nie.netease.com/api/v1/release/downloader/NEMUX?channel=V4.1.25.3699&dfuid=elk_LvNDwbD&nonce=5BEOoR

Full analysis: https://app.any.run/tasks/4faee5de-d313-4e50-afab-5642840f8d21
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 27, 2025, 04:49:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
Indicators:
MD5:

BBE819659BD4A350631CCA30ADA7611B

SHA1:

9D83EFAFA84F234D187FE610AB4D427C3E856FF3

SHA256:

3FA1C58674FA259895C0C5E3E3EA76C399B7C2821BE4406101E812560472FCE1

SSDEEP:

3:N8t/pARhWcE9YMAWDIXw+fspUswjzrE10VE:2PaWSBWp+xhHM02

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • MuMuInstaller_3.1.13.1_V4.1.25.3699_zh-Hans_1745636834.exe (PID: 7844)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • The process drops C-runtime libraries

      • MuMuInstaller_3.1.13.1_V4.1.25.3699_zh-Hans_1745636834.exe (PID: 7844)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Drops a system driver (possible attempt to evade defenses)

      • MuMuInstaller_3.1.13.1_V4.1.25.3699_zh-Hans_1745636834.exe (PID: 7844)
      • ColaBoxChecker.exe (PID: 6324)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Executable content was dropped or overwritten

      • MuMuInstaller_3.1.13.1_V4.1.25.3699_zh-Hans_1745636834.exe (PID: 7844)
      • ColaBoxChecker.exe (PID: 6324)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Drops 7-zip archiver for unpacking

      • MuMuInstaller_3.1.13.1_V4.1.25.3699_zh-Hans_1745636834.exe (PID: 7844)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Reads security settings of Internet Explorer

      • nemu-downloader.exe (PID: 7052)
    • There is functionality for taking screenshot (YARA)

      • nemu-downloader.exe (PID: 7052)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Process requests binary or script from the Internet

      • MuMuDownloader.exe (PID: 780)
    • Potential Corporate Privacy Violation

      • MuMuDownloader.exe (PID: 780)
    • Windows service management via SC.EXE

      • sc.exe (PID: 1004)
      • sc.exe (PID: 2600)
      • sc.exe (PID: 7776)
      • sc.exe (PID: 5480)
      • sc.exe (PID: 4980)
    • The process creates files with name similar to system file names

      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
  • INFO

    • Executable content was dropped or overwritten

      • msedge.exe (PID: 7412)
      • msedge.exe (PID: 5176)
      • msedge.exe (PID: 4436)
    • Checks supported languages

      • identity_helper.exe (PID: 4652)
      • MuMuInstaller_3.1.13.1_V4.1.25.3699_zh-Hans_1745636834.exe (PID: 7844)
      • ColaBoxChecker.exe (PID: 6324)
      • nemu-downloader.exe (PID: 7052)
      • HyperVChecker.exe (PID: 6040)
      • MuMuDownloader.exe (PID: 780)
      • HyperVChecker.exe (PID: 4068)
      • HyperVChecker.exe (PID: 2772)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Application launched itself

      • msedge.exe (PID: 5176)
    • Reads the computer name

      • identity_helper.exe (PID: 4652)
      • nemu-downloader.exe (PID: 7052)
      • ColaBoxChecker.exe (PID: 6324)
      • MuMuDownloader.exe (PID: 780)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • The sample compiled with english language support

      • msedge.exe (PID: 7412)
      • msedge.exe (PID: 5176)
      • MuMuInstaller_3.1.13.1_V4.1.25.3699_zh-Hans_1745636834.exe (PID: 7844)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
      • msedge.exe (PID: 4436)
    • Reads Environment values

      • identity_helper.exe (PID: 4652)
    • Create files in a temporary directory

      • MuMuInstaller_3.1.13.1_V4.1.25.3699_zh-Hans_1745636834.exe (PID: 7844)
      • ColaBoxChecker.exe (PID: 6324)
      • nemu-downloader.exe (PID: 7052)
      • MuMuDownloader.exe (PID: 780)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • The sample compiled with chinese language support

      • MuMuInstaller_3.1.13.1_V4.1.25.3699_zh-Hans_1745636834.exe (PID: 7844)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Reads the software policy settings

      • nemu-downloader.exe (PID: 7052)
      • slui.exe (PID: 8144)
      • slui.exe (PID: 2316)
    • Creates files in the program directory

      • nemu-downloader.exe (PID: 7052)
      • MuMuNG-setup-V4.1.25.3699-0426042611.exe (PID: 6572)
    • Reads the machine GUID from the registry

      • MuMuDownloader.exe (PID: 780)
    • Process checks computer location settings

      • nemu-downloader.exe (PID: 7052)
    • Checks proxy server information

      • slui.exe (PID: 2316)
    • Manual execution by a user

      • Taskmgr.exe (PID: 6752)
      • Taskmgr.exe (PID: 6824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
245
Monitored processes
106
Malicious processes
4
Suspicious processes
3

Behavior graph

Click at the process to see the details
start iexplore.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs mumuinstaller_3.1.13.1_v4.1.25.3699_zh-hans_1745636834.exe no specs mumuinstaller_3.1.13.1_v4.1.25.3699_zh-hans_1745636834.exe nemu-downloader.exe colaboxchecker.exe conhost.exe no specs hypervchecker.exe no specs conhost.exe no specs hypervchecker.exe no specs conhost.exe no specs hypervchecker.exe no specs conhost.exe no specs mumudownloader.exe conhost.exe no specs msedge.exe no specs msedge.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs mumung-setup-v4.1.25.3699-0426042611.exe msedge.exe no specs sc.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs taskmgr.exe no specs taskmgr.exe msedge.exe no specs sc.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs mumuvmmsvc.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs mumuvmmsvc.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs netlwfuninstall.exe no specs conhost.exe no specs supuninstall.exe no specs conhost.exe no specs supuninstall.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs msedge.exe no specs supinstall.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs conhost.exe no specs conhost.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
516 /s "C:\Program Files\MuMuVMMVbox\Hypervisor\MuMuVMMC.dll"C:\Windows\System32\regsvr32.exeregsvr32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
664"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6852 --field-trial-handle=2372,i,3759171523353389482,4746332298076914993,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
780"C:\Users\admin\AppData\Local\Temp\7z13ED0EA4\MuMuDownloader.exe" --log="C:\Users\admin\AppData\Local\Temp\nemu-downloader-aria.log" --log-level=notice --check-certificate=false --enable-rpc=true --rpc-listen-port=49775 --continue --max-concurrent-downloads=10 --max-connection-per-server=5 --async-dns=false --file-allocation=prealloc --enable-mmap=true --connect-timeout=5 --rpc-max-request-size=1024M --stop-with-process=7052C:\Users\admin\AppData\Local\Temp\7z13ED0EA4\MuMuDownloader.exe
nemu-downloader.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\7z13ed0ea4\mumudownloader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
904"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --mojo-platform-channel-handle=7044 --field-trial-handle=2372,i,3759171523353389482,4746332298076914993,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
976"C:\WINDOWS\system32\regsvr32.exe" /u /s "C:\Program Files\MuMuVMMVbox\Hypervisor\MuMuVMMC.dll"C:\Windows\SysWOW64\regsvr32.exeMuMuNG-setup-V4.1.25.3699-0426042611.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1004"C:\WINDOWS\system32\sc.exe" query MuMuVMMNetLwfC:\Windows\SysWOW64\sc.exeMuMuNG-setup-V4.1.25.3699-0426042611.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1012\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeHyperVChecker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1012"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=6812 --field-trial-handle=2372,i,3759171523353389482,4746332298076914993,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1020"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6916 --field-trial-handle=2372,i,3759171523353389482,4746332298076914993,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1040"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=7104 --field-trial-handle=2372,i,3759171523353389482,4746332298076914993,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
21 295
Read events
21 254
Write events
40
Delete events
1

Modification events

(PID) Process:(4688) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4688) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4688) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4688) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(4688) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(4688) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(5176) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5176) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5176) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5176) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
Executable files
420
Suspicious files
650
Text files
657
Unknown types
0

Dropped files

PID
Process
Filename
Type
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10bb62.TMP
MD5:
SHA256:
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10bb62.TMP
MD5:
SHA256:
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10bb62.TMP
MD5:
SHA256:
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10bb72.TMP
MD5:
SHA256:
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10bb72.TMP
MD5:
SHA256:
5176msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
71
TCP/UDP connections
70
DNS requests
79
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
92.122.244.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8100
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
780
MuMuDownloader.exe
GET
92.122.244.34:80
http://a11.gdl.netease.com/MuMuNG-setup-V4.1.25.3699-0426042611.exe
unknown
whitelisted
8100
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
780
MuMuDownloader.exe
GET
92.122.244.34:80
http://a11.gdl.netease.com/MuMuNG-setup-V4.1.25.3699-0426042611.exe
unknown
whitelisted
780
MuMuDownloader.exe
GET
92.122.244.34:80
http://a11.gdl.netease.com/MuMuNG-setup-V4.1.25.3699-0426042611.exe
unknown
whitelisted
780
MuMuDownloader.exe
GET
92.122.244.34:80
http://a11.gdl.netease.com/MuMuNG-setup-V4.1.25.3699-0426042611.exe
unknown
whitelisted
780
MuMuDownloader.exe
GET
206
92.122.244.34:80
http://a11.gdl.netease.com/MuMuNG-setup-V4.1.25.3699-0426042611.exe
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
92.122.244.32:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5176
msedge.exe
239.255.255.250:1900
whitelisted
7412
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7412
msedge.exe
150.171.27.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7412
msedge.exe
42.186.110.59:443
mumu.nie.netease.com
NetEase Building No.16 Ke Yun Road
CN
malicious
7412
msedge.exe
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 92.122.244.32
  • 92.122.244.42
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
google.com
  • 172.217.16.142
whitelisted
mumu.nie.netease.com
  • 42.186.110.59
malicious
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
bzib.nelreports.net
  • 92.122.244.16
  • 92.122.244.40
  • 2.22.242.11
  • 2.22.242.105
whitelisted

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
No debug info