File name:

Setup.exe

Full analysis: https://app.any.run/tasks/b369c563-e416-40bc-a2fd-3109842b82fe
Verdict: Malicious activity
Analysis date: June 24, 2025, 15:45:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
java
arch-scr
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

E5ADEB5BA182A336EC298E591D1A08C2

SHA1:

BFBD753CE7B0730CEDAEC6B70B642EE724056949

SHA256:

41D35E55001CA6C407BF37D5E49D504DFBF0A8F82C29CDCCCDB92C5E1A1DF2C1

SSDEEP:

196608:OKYkWxr3DrZXTVorXeFaDNmUcHUv3B2XtJx9h:OKRe3DrZXK2ahcHUvQtJb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Setup.exe (PID: 2996)
      • Setup.exe (PID: 2780)
      • Setup.exe (PID: 2732)
      • Setup.exe (PID: 1964)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Setup.tmp (PID: 2124)
      • Setup.tmp (PID: 5480)
      • jre-8u451-windows-x64.exe (PID: 7980)
      • installer.exe (PID: 7528)
      • jp2launcher.exe (PID: 7688)
      • jp2launcher.exe (PID: 4444)
      • Setup.tmp (PID: 6700)
      • Setup.tmp (PID: 5628)
    • Executable content was dropped or overwritten

      • Setup.exe (PID: 2996)
      • Setup.exe (PID: 2780)
      • Setup.tmp (PID: 5480)
      • installer.exe (PID: 7528)
      • jre-8u451-windows-x64.exe (PID: 7980)
      • Setup.exe (PID: 2732)
      • Setup.exe (PID: 1964)
      • Setup.tmp (PID: 6700)
    • Reads the Windows owner or organization settings

      • Setup.tmp (PID: 5480)
      • msiexec.exe (PID: 8164)
      • Setup.tmp (PID: 6700)
    • Checks for Java to be installed

      • jre-8u451-windows-x64.exe (PID: 7980)
      • msiexec.exe (PID: 7384)
      • msiexec.exe (PID: 8164)
      • installer.exe (PID: 7528)
      • ssvagent.exe (PID: 2144)
      • jp2launcher.exe (PID: 7688)
      • jp2launcher.exe (PID: 4444)
      • msiexec.exe (PID: 2464)
      • javaw.exe (PID: 6236)
    • Reads Microsoft Outlook installation path

      • jre-8u451-windows-x64.exe (PID: 7980)
    • Reads Internet Explorer settings

      • jre-8u451-windows-x64.exe (PID: 7980)
    • Application launched itself

      • msiexec.exe (PID: 8164)
    • Reads Mozilla Firefox installation path

      • MSIE52D.tmp (PID: 7440)
      • installer.exe (PID: 7528)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 8164)
    • There is functionality for taking screenshot (YARA)

      • jre-8u451-windows-x64.exe (PID: 7980)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 8164)
    • Creates/Modifies COM task schedule object

      • ssvagent.exe (PID: 2144)
      • installer.exe (PID: 7528)
  • INFO

    • Reads the computer name

      • Setup.tmp (PID: 2124)
      • Setup.tmp (PID: 5480)
      • identity_helper.exe (PID: 7204)
      • jre-8u451-windows-x64.exe (PID: 7956)
      • jre-8u451-windows-x64.exe (PID: 7980)
      • msiexec.exe (PID: 8164)
      • MSIE52D.tmp (PID: 7440)
      • msiexec.exe (PID: 7384)
      • identity_helper.exe (PID: 7568)
      • installer.exe (PID: 7528)
      • javaws.exe (PID: 7672)
      • jp2launcher.exe (PID: 7688)
      • javaws.exe (PID: 5712)
      • jp2launcher.exe (PID: 4444)
      • msiexec.exe (PID: 2680)
      • msiexec.exe (PID: 2464)
      • javaw.exe (PID: 6236)
      • javaw.exe (PID: 4120)
      • msiexec.exe (PID: 7188)
      • msiexec.exe (PID: 2864)
      • javaw.exe (PID: 5540)
      • Setup.tmp (PID: 5628)
      • Setup.tmp (PID: 6700)
    • Create files in a temporary directory

      • Setup.exe (PID: 2996)
      • Setup.exe (PID: 2780)
      • Setup.tmp (PID: 5480)
      • jre-8u451-windows-x64.exe (PID: 7956)
      • MSIE52D.tmp (PID: 7440)
      • javaw.exe (PID: 7552)
      • jp2launcher.exe (PID: 7688)
      • jp2launcher.exe (PID: 4444)
      • javaw.exe (PID: 5540)
      • Setup.exe (PID: 2732)
      • Setup.tmp (PID: 6700)
      • Setup.exe (PID: 1964)
    • Checks supported languages

      • Setup.tmp (PID: 2124)
      • Setup.exe (PID: 2996)
      • Setup.tmp (PID: 5480)
      • Setup.exe (PID: 2780)
      • identity_helper.exe (PID: 7204)
      • jre-8u451-windows-x64.exe (PID: 7956)
      • jre-8u451-windows-x64.exe (PID: 7980)
      • msiexec.exe (PID: 8164)
      • msiexec.exe (PID: 7384)
      • MSIE52D.tmp (PID: 7440)
      • jaureg.exe (PID: 4080)
      • identity_helper.exe (PID: 7568)
      • installer.exe (PID: 7528)
      • javaw.exe (PID: 7552)
      • ssvagent.exe (PID: 2144)
      • javaws.exe (PID: 7672)
      • jp2launcher.exe (PID: 7688)
      • javaws.exe (PID: 5712)
      • jp2launcher.exe (PID: 4444)
      • msiexec.exe (PID: 2464)
      • msiexec.exe (PID: 2680)
      • javaw.exe (PID: 6236)
      • javaw.exe (PID: 4120)
      • msiexec.exe (PID: 7188)
      • msiexec.exe (PID: 2864)
      • javaw.exe (PID: 5540)
      • Setup.exe (PID: 2732)
      • Setup.tmp (PID: 5628)
      • Setup.tmp (PID: 6700)
      • Setup.exe (PID: 1964)
    • Process checks computer location settings

      • Setup.tmp (PID: 2124)
      • Setup.tmp (PID: 5628)
    • Application launched itself

      • msedge.exe (PID: 4412)
      • msedge.exe (PID: 2528)
      • msedge.exe (PID: 4112)
      • msedge.exe (PID: 7800)
      • msedge.exe (PID: 5012)
    • Manual execution by a user

      • msedge.exe (PID: 4112)
      • Setup.exe (PID: 2732)
    • Reads Environment values

      • identity_helper.exe (PID: 7204)
      • jre-8u451-windows-x64.exe (PID: 7980)
      • identity_helper.exe (PID: 7568)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 4112)
      • msiexec.exe (PID: 8164)
      • msedge.exe (PID: 7800)
    • Java executable

      • jre-8u451-windows-x64.exe (PID: 7908)
      • jre-8u451-windows-x64.exe (PID: 7956)
      • jre-8u451-windows-x64.exe (PID: 7980)
      • MSIE52D.tmp (PID: 7440)
      • installer.exe (PID: 7528)
    • Reads the machine GUID from the registry

      • jre-8u451-windows-x64.exe (PID: 7980)
      • msiexec.exe (PID: 8164)
    • Creates files or folders in the user directory

      • jre-8u451-windows-x64.exe (PID: 7980)
      • msiexec.exe (PID: 8164)
    • Reads the software policy settings

      • jre-8u451-windows-x64.exe (PID: 7980)
      • msiexec.exe (PID: 8164)
      • slui.exe (PID: 7136)
    • Checks proxy server information

      • jre-8u451-windows-x64.exe (PID: 7980)
      • jp2launcher.exe (PID: 7688)
      • jp2launcher.exe (PID: 4444)
      • slui.exe (PID: 7136)
    • The sample compiled with english language support

      • msiexec.exe (PID: 8164)
      • installer.exe (PID: 7528)
      • jre-8u451-windows-x64.exe (PID: 7980)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 8164)
    • Reads CPU info

      • msiexec.exe (PID: 8164)
    • Creates files in the program directory

      • installer.exe (PID: 7528)
      • javaw.exe (PID: 7552)
    • JAVA mutex has been found

      • jp2launcher.exe (PID: 7688)
      • jp2launcher.exe (PID: 4444)
      • msiexec.exe (PID: 2680)
      • msiexec.exe (PID: 7188)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 8164)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (77.7)
.exe | Win32 Executable Delphi generic (10)
.dll | Win32 Dynamic Link Library (generic) (4.6)
.exe | Win32 Executable (generic) (3.1)
.exe | Win16/32 Executable Delphi generic (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 41472
InitializedDataSize: 17920
UninitializedDataSize: -
EntryPoint: 0xaa98
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: ATEXO
FileDescription: Atexo Sign Setup
FileVersion:
LegalCopyright:
ProductName: Atexo Sign
ProductVersion: 4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
232
Monitored processes
93
Malicious processes
11
Suspicious processes
3

Behavior graph

Click at the process to see the details
start setup.exe setup.tmp no specs setup.exe setup.tmp msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs jre-8u451-windows-x64.exe no specs jre-8u451-windows-x64.exe jre-8u451-windows-x64.exe msiexec.exe msiexec.exe no specs msie52d.tmp no specs jaureg.exe conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs slui.exe installer.exe javaw.exe ssvagent.exe no specs javaws.exe jp2launcher.exe no specs javaws.exe jp2launcher.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs javaw.exe no specs javaw.exe no specs msiexec.exe no specs msiexec.exe no specs javaw.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs setup.exe setup.tmp no specs setup.exe setup.tmp msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2732,i,6262352763439135047,12519037007915075754,262144 --variations-seed-version --mojo-platform-channel-handle=2744 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
868"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --subproc-heap-profiling --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=2824,i,6499974376906040208,13380467503171187786,262144 --variations-seed-version --mojo-platform-channel-handle=3632 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1388"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=6412,i,6262352763439135047,12519037007915075754,262144 --variations-seed-version --mojo-platform-channel-handle=6428 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1832"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=7332,i,6262352763439135047,12519037007915075754,262144 --variations-seed-version --mojo-platform-channel-handle=7312 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1964"C:\Users\admin\Desktop\Setup.exe" /SPAWNWND=$50318 /NOTIFYWND=$30364 C:\Users\admin\Desktop\Setup.exe
Setup.tmp
User:
admin
Company:
ATEXO
Integrity Level:
HIGH
Description:
Atexo Sign Setup
Exit code:
1
Version:
Modules
Images
c:\users\admin\desktop\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
2124"C:\Users\admin\AppData\Local\Temp\is-FIRT3.tmp\Setup.tmp" /SL5="$60282,12788763,57856,C:\Users\admin\AppData\Local\Temp\Setup.exe" C:\Users\admin\AppData\Local\Temp\is-FIRT3.tmp\Setup.tmpSetup.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
1
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-firt3.tmp\setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2144"C:\Program Files\Java\jre1.8.0_451\bin\ssvagent.exe" -doHKCUSSVSetupC:\Program Files\Java\jre1.8.0_451\bin\ssvagent.exeinstaller.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
11.451.0.10
Modules
Images
c:\program files\java\jre1.8.0_451\bin\ssvagent.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2192"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.142 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.92 --initial-client-data=0x284,0x288,0x28c,0x27c,0x294,0x7ffc4439f208,0x7ffc4439f214,0x7ffc4439f220C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2464C:\Windows\System32\MsiExec.exe -Embedding 99398E7D373D412EE59674972C720E63 E Global\MSI0000C:\Windows\System32\msiexec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2528"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument http://www.java.com/getjava/C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
52 219
Read events
24 308
Write events
13 076
Delete events
14 835

Modification events

(PID) Process:(5480) Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5480) Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5480) Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4412) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4412) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2528) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
1
(PID) Process:(2528) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5480) Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(2528) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(2528) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
97ABAF81E9962F00
Executable files
354
Suspicious files
237
Text files
290
Unknown types
113

Dropped files

PID
Process
Filename
Type
4112msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF177fa0.TMP
MD5:
SHA256:
4112msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
4112msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old~RF177fce.TMP
MD5:
SHA256:
4112msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old
MD5:
SHA256:
5480Setup.tmpC:\Users\admin\AppData\Local\Temp\is-8AHRG.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
4112msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF177fee.TMP
MD5:
SHA256:
2528msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Variationsbinary
MD5:CDDDC745A8C954DC438C931889999BDB
SHA256:3DC9043838386F5363AC96A01477CF3163B5118B80191576A11B32CE9894314C
4112msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
4112msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:DB2481F2EE5CCCFADDEE7C1617C3720C
SHA256:8E027D3744218C6DC7D25742DE58643B568F3643131E15CE2857C5EEABEE8965
4112msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF177fee.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
141
DNS requests
152
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3624
msedge.exe
GET
200
150.171.27.11:80
http://edge.microsoft.com/browsernetworktime/time/1/current?cup2key=2:YKQv-vqrN3TKromBHCggAeerdf_TUXMo7zjEJsS5ldk&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
unknown
whitelisted
7704
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7704
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7980
jre-8u451-windows-x64.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
whitelisted
8164
msiexec.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
8164
msiexec.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAqhj2P5bxF3HLsLQ%2BTWkLg%3D
unknown
whitelisted
8164
msiexec.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
7980
jre-8u451-windows-x64.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAsA6S1NbXMfyjBZx8seGIY%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1352
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3624
msedge.exe
150.171.27.11:80
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3624
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
www.java.com
  • 92.123.104.18
  • 92.123.104.65
  • 2.23.227.218
  • 2.23.227.198
whitelisted
copilot.microsoft.com
  • 92.123.104.45
  • 92.123.104.53
whitelisted
www.bing.com
  • 92.123.104.30
  • 92.123.104.67
  • 92.123.104.38
  • 92.123.104.22
  • 92.123.104.46
  • 92.123.104.21
  • 92.123.104.34
  • 92.123.104.65
  • 92.123.104.33
  • 92.123.104.52
  • 92.123.104.53
  • 92.123.104.49
  • 92.123.104.61
  • 92.123.104.32
  • 92.123.104.19
  • 92.123.104.28
whitelisted
consent.trustarc.com
  • 18.66.122.78
  • 18.66.122.97
  • 18.66.122.49
  • 18.66.122.116
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info