URL:

https://download.clipgrab.org/clipgrab-3.9.11-dotinstaller-4.exe

Full analysis: https://app.any.run/tasks/80dcb904-5297-479b-93ff-b8f386e9c199
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: June 10, 2025, 15:28:10
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
bundleinstaller
adware
arch-exec
delphi
inno
installer
python
loader
evasion
Indicators:
MD5:

F0DC36769A209F51CB522920D28BD5D2

SHA1:

478D4E36B999DF7622A3AD2A7D7FA98042448DB7

SHA256:

53578277B6E256633B32153C348E917C06A8A515B844ECD9347CAABA877D11AC

SSDEEP:

3:N8SElTAfCc6UUbRNqOXIvn:2SKUfxyNqOX+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bundleinstaller mutex has been found

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
    • Executing a file with an untrusted certificate

      • QtWebEngineProcess.exe (PID: 1760)
      • QtWebEngineProcess.exe (PID: 7608)
      • QtWebEngineProcess.exe (PID: 8144)
      • QtWebEngineProcess.exe (PID: 6524)
      • QtWebEngineProcess.exe (PID: 8076)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 8108)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • saBSI.exe (PID: 6344)
      • avg_secure_browser_setup.exe (PID: 8036)
    • Executable content was dropped or overwritten

      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8088)
      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8180)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • clipgrab-3.9.11-portable.exe (PID: 7920)
      • clipgrab-3.9.11-portable.tmp (PID: 7876)
      • vc_redist.x86.exe (PID: 3732)
      • vc_redist.x86.exe (PID: 7396)
      • avg_secure_browser_setup.exe (PID: 8036)
      • saBSI.exe (PID: 6344)
      • saBSI.exe (PID: 2288)
      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
      • installer.exe (PID: 7900)
      • AVGBrowserInstaller.exe (PID: 6640)
      • installer.exe (PID: 7476)
      • setup.exe (PID: 7412)
    • Reads the Windows owner or organization settings

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • clipgrab-3.9.11-portable.tmp (PID: 7876)
    • Starts a Microsoft application from unusual location

      • vc_redist.x86.exe (PID: 7396)
      • vc_redist.x86.exe (PID: 3732)
    • Process drops legitimate windows executable

      • clipgrab-3.9.11-portable.tmp (PID: 7876)
      • vc_redist.x86.exe (PID: 3732)
      • installer.exe (PID: 7900)
    • The process drops C-runtime libraries

      • clipgrab-3.9.11-portable.tmp (PID: 7876)
    • There is functionality for taking screenshot (YARA)

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • avg_secure_browser_setup.exe (PID: 8036)
    • Process drops python dynamic module

      • clipgrab-3.9.11-portable.tmp (PID: 7876)
    • Searches for installed software

      • vc_redist.x86.exe (PID: 7396)
    • Executes application which crashes

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
    • Reads the BIOS version

      • avg_secure_browser_setup.exe (PID: 8036)
    • The process verifies whether the antivirus software is installed

      • avg_secure_browser_setup.exe (PID: 8036)
    • Starts itself from another location

      • AVGBrowserUpdate.exe (PID: 7176)
    • Executes as Windows Service

      • AVGBrowserUpdate.exe (PID: 2596)
      • servicehost.exe (PID: 7952)
      • elevation_service.exe (PID: 5724)
      • elevation_service.exe (PID: 2128)
      • elevation_service.exe (PID: 4052)
    • Process requests binary or script from the Internet

      • AVGBrowserUpdate.exe (PID: 2596)
    • Application launched itself

      • setup.exe (PID: 7412)
      • AVGBrowser.exe (PID: 9200)
      • AVGBrowser.exe (PID: 7940)
      • setup.exe (PID: 6308)
      • AVGBrowser.exe (PID: 9552)
      • chrmstp.exe (PID: 9364)
      • chrmstp.exe (PID: 9304)
      • AVGBrowser.exe (PID: 7964)
    • Potential Corporate Privacy Violation

      • AVGBrowserUpdate.exe (PID: 2596)
    • Checks for external IP

      • AVGBrowser.exe (PID: 9212)
    • Likely accesses (executes) a file from the Public directory

      • AVGBrowser.exe (PID: 8476)
    • Starts CMD.EXE for commands execution

      • updater.exe (PID: 9072)
  • INFO

    • Application launched itself

      • msedge.exe (PID: 5616)
      • msedge.exe (PID: 10144)
    • Checks supported languages

      • identity_helper.exe (PID: 7520)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8088)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 8108)
      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8180)
      • clipgrab-3.9.11-portable.exe (PID: 7920)
      • clipgrab-3.9.11-portable.tmp (PID: 7876)
      • vc_redist.x86.exe (PID: 3732)
      • vc_redist.x86.exe (PID: 7396)
      • saBSI.exe (PID: 6344)
      • avg_secure_browser_setup.exe (PID: 8036)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 5616)
      • msedge.exe (PID: 2032)
    • Reads Environment values

      • identity_helper.exe (PID: 7520)
      • avg_secure_browser_setup.exe (PID: 8036)
    • Reads the computer name

      • identity_helper.exe (PID: 7520)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 8108)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • clipgrab-3.9.11-portable.tmp (PID: 7876)
      • vc_redist.x86.exe (PID: 7396)
      • saBSI.exe (PID: 6344)
    • Launching a file from the Downloads directory

      • msedge.exe (PID: 5616)
    • Create files in a temporary directory

      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8088)
      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8180)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • clipgrab-3.9.11-portable.exe (PID: 7920)
      • clipgrab-3.9.11-portable.tmp (PID: 7876)
      • vc_redist.x86.exe (PID: 7396)
      • avg_secure_browser_setup.exe (PID: 8036)
    • Process checks computer location settings

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 8108)
      • avg_secure_browser_setup.exe (PID: 8036)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
    • Reads the software policy settings

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • saBSI.exe (PID: 6344)
    • The sample compiled with english language support

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • clipgrab-3.9.11-portable.tmp (PID: 7876)
      • vc_redist.x86.exe (PID: 3732)
      • vc_redist.x86.exe (PID: 7396)
      • avg_secure_browser_setup.exe (PID: 8036)
      • saBSI.exe (PID: 6344)
      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
      • installer.exe (PID: 7476)
      • installer.exe (PID: 7900)
      • AVGBrowserInstaller.exe (PID: 6640)
      • setup.exe (PID: 7412)
    • Detects InnoSetup installer (YARA)

      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8180)
      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8088)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 8108)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
    • Reads the machine GUID from the registry

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • saBSI.exe (PID: 6344)
    • Compiled with Borland Delphi (YARA)

      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8088)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 8108)
      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • clipgrab-3.9.11-dotinstaller-4.exe (PID: 8180)
    • Checks proxy server information

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • saBSI.exe (PID: 6344)
    • The sample compiled with arabic language support

      • clipgrab-3.9.11-dotinstaller-4.tmp (PID: 7384)
      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
      • avg_secure_browser_setup.exe (PID: 8036)
    • Creates a software uninstall entry

      • clipgrab-3.9.11-portable.tmp (PID: 7876)
    • Creates files in the program directory

      • clipgrab-3.9.11-portable.tmp (PID: 7876)
      • saBSI.exe (PID: 6344)
    • Python executable

      • python.exe (PID: 7956)
      • python.exe (PID: 5908)
      • python.exe (PID: 1740)
      • python.exe (PID: 7664)
      • python.exe (PID: 7468)
      • python.exe (PID: 7340)
      • python.exe (PID: 7296)
      • python.exe (PID: 7480)
      • python.exe (PID: 2280)
      • python.exe (PID: 592)
      • python.exe (PID: 7712)
      • python.exe (PID: 7900)
      • python.exe (PID: 6492)
      • python.exe (PID: 1056)
      • python.exe (PID: 7512)
      • python.exe (PID: 4080)
      • python.exe (PID: 7936)
      • python.exe (PID: 7696)
      • python.exe (PID: 3540)
    • The sample compiled with german language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with Italian language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with french language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with korean language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with bulgarian language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with czech language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with Indonesian language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with polish language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with japanese language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with portuguese language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with russian language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with slovak language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with turkish language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with swedish language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
    • The sample compiled with chinese language support

      • AVGBrowserUpdateSetup.exe (PID: 7408)
      • AVGBrowserUpdate.exe (PID: 7176)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
354
Monitored processes
207
Malicious processes
9
Suspicious processes
10

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs clipgrab-3.9.11-dotinstaller-4.exe clipgrab-3.9.11-dotinstaller-4.tmp no specs clipgrab-3.9.11-dotinstaller-4.exe #BUNDLEINSTALLER clipgrab-3.9.11-dotinstaller-4.tmp clipgrab-3.9.11-portable.exe clipgrab-3.9.11-portable.tmp msedge.exe no specs msedge.exe no specs msedge.exe no specs vc_redist.x86.exe vc_redist.x86.exe sabsi.exe avg_secure_browser_setup.exe sabsi.exe clipgrab.exe ffmpeg.exe no specs conhost.exe no specs ffmpeg.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs werfault.exe python.exe no specs python.exe no specs conhost.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs avgbrowserupdatesetup.exe python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs avgbrowserupdate.exe qtwebengineprocess.exe no specs qtwebengineprocess.exe no specs qtwebengineprocess.exe no specs avgbrowserupdate.exe no specs installer.exe avgbrowserupdate.exe no specs avgbrowserupdatecomregistershell64.exe no specs avgbrowserupdatecomregistershell64.exe no specs avgbrowserupdatecomregistershell64.exe no specs avgbrowserupdate.exe avgbrowserupdate.exe no specs avgbrowserupdate.exe slui.exe installer.exe werfault.exe python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs python.exe no specs conhost.exe no specs qtwebengineprocess.exe no specs python.exe python.exe no specs conhost.exe no specs conhost.exe no specs avgbrowserinstaller.exe msedge.exe no specs python.exe no specs conhost.exe no specs msedge.exe no specs setup.exe setup.exe no specs qtwebengineprocess.exe no specs servicehost.exe msedge.exe no specs uihost.exe no specs avgbrowsercrashhandler.exe no specs avgbrowsercrashhandler64.exe no specs avgbrowser.exe no specs avgbrowser.exe avgbrowser.exe no specs avgbrowser.exe avgbrowser.exe no specs elevation_service.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe elevation_service.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs updater.exe avgbrowser.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs msedge.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs setup.exe no specs setup.exe no specs avgbrowser.exe no specs avgbrowser.exe avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe avgbrowser.exe no specs elevation_service.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowser.exe no specs avgbrowserprotect.exe avgbrowser.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
592"C:\Program Files (x86)\ClipGrab\python\python.exe" "" --versionC:\Program Files (x86)\ClipGrab\python\python.execlipgrab.exe
User:
admin
Company:
Python Software Foundation
Integrity Level:
HIGH
Description:
Python
Exit code:
1
Version:
3.13.0
Modules
Images
c:\program files (x86)\clipgrab\python\python.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ucrtbase.dll
620"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3612,i,15866005331586270062,12437335915492342019,262144 --variations-seed-version --mojo-platform-channel-handle=3664 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
856"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=2032,i,9083495843845845760,10621548770006223294,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:3C:\Program Files\AVG\Browser\Application\AVGBrowser.exe
AVGBrowser.exe
User:
admin
Company:
Gen Digital Inc.
Integrity Level:
MEDIUM
Description:
AVG Secure Browser
Exit code:
0
Version:
136.0.30453.115
Modules
Images
c:\program files\avg\browser\application\avgbrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\avg\browser\application\136.0.30453.115\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
1056"C:\Program Files (x86)\ClipGrab\python\python.exe" C:/Users/admin/AppData/Roaming/ClipGrab/ClipGrab/yt-dlp --versionC:\Program Files (x86)\ClipGrab\python\python.execlipgrab.exe
User:
admin
Company:
Python Software Foundation
Integrity Level:
HIGH
Description:
Python
Exit code:
0
Version:
3.13.0
Modules
Images
c:\program files (x86)\clipgrab\python\python.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ucrtbase.dll
1128"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4240,i,15866005331586270062,12437335915492342019,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1528"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=2120,i,18365825825328710415,344246177614873251,262144 --variations-seed-version --mojo-platform-channel-handle=3336 /prefetch:1C:\Program Files\AVG\Browser\Application\AVGBrowser.exeAVGBrowser.exe
User:
admin
Company:
Gen Digital Inc.
Integrity Level:
LOW
Description:
AVG Secure Browser
Exit code:
0
Version:
136.0.30453.115
Modules
Images
c:\program files\avg\browser\application\avgbrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\avg\browser\application\136.0.30453.115\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1740"C:\Program Files (x86)\ClipGrab\python\python.exe" "" --versionC:\Program Files (x86)\ClipGrab\python\python.execlipgrab.exe
User:
admin
Company:
Python Software Foundation
Integrity Level:
HIGH
Description:
Python
Exit code:
1
Version:
3.13.0
Modules
Images
c:\program files (x86)\clipgrab\python\python.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ucrtbase.dll
1760"C:\Program Files (x86)\ClipGrab\QtWebEngineProcess.exe" --type=renderer --no-sandbox --disable-gpu-memory-buffer-video-frames --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations --disable-features=MojoVideoCapture,SurfaceSynchronization,UseModernMediaControls,UseVideoCaptureApiForDevToolsSnapshots --disable-databases --disable-gpu-compositing --service-pipe-token=63293619640192393 --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=63293619640192393 --renderer-client-id=2 --mojo-platform-channel-handle=2416 /prefetch:1C:\Program Files (x86)\ClipGrab\QtWebEngineProcess.execlipgrab.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
HIGH
Description:
Qt Qtwebengineprocess
Exit code:
0
Version:
5.12.6.0
Modules
Images
c:\program files (x86)\clipgrab\qtwebengineprocess.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ucrtbase.dll
2028"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=2040,i,1660209755231742433,16111024535228564793,262144 --variations-seed-version --mojo-platform-channel-handle=4228 /prefetch:8C:\Program Files\AVG\Browser\Application\AVGBrowser.exeAVGBrowser.exe
User:
admin
Company:
Gen Digital Inc.
Integrity Level:
LOW
Description:
AVG Secure Browser
Exit code:
0
Version:
136.0.30453.115
Modules
Images
c:\program files\avg\browser\application\avgbrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\avg\browser\application\136.0.30453.115\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2032"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2272,i,15866005331586270062,12437335915492342019,262144 --variations-seed-version --mojo-platform-channel-handle=2588 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
79 956
Read events
78 353
Write events
1 500
Delete events
103

Modification events

(PID) Process:(5616) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5616) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5616) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5616) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\721710
Operation:writeName:WindowTabManagerFileMappingId
Value:
{6174233B-86D7-4F3E-BE4B-2B6E6FE9093E}
(PID) Process:(5616) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5616) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
D37F26A1CF952F00
(PID) Process:(5616) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\721710
Operation:writeName:WindowTabManagerFileMappingId
Value:
{5BEEEFD7-F52D-418D-B8C7-00CDA63BA34C}
(PID) Process:(5616) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
079737A1CF952F00
(PID) Process:(5616) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MicrosoftEdgeAutoLaunch_29EBC4579851B72EE312C449CF839B1A
Value:
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
(PID) Process:(5616) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\Commands\on-logon-autolaunch
Operation:writeName:Enabled
Value:
0
Executable files
338
Suspicious files
1 219
Text files
1 629
Unknown types
252

Dropped files

PID
Process
Filename
Type
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF176d21.TMP
MD5:
SHA256:
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF176d21.TMP
MD5:
SHA256:
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF176d31.TMP
MD5:
SHA256:
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF176d31.TMP
MD5:
SHA256:
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF176d40.TMP
MD5:
SHA256:
5616msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
164
DNS requests
162
Threats
28

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5328
SearchApp.exe
GET
200
23.51.98.7:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2032
msedge.exe
GET
200
150.171.28.11:80
http://edge.microsoft.com/browsernetworktime/time/1/current?cup2key=2:jEQ5IuAydiMLpZ3C82CIG12KZi1knE_sC3ss1DD3MWQ&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
unknown
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5616
msedge.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSdE3gf41WAic8Uh9lF92%2BIJqh5qwQUMuuSmv81lkgvKEBCcCA2kVwXheYCEGIdbQxSAZ47kHkVIIkhHAo%3D
unknown
whitelisted
3948
svchost.exe
GET
200
23.51.98.7:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5616
msedge.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBQVD%2BnGf79Hpedv3mhy6uKMVZkPCQQUDyrLIIcouOxvSK4rVKYpqhekzQwCEQDkRzNBwfQQWSPKLzwR4XbI
unknown
whitelisted
7804
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5616
msedge.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEEj8k7RgVZSNNqfJionWlBY%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7804
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6672
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5328
SearchApp.exe
104.126.37.144:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5328
SearchApp.exe
23.51.98.7:80
ocsp.digicert.com
Akamai International B.V.
US
whitelisted
2032
msedge.exe
150.171.28.11:80
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2032
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2032
msedge.exe
92.205.197.54:443
download.clipgrab.org
DE
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
www.bing.com
  • 104.126.37.144
  • 104.126.37.163
  • 104.126.37.130
  • 104.126.37.129
  • 104.126.37.153
  • 104.126.37.185
  • 104.126.37.170
  • 104.126.37.186
  • 104.126.37.123
  • 104.126.37.154
  • 104.126.37.155
  • 104.126.37.128
  • 104.126.37.137
  • 104.126.37.176
  • 104.126.37.152
  • 104.126.37.171
  • 104.126.37.178
  • 104.126.37.131
  • 104.126.37.136
whitelisted
ocsp.digicert.com
  • 23.51.98.7
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
download.clipgrab.org
  • 92.205.197.54
unknown
copilot.microsoft.com
  • 104.126.37.136
  • 104.126.37.169
whitelisted
update.googleapis.com
  • 216.58.206.35
whitelisted
clients2.googleusercontent.com
  • 142.250.186.97
whitelisted
edgeassetservice.azureedge.net
  • 13.107.253.45
whitelisted

Threats

PID
Process
Class
Message
2596
AVGBrowserUpdate.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
856
AVGBrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
856
AVGBrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
856
AVGBrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
856
AVGBrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
4560
AVGBrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
4560
AVGBrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
4560
AVGBrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
4560
AVGBrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
4560
AVGBrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Process
Message
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-KIL6D.tmp\prod0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-KIL6D.tmp\prod0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-KIL6D.tmp\prod0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-KIL6D.tmp\prod0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-KIL6D.tmp\prod0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-KIL6D.tmp\prod0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory