URL:

https://getfilenow.com/lp?id=Oxygen%20U%20Executor_58385253&t=ZV5ZUWddQExHWw==

Full analysis: https://app.any.run/tasks/8b29ca16-440f-406a-bf7d-9f9d726a031a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 13, 2025, 22:40:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
generic
loader
github
Indicators:
MD5:

5FCE9ADAEF04A661354AE105669B27D9

SHA1:

E5086869D900EB5F0D8799A7A9631F04D85C775E

SHA256:

61DBDE28BDBE6AB90A2C72695882E7E40FC0A9C9CA5F51CB54B7E5D4D8EBF3AE

SSDEEP:

3:N8hOAtRaAHdsLyaAadwKwIR1hjdtuY:20ICLya6GvhjvuY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • msedge.exe (PID: 3020)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Oxygen U Executor_58385253.exe (PID: 3304)
      • OxygenU_Bootstrapper.exe (PID: 7744)
      • OxygenUI.exe (PID: 6228)
      • OxygenUI.exe (PID: 6656)
    • Start notepad (likely ransomware note)

      • Oxygen U Executor_58385253.exe (PID: 3304)
    • There is functionality for taking screenshot (YARA)

      • Oxygen U Executor_58385253.exe (PID: 3304)
    • Potential Corporate Privacy Violation

      • msedge.exe (PID: 7396)
    • Reads the date of Windows installation

      • OxygenU_Bootstrapper.exe (PID: 7744)
    • Executable content was dropped or overwritten

      • OxygenU_Bootstrapper.exe (PID: 7744)
    • Process drops legitimate windows executable

      • OxygenU_Bootstrapper.exe (PID: 7744)
    • The process checks if it is being run in the virtual environment

      • OxygenUI.exe (PID: 6228)
      • OxygenUI.exe (PID: 6656)
    • Executes as Windows Service

      • VSSVC.exe (PID: 8648)
  • INFO

    • Application launched itself

      • msedge.exe (PID: 3020)
    • Reads Environment values

      • identity_helper.exe (PID: 4696)
      • OxygenUI.exe (PID: 6228)
      • OxygenUI.exe (PID: 6656)
    • Checks supported languages

      • identity_helper.exe (PID: 4696)
      • Oxygen U Executor_58385253.exe (PID: 3304)
      • OxygenUI.exe (PID: 6228)
      • OxygenU_Bootstrapper.exe (PID: 7744)
      • CefSharp.BrowserSubprocess.exe (PID: 3884)
      • CefSharp.BrowserSubprocess.exe (PID: 6072)
      • CefSharp.BrowserSubprocess.exe (PID: 924)
      • OxygenUI.exe (PID: 6656)
      • CefSharp.BrowserSubprocess.exe (PID: 7984)
      • CefSharp.BrowserSubprocess.exe (PID: 5044)
      • CefSharp.BrowserSubprocess.exe (PID: 3012)
      • CefSharp.BrowserSubprocess.exe (PID: 7480)
      • CefSharp.BrowserSubprocess.exe (PID: 6676)
      • CefSharp.BrowserSubprocess.exe (PID: 3620)
      • CefSharp.BrowserSubprocess.exe (PID: 6248)
      • CefSharp.BrowserSubprocess.exe (PID: 736)
      • msiexec.exe (PID: 8488)
      • msiexec.exe (PID: 8588)
      • CefSharp.BrowserSubprocess.exe (PID: 8836)
      • CefSharp.BrowserSubprocess.exe (PID: 4336)
      • CefSharp.BrowserSubprocess.exe (PID: 8156)
    • Reads the computer name

      • identity_helper.exe (PID: 4696)
      • Oxygen U Executor_58385253.exe (PID: 3304)
      • OxygenU_Bootstrapper.exe (PID: 7744)
      • OxygenUI.exe (PID: 6228)
      • CefSharp.BrowserSubprocess.exe (PID: 4336)
      • CefSharp.BrowserSubprocess.exe (PID: 8156)
      • CefSharp.BrowserSubprocess.exe (PID: 3884)
      • CefSharp.BrowserSubprocess.exe (PID: 924)
      • CefSharp.BrowserSubprocess.exe (PID: 6072)
      • CefSharp.BrowserSubprocess.exe (PID: 7984)
      • OxygenUI.exe (PID: 6656)
      • CefSharp.BrowserSubprocess.exe (PID: 3620)
      • CefSharp.BrowserSubprocess.exe (PID: 5044)
      • CefSharp.BrowserSubprocess.exe (PID: 3012)
      • CefSharp.BrowserSubprocess.exe (PID: 7480)
      • CefSharp.BrowserSubprocess.exe (PID: 6676)
      • msiexec.exe (PID: 8488)
      • CefSharp.BrowserSubprocess.exe (PID: 736)
      • CefSharp.BrowserSubprocess.exe (PID: 6248)
      • msiexec.exe (PID: 8588)
      • CefSharp.BrowserSubprocess.exe (PID: 8836)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 3020)
      • msiexec.exe (PID: 8448)
    • The sample compiled with english language support

      • msedge.exe (PID: 3020)
      • OxygenU_Bootstrapper.exe (PID: 7744)
    • Reads the machine GUID from the registry

      • Oxygen U Executor_58385253.exe (PID: 3304)
      • OxygenUI.exe (PID: 6228)
      • CefSharp.BrowserSubprocess.exe (PID: 4336)
      • CefSharp.BrowserSubprocess.exe (PID: 924)
      • CefSharp.BrowserSubprocess.exe (PID: 8156)
      • CefSharp.BrowserSubprocess.exe (PID: 3884)
      • CefSharp.BrowserSubprocess.exe (PID: 6072)
      • CefSharp.BrowserSubprocess.exe (PID: 7984)
      • OxygenUI.exe (PID: 6656)
      • CefSharp.BrowserSubprocess.exe (PID: 5044)
      • CefSharp.BrowserSubprocess.exe (PID: 3620)
      • CefSharp.BrowserSubprocess.exe (PID: 3012)
      • CefSharp.BrowserSubprocess.exe (PID: 7480)
      • CefSharp.BrowserSubprocess.exe (PID: 6676)
      • CefSharp.BrowserSubprocess.exe (PID: 736)
      • CefSharp.BrowserSubprocess.exe (PID: 6248)
      • CefSharp.BrowserSubprocess.exe (PID: 8836)
    • Checks proxy server information

      • Oxygen U Executor_58385253.exe (PID: 3304)
      • OxygenU_Bootstrapper.exe (PID: 7744)
      • OxygenUI.exe (PID: 6228)
      • slui.exe (PID: 7900)
      • OxygenUI.exe (PID: 6656)
    • Reads the software policy settings

      • Oxygen U Executor_58385253.exe (PID: 3304)
      • OxygenU_Bootstrapper.exe (PID: 7744)
      • OxygenUI.exe (PID: 6228)
      • slui.exe (PID: 1020)
      • slui.exe (PID: 7900)
      • OxygenUI.exe (PID: 6656)
    • Process checks computer location settings

      • Oxygen U Executor_58385253.exe (PID: 3304)
      • OxygenU_Bootstrapper.exe (PID: 7744)
      • OxygenUI.exe (PID: 6228)
      • CefSharp.BrowserSubprocess.exe (PID: 3884)
      • CefSharp.BrowserSubprocess.exe (PID: 924)
      • CefSharp.BrowserSubprocess.exe (PID: 6072)
      • OxygenUI.exe (PID: 6656)
      • CefSharp.BrowserSubprocess.exe (PID: 3012)
      • CefSharp.BrowserSubprocess.exe (PID: 6676)
      • CefSharp.BrowserSubprocess.exe (PID: 7480)
    • Creates files or folders in the user directory

      • Oxygen U Executor_58385253.exe (PID: 3304)
      • OxygenUI.exe (PID: 6228)
      • CefSharp.BrowserSubprocess.exe (PID: 8156)
      • OxygenUI.exe (PID: 6656)
      • CefSharp.BrowserSubprocess.exe (PID: 5044)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 1096)
    • Creates files in the program directory

      • OxygenU_Bootstrapper.exe (PID: 7744)
    • Disables trace logs

      • OxygenUI.exe (PID: 6228)
      • OxygenUI.exe (PID: 6656)
    • Create files in a temporary directory

      • OxygenUI.exe (PID: 6228)
      • OxygenUI.exe (PID: 6656)
    • Manual execution by a user

      • OxygenUI.exe (PID: 6656)
      • notepad++.exe (PID: 8004)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 3020)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
234
Monitored processes
95
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start #GENERIC msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs oxygen u executor_58385253.exe no specs oxygen u executor_58385253.exe msedge.exe no specs msedge.exe no specs notepad.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs oxygenu_bootstrapper.exe conhost.exe no specs msedge.exe no specs msedge.exe no specs slui.exe msedge.exe no specs oxygenui.exe msedge.exe no specs cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs notepad++.exe no specs msedge.exe no specs msedge.exe no specs oxygenui.exe cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cefsharp.browsersubprocess.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msiexec.exe msiexec.exe no specs msedge.exe no specs msiexec.exe no specs vssvc.exe no specs cefsharp.browsersubprocess.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
644"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6088 --field-trial-handle=2336,i,16836427253497448217,13105719389823630554,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
736"C:\Users\admin\Downloads\OxygenU\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\admin\AppData\Local\CEF\User Data" --log-severity=disable --cefsharpexitsub --field-trial-handle=5708,i,11575937953482321581,633695745794471027,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6624 --mojo-platform-channel-handle=6620 /prefetch:8 --host-process-id=6656C:\Users\admin\Downloads\OxygenU\CefSharp.BrowserSubprocess.exeOxygenUI.exe
User:
admin
Company:
The CefSharp Authors
Integrity Level:
MEDIUM
Description:
CefSharp.BrowserSubprocess
Exit code:
0
Version:
129.0.110.0
Modules
Images
c:\users\admin\downloads\oxygenu\cefsharp.browsersubprocess.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
924"C:\Users\admin\Downloads\OxygenU\CefSharp.BrowserSubprocess.exe" --type=renderer --string-annotations=is-enterprise-managed=no --start-stack-profiler --user-data-dir="C:\Users\admin\AppData\Local\CEF\User Data" --log-severity=disable --cefsharpexitsub --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=5452,i,8395838066097979340,12443356023808558644,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=5428 --mojo-platform-channel-handle=5456 --host-process-id=6228 /prefetch:1C:\Users\admin\Downloads\OxygenU\CefSharp.BrowserSubprocess.exeOxygenUI.exe
User:
admin
Company:
The CefSharp Authors
Integrity Level:
MEDIUM
Description:
CefSharp.BrowserSubprocess
Exit code:
0
Version:
129.0.110.0
Modules
Images
c:\users\admin\downloads\oxygenu\cefsharp.browsersubprocess.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1020"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1096"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\link.txtC:\Windows\SysWOW64\notepad.exeOxygen U Executor_58385253.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
1184"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7276 --field-trial-handle=2336,i,16836427253497448217,13105719389823630554,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1184"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7628 --field-trial-handle=2336,i,16836427253497448217,13105719389823630554,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1240"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5152 --field-trial-handle=2336,i,16836427253497448217,13105719389823630554,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1348"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=7752 --field-trial-handle=2336,i,16836427253497448217,13105719389823630554,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1664"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=56 --mojo-platform-channel-handle=3944 --field-trial-handle=2336,i,16836427253497448217,13105719389823630554,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
22 631
Read events
22 490
Write events
130
Delete events
11

Modification events

(PID) Process:(3020) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3020) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3020) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3020) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3020) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
69B49CE646912F00
(PID) Process:(3020) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
D996A9E646912F00
(PID) Process:(3020) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197234
Operation:writeName:WindowTabManagerFileMappingId
Value:
{BB4E7BD7-96FC-4C9E-9699-3942B2CC3BAC}
(PID) Process:(3020) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197234
Operation:writeName:WindowTabManagerFileMappingId
Value:
{1BBA72B5-0EF3-4A4F-8B6C-FB2A06F779D0}
(PID) Process:(3020) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197234
Operation:writeName:WindowTabManagerFileMappingId
Value:
{50BB6BBB-6795-4913-AFE8-CDCB6ECA150A}
(PID) Process:(3020) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
AEB5FAE646912F00
Executable files
76
Suspicious files
1 095
Text files
215
Unknown types
0

Dropped files

PID
Process
Filename
Type
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10bc5c.TMP
MD5:
SHA256:
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10bc5c.TMP
MD5:
SHA256:
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10bc5c.TMP
MD5:
SHA256:
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10bc7c.TMP
MD5:
SHA256:
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10bc8b.TMP
MD5:
SHA256:
3020msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
64
TCP/UDP connections
187
DNS requests
241
Threats
35

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3304
Oxygen U Executor_58385253.exe
GET
200
142.250.186.35:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
3304
Oxygen U Executor_58385253.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
3304
Oxygen U Executor_58385253.exe
GET
200
142.250.186.35:80
http://o.pki.goog/s/wr3/mV0/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBQSq0i5t2Pafi2Gw9uzwnc7KTctWgQUx4H1%2FY6I2QA8TWOiUDEkoM4j%2FiMCEQCZXRxDEgK4oBBPRElcaU8c
unknown
whitelisted
3304
Oxygen U Executor_58385253.exe
GET
200
142.250.186.35:80
http://o.pki.goog/s/wr3/Vdw/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQSq0i5t2Pafi2Gw9uzwnc7KTctWgQUx4H1%2FY6I2QA8TWOiUDEkoM4j%2FiMCEFXcf42tINpLCbnQS8S2feE%3D
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3304
Oxygen U Executor_58385253.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
3304
Oxygen U Executor_58385253.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
3304
Oxygen U Executor_58385253.exe
GET
200
18.66.145.213:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkzUBtJnwJkc3SmanzgxeYU%3D
unknown
whitelisted
3304
Oxygen U Executor_58385253.exe
POST
200
165.193.78.234:80
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=0
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3020
msedge.exe
239.255.255.250:1900
whitelisted
7396
msedge.exe
104.21.48.1:443
getfilenow.com
malicious
7396
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7396
msedge.exe
150.171.27.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7396
msedge.exe
13.107.246.45:443
edge-mobile-static.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7396
msedge.exe
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
google.com
  • 216.58.206.46
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
getfilenow.com
  • 104.21.48.1
  • 104.21.112.1
  • 104.21.64.1
  • 104.21.80.1
  • 104.21.16.1
  • 104.21.32.1
  • 104.21.96.1
unknown
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
bzib.nelreports.net
  • 23.53.40.8
  • 23.53.40.56
whitelisted
www.bing.com
  • 2.16.204.161
  • 2.16.204.141
whitelisted

Threats

PID
Process
Class
Message
7396
msedge.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
7396
msedge.exe
Misc activity
ET INFO EXE - Served Attached HTTP
7396
msedge.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
7396
msedge.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
7396
msedge.exe
Misc activity
SUSPICIOUS [ANY.RUN] Tracking Service (.popin .cc)
7396
msedge.exe
Misc activity
SUSPICIOUS [ANY.RUN] Tracking Service (.popin .cc)
7396
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
7396
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
8156
CefSharp.BrowserSubprocess.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info