File name:

H2M+Launcher_0.12.0_...msi

Full analysis: https://app.any.run/tasks/eb9dcdb5-fec3-4a21-800c-d180f57115cf
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 20, 2024, 21:12:56
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
loader
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: H2M Launcher, Author: h2m, Keywords: Installer, Comments: This installer database contains the logic and data required to install H2M Launcher., Template: x64;0, Revision Number: {F1B947B5-A93B-4494-A1B2-21F82EB56DB3}, Create Time/Date: Tue Aug 13 15:41:42 2024, Last Saved Time/Date: Tue Aug 13 15:41:42 2024, Number of Pages: 450, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
MD5:

8D970001C7E13B7E3CC4FD3A025A1770

SHA1:

38C1252823985EB212E2A8BFDAED2DF2D555B67D

SHA256:

6659E4A6A0327DFA5D2580CA37B3E628FB4ADF9031C107E3209CAD1D9B29E711

SSDEEP:

98304:0U7xXeoD5s0NufVDmoYG4foCC9Z9V/153FM/kJmlZgEv0FPNIqNsyodi3e986VoK:xJ5sy+hBPHhxFRKSslHA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 6140)
    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 8)
    • Scans artifacts that could help determine the target

      • msedgewebview2.exe (PID: 6472)
    • The DLL Hijacking

      • msedgewebview2.exe (PID: 3552)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 6908)
      • msiexec.exe (PID: 7016)
      • powershell.exe (PID: 6140)
      • MicrosoftEdgeWebview2Setup.exe (PID: 1440)
      • MicrosoftEdgeUpdate.exe (PID: 8)
      • MicrosoftEdge_X64_127.0.2651.105.exe (PID: 3184)
      • setup.exe (PID: 6196)
      • msedgewebview2.exe (PID: 7116)
    • Executes as Windows Service

      • VSSVC.exe (PID: 6400)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 7016)
    • The process bypasses the loading of PowerShell profile settings

      • msiexec.exe (PID: 7016)
    • Request a resource from the Internet using PowerShell's cmdlet

      • msiexec.exe (PID: 7016)
    • Starts POWERSHELL.EXE for commands execution

      • msiexec.exe (PID: 7016)
    • Downloads file from URI

      • powershell.exe (PID: 6140)
    • Powershell scripting: start process

      • msiexec.exe (PID: 7016)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 6140)
    • Process drops legitimate windows executable

      • powershell.exe (PID: 6140)
      • MicrosoftEdgeWebview2Setup.exe (PID: 1440)
      • MicrosoftEdgeUpdate.exe (PID: 8)
      • svchost.exe (PID: 6516)
      • MicrosoftEdge_X64_127.0.2651.105.exe (PID: 3184)
      • setup.exe (PID: 6196)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 6140)
      • MicrosoftEdgeWebview2Setup.exe (PID: 1440)
      • MicrosoftEdgeUpdate.exe (PID: 8)
      • MicrosoftEdge_X64_127.0.2651.105.exe (PID: 3184)
      • setup.exe (PID: 6196)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 1440)
      • MicrosoftEdgeUpdate.exe (PID: 8)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 5088)
      • MicrosoftEdgeUpdate.exe (PID: 1568)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4076)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 3316)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 8)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 6516)
    • Reads security settings of Internet Explorer

      • MicrosoftEdgeUpdate.exe (PID: 7088)
      • MicrosoftEdgeUpdate.exe (PID: 8)
      • msiexec.exe (PID: 6336)
      • msedgewebview2.exe (PID: 6472)
    • Checks Windows Trust Settings

      • MicrosoftEdgeUpdate.exe (PID: 7088)
    • Reads the date of Windows installation

      • MicrosoftEdgeUpdate.exe (PID: 8)
      • msiexec.exe (PID: 6336)
    • Application launched itself

      • setup.exe (PID: 6196)
      • MicrosoftEdgeUpdate.exe (PID: 7088)
      • msedgewebview2.exe (PID: 6472)
    • Creates a software uninstall entry

      • setup.exe (PID: 6196)
    • Searches for installed software

      • setup.exe (PID: 6196)
      • msedgewebview2.exe (PID: 6472)
    • The process checks if it is being run in the virtual environment

      • H2M Launcher.exe (PID: 5288)
    • Connects to unusual port

      • H2M Launcher.exe (PID: 5288)
  • INFO

    • Reads the computer name

      • msiexec.exe (PID: 7016)
      • msiexec.exe (PID: 6336)
      • MicrosoftEdgeUpdate.exe (PID: 8)
      • MicrosoftEdgeUpdate.exe (PID: 1568)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 5088)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4076)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 3316)
      • MicrosoftEdgeUpdate.exe (PID: 6664)
      • MicrosoftEdge_X64_127.0.2651.105.exe (PID: 3184)
      • MicrosoftEdgeUpdate.exe (PID: 780)
      • MicrosoftEdgeUpdate.exe (PID: 7088)
      • setup.exe (PID: 6196)
      • MicrosoftEdgeUpdate.exe (PID: 5400)
      • H2M Launcher.exe (PID: 5288)
      • msedgewebview2.exe (PID: 6472)
      • msedgewebview2.exe (PID: 3552)
      • msedgewebview2.exe (PID: 3548)
      • msedgewebview2.exe (PID: 2892)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6908)
      • msiexec.exe (PID: 7016)
    • Checks supported languages

      • msiexec.exe (PID: 7016)
      • msiexec.exe (PID: 6336)
      • MicrosoftEdgeWebview2Setup.exe (PID: 1440)
      • MicrosoftEdgeUpdate.exe (PID: 8)
      • MicrosoftEdgeUpdate.exe (PID: 1568)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 5088)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 3316)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4076)
      • MicrosoftEdgeUpdate.exe (PID: 7088)
      • MicrosoftEdgeUpdate.exe (PID: 6664)
      • MicrosoftEdgeUpdate.exe (PID: 780)
      • MicrosoftEdge_X64_127.0.2651.105.exe (PID: 3184)
      • setup.exe (PID: 6196)
      • setup.exe (PID: 2340)
      • H2M Launcher.exe (PID: 5288)
      • MicrosoftEdgeUpdate.exe (PID: 5400)
      • msedgewebview2.exe (PID: 6472)
      • msedgewebview2.exe (PID: 6688)
      • msedgewebview2.exe (PID: 3552)
      • msedgewebview2.exe (PID: 3548)
      • msedgewebview2.exe (PID: 6756)
      • msedgewebview2.exe (PID: 1072)
      • msedgewebview2.exe (PID: 7116)
      • msedgewebview2.exe (PID: 4048)
      • msedgewebview2.exe (PID: 2892)
      • msedgewebview2.exe (PID: 6532)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 7016)
    • Disables trace logs

      • powershell.exe (PID: 6140)
    • Checks proxy server information

      • powershell.exe (PID: 6140)
      • MicrosoftEdgeUpdate.exe (PID: 7088)
      • MicrosoftEdgeUpdate.exe (PID: 6664)
      • MicrosoftEdgeUpdate.exe (PID: 5400)
      • H2M Launcher.exe (PID: 5288)
      • msedgewebview2.exe (PID: 6472)
    • The executable file from the user directory is run by the Powershell process

      • MicrosoftEdgeWebview2Setup.exe (PID: 1440)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 8)
      • MicrosoftEdgeUpdate.exe (PID: 7088)
      • setup.exe (PID: 2340)
      • setup.exe (PID: 6196)
      • MicrosoftEdge_X64_127.0.2651.105.exe (PID: 3184)
      • msedgewebview2.exe (PID: 6472)
      • msedgewebview2.exe (PID: 6688)
      • msedgewebview2.exe (PID: 3548)
      • msedgewebview2.exe (PID: 2892)
    • Create files in a temporary directory

      • MicrosoftEdgeWebview2Setup.exe (PID: 1440)
      • MicrosoftEdgeUpdate.exe (PID: 8)
      • svchost.exe (PID: 6516)
      • msedgewebview2.exe (PID: 6472)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 6664)
      • MicrosoftEdgeUpdate.exe (PID: 5400)
      • H2M Launcher.exe (PID: 5288)
      • msedgewebview2.exe (PID: 6472)
    • Reads the software policy settings

      • MicrosoftEdgeUpdate.exe (PID: 6664)
      • MicrosoftEdgeUpdate.exe (PID: 7088)
      • MicrosoftEdgeUpdate.exe (PID: 5400)
    • Reads the machine GUID from the registry

      • MicrosoftEdgeUpdate.exe (PID: 7088)
      • msedgewebview2.exe (PID: 6472)
      • msedgewebview2.exe (PID: 2892)
    • Process checks computer location settings

      • MicrosoftEdgeUpdate.exe (PID: 8)
      • setup.exe (PID: 6196)
      • msiexec.exe (PID: 6336)
      • msedgewebview2.exe (PID: 6472)
      • msedgewebview2.exe (PID: 1072)
    • Reads product name

      • H2M Launcher.exe (PID: 5288)
    • Reads Microsoft Office registry keys

      • msedgewebview2.exe (PID: 6472)
    • Dropped object may contain TOR URL's

      • msedgewebview2.exe (PID: 7116)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: H2M Launcher
Author: h2m
Keywords: Installer
Comments: This installer database contains the logic and data required to install H2M Launcher.
Template: x64;0
RevisionNumber: {F1B947B5-A93B-4494-A1B2-21F82EB56DB3}
CreateDate: 2024:08:13 15:41:42
ModifyDate: 2024:08:13 15:41:42
Pages: 450
Words: 2
Software: Windows Installer XML Toolset (3.11.2.4516)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
165
Monitored processes
33
Malicious processes
11
Suspicious processes
1

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs microsoftedgewebview2setup.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe svchost.exe microsoftedge_x64_127.0.2651.105.exe setup.exe setup.exe no specs microsoftedgeupdate.exe h2m launcher.exe msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
8C:\Users\admin\AppData\Local\Temp\EU82B5.tmp\MicrosoftEdgeUpdate.exe /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"C:\Users\admin\AppData\Local\Temp\EU82B5.tmp\MicrosoftEdgeUpdate.exe
MicrosoftEdgeWebview2Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.195.15
Modules
Images
c:\users\admin\appdata\local\temp\eu82b5.tmp\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ole32.dll
c:\windows\syswow64\ucrtbase.dll
780"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=false" /installsource otherinstallcmd /sessionid "{ABC5701F-4DED-45C4-8C09-ACFDA36AF996}" /silentC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.195.15
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ole32.dll
c:\windows\syswow64\ucrtbase.dll
1072"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\127.0.2651.105\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\app.h2m.lierrmm\EBWebView" --webview-exe-name="H2M Launcher.exe" --webview-exe-version=0.12.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=2952,i,95955786544454351,9880821220386414473,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=3408 /prefetch:1C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\127.0.2651.105\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Version:
127.0.2651.105
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\127.0.2651.105\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\127.0.2651.105\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1440"C:\Users\admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe" /silent /install C:\Users\admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update Setup
Exit code:
0
Version:
1.3.195.15
Modules
Images
c:\users\admin\appdata\local\temp\microsoftedgewebview2setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1568"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserverC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.195.15
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ole32.dll
c:\windows\syswow64\ucrtbase.dll
2092\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2340C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{E2920BB2-2EF5-4C11-BF85-0817032275CB}\EDGEMITMP_2CE05.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.120 --annotation=exe=C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{E2920BB2-2EF5-4C11-BF85-0817032275CB}\EDGEMITMP_2CE05.tmp\setup.exe --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.105 --initial-client-data=0x25c,0x260,0x264,0x238,0x268,0x7ff6f8e2b7d0,0x7ff6f8e2b7dc,0x7ff6f8e2b7e8C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{E2920BB2-2EF5-4C11-BF85-0817032275CB}\EDGEMITMP_2CE05.tmp\setup.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
127.0.2651.105
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{e2920bb2-2ef5-4c11-bf85-0817032275cb}\edgemitmp_2ce05.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2892"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\127.0.2651.105\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\app.h2m.lierrmm\EBWebView" --webview-exe-name="H2M Launcher.exe" --webview-exe-version=0.12.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4580,i,95955786544454351,9880821220386414473,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=772 /prefetch:8C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\127.0.2651.105\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
127.0.2651.105
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\127.0.2651.105\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\127.0.2651.105\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3184"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{E2920BB2-2EF5-4C11-BF85-0817032275CB}\MicrosoftEdge_X64_127.0.2651.105.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --user-levelC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{E2920BB2-2EF5-4C11-BF85-0817032275CB}\MicrosoftEdge_X64_127.0.2651.105.exe
MicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
127.0.2651.105
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{e2920bb2-2ef5-4c11-bf85-0817032275cb}\microsoftedge_x64_127.0.2651.105.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
3316"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe" /user C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update COM Registration Helper
Exit code:
0
Version:
1.3.195.15
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\1.3.195.15\microsoftedgeupdatecomregistershell64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
38 307
Read events
34 215
Write events
4 005
Delete events
87

Modification events

(PID) Process:(7016) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4800000000000000341456C745F3DA01681B0000D8180000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7016) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000341456C745F3DA01681B0000D8180000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7016) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
480000000000000075C1A4C745F3DA01681B0000D8180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7016) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
480000000000000075C1A4C745F3DA01681B0000D8180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7016) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000598EA9C745F3DA01681B0000D8180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7016) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
480000000000000084F2ABC745F3DA01681B0000D8180000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7016) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(7016) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000E86E31C845F3DA01681B0000D8180000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7016) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
480000000000000010D333C845F3DA01681B0000C41A0000E80300000100000000000000000000001E1521F402455743B466F000855672B200000000000000000000000000000000
(PID) Process:(6400) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000742C42C845F3DA01001900006C1A0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
207
Suspicious files
151
Text files
44
Unknown types
23

Dropped files

PID
Process
Filename
Type
7016msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
7016msiexec.exeC:\Windows\Installer\125c9f.msi
MD5:
SHA256:
7016msiexec.exeC:\Windows\Installer\125ca1.msi
MD5:
SHA256:
7016msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:3E2C064A088B07EEF92876830AF307DB
SHA256:F58974E3278B81EEB582B593EB1A2F8D12F2DECAC2EFA041E09B0CEE5BAC28DB
7016msiexec.exeC:\Windows\Temp\~DF16C09FC1282B3807.TMPbinary
MD5:72F9ACA556F4F2CB754CB3ED6C9A5341
SHA256:EA31348E69756394B098A2B8B672F5A5B0817315EE8452C83E9110126F665311
6908msiexec.exeC:\Users\admin\AppData\Local\Temp\MSICD9.tmpexecutable
MD5:4FDD16752561CF585FED1506914D73E0
SHA256:AECD2D2FE766F6D439ACC2BBF1346930ECC535012CF5AD7B3273D2875237B7E7
7016msiexec.exeC:\Program Files\H2M Launcher\H2M Launcher.exeexecutable
MD5:DE148BA4E3C67336DBEE582C1B68DD70
SHA256:16504570DCDA898C8AA2E01CDE8F3F262A189B9B2C5594EF260C54786AFC3CDB
7016msiexec.exeC:\Windows\Installer\inprogressinstallinfo.ipibinary
MD5:72F9ACA556F4F2CB754CB3ED6C9A5341
SHA256:EA31348E69756394B098A2B8B672F5A5B0817315EE8452C83E9110126F665311
7016msiexec.exeC:\ProgramData\Microsoft\Windows\Start Menu\Programs\H2M Launcher\H2M Launcher.lnk~RF12652a.TMPlnk
MD5:51198F52A85D8A79BD05ABF2885E74C8
SHA256:F785D7CCB5997D53739A2C375E923A9C74A2F798F10DDE65B5A84A7C7A56F580
7016msiexec.exeC:\Windows\Temp\~DFD370BD1E0150D36E.TMPgmc
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
49
DNS requests
30
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4056
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7104
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6516
svchost.exe
HEAD
200
2.19.126.157:80
http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/8b0b3233-daaf-48b9-aa04-b34ba9e42980?P1=1724793231&P2=404&P3=2&P4=Sh71myqGt6urMefssg7vgwUBZUAjtkWjZGdf3DvIxgqZpb1SiyZdpuZ%2fndArZpJt06A6rB7HqNyIStGXKw2CGg%3d%3d
unknown
whitelisted
6516
svchost.exe
GET
200
2.19.126.157:80
http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/8b0b3233-daaf-48b9-aa04-b34ba9e42980?P1=1724793231&P2=404&P3=2&P4=Sh71myqGt6urMefssg7vgwUBZUAjtkWjZGdf3DvIxgqZpb1SiyZdpuZ%2fndArZpJt06A6rB7HqNyIStGXKw2CGg%3d%3d
unknown
whitelisted
6516
svchost.exe
HEAD
200
23.48.23.66:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/84b6cf48-0afe-4ab7-b9e3-6ef9c6b7edd4?P1=1724632969&P2=404&P3=2&P4=CP1DNqYqboejRsp98X4AidqZTXiEIf9G9LF1s%2boDaFe1J11UzfLgfkSKcvzYtXYbuPpnIZXTvghgaddaMVJKiA%3d%3d
unknown
whitelisted
1608
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6516
svchost.exe
GET
206
23.48.23.66:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/84b6cf48-0afe-4ab7-b9e3-6ef9c6b7edd4?P1=1724632969&P2=404&P3=2&P4=CP1DNqYqboejRsp98X4AidqZTXiEIf9G9LF1s%2boDaFe1J11UzfLgfkSKcvzYtXYbuPpnIZXTvghgaddaMVJKiA%3d%3d
unknown
whitelisted
6516
svchost.exe
GET
206
23.48.23.66:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/84b6cf48-0afe-4ab7-b9e3-6ef9c6b7edd4?P1=1724632969&P2=404&P3=2&P4=CP1DNqYqboejRsp98X4AidqZTXiEIf9G9LF1s%2boDaFe1J11UzfLgfkSKcvzYtXYbuPpnIZXTvghgaddaMVJKiA%3d%3d
unknown
whitelisted
6516
svchost.exe
GET
206
23.48.23.66:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/84b6cf48-0afe-4ab7-b9e3-6ef9c6b7edd4?P1=1724632969&P2=404&P3=2&P4=CP1DNqYqboejRsp98X4AidqZTXiEIf9G9LF1s%2boDaFe1J11UzfLgfkSKcvzYtXYbuPpnIZXTvghgaddaMVJKiA%3d%3d
unknown
whitelisted
6516
svchost.exe
GET
206
23.48.23.66:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/84b6cf48-0afe-4ab7-b9e3-6ef9c6b7edd4?P1=1724632969&P2=404&P3=2&P4=CP1DNqYqboejRsp98X4AidqZTXiEIf9G9LF1s%2boDaFe1J11UzfLgfkSKcvzYtXYbuPpnIZXTvghgaddaMVJKiA%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3308
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.168.100.255:138
whitelisted
5464
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3888
svchost.exe
239.255.255.250:1900
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4056
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4056
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
7104
backgroundTaskHost.exe
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
7104
backgroundTaskHost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 172.217.16.206
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.20
  • 40.126.32.136
  • 40.126.32.133
  • 40.126.32.140
  • 20.190.160.14
  • 40.126.32.72
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted

Threats

PID
Process
Class
Message
6516
svchost.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
msedgewebview2.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\app.h2m.lierrmm directory exists )