File name:

RajaWareElite_1.0.0_x64-setup.exe

Full analysis: https://app.any.run/tasks/66b7899e-79f8-4e19-9f9a-c4cf86d82ccf
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 05, 2026, 18:00:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
auto-reg
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

C851CCA3732CB8BA91C5CC4F4DA4EFE2

SHA1:

81B3BB5A062D4283045357A8F3E2712971D1E654

SHA256:

66AA19AA0FA49186FAC4F9D8D47C2CCA24590417683F661776C3E1299462B07C

SSDEEP:

393216:s9KlSee9YmBY1yQbJpfNuEi15vY811k8SlWQ5uZSbogqmN0jq:3feBBcyQbJd0bjPEuZooK0W

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 7924)
    • Potential DLL hijacking behavior detected

      • msedgewebview2.exe (PID: 7952)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
    • The process creates files with name similar to system file names

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
    • Searches for installed software

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • setup.exe (PID: 7488)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
    • Process drops legitimate windows executable

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • rajaware-api.exe (PID: 6872)
    • Executable content was dropped or overwritten

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • rajaware-api.exe (PID: 6872)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 7924)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8000)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8028)
      • MicrosoftEdgeUpdate.exe (PID: 7948)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7972)
    • Reads security settings of Internet Explorer

      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • msedgewebview2.exe (PID: 7728)
    • There is functionality for taking screenshot (YARA)

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
    • Application launched itself

      • setup.exe (PID: 7488)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • msedgewebview2.exe (PID: 7728)
      • rajaware-api.exe (PID: 6872)
    • Process drops python dynamic module

      • rajaware-api.exe (PID: 6872)
    • The process drops C-runtime libraries

      • rajaware-api.exe (PID: 6872)
    • Drops a system driver (possible attempt to evade defenses)

      • rajaware-api.exe (PID: 6872)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 8064)
      • cmd.exe (PID: 7944)
    • Starts CMD.EXE for commands execution

      • rajaware-api.exe (PID: 2688)
    • Loads Python modules

      • rajaware-api.exe (PID: 2688)
  • INFO

    • Checks supported languages

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • MicrosoftEdgeUpdate.exe (PID: 7948)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7972)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8000)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8028)
      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 8124)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • MicrosoftEdgeUpdate.exe (PID: 1164)
      • MicrosoftEdgeUpdateCore.exe (PID: 7408)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • setup.exe (PID: 5180)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • RajaWareElite.exe (PID: 2624)
      • msedgewebview2.exe (PID: 7728)
      • msedgewebview2.exe (PID: 7792)
      • msedgewebview2.exe (PID: 8096)
      • msedgewebview2.exe (PID: 7952)
      • rajaware-api.exe (PID: 6872)
      • msedgewebview2.exe (PID: 2364)
      • msedgewebview2.exe (PID: 6404)
      • msedgewebview2.exe (PID: 948)
      • rajaware-api.exe (PID: 2688)
    • The sample compiled with english language support

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • rajaware-api.exe (PID: 6872)
    • Reads the computer name

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8000)
      • MicrosoftEdgeUpdate.exe (PID: 7948)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7972)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8028)
      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 8124)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • MicrosoftEdgeUpdateCore.exe (PID: 7408)
      • MicrosoftEdgeUpdate.exe (PID: 1164)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • RajaWareElite.exe (PID: 2624)
      • msedgewebview2.exe (PID: 7728)
      • msedgewebview2.exe (PID: 7952)
      • msedgewebview2.exe (PID: 8096)
      • rajaware-api.exe (PID: 6872)
      • rajaware-api.exe (PID: 2688)
    • Checks proxy server information

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • msedgewebview2.exe (PID: 7728)
      • rajaware-api.exe (PID: 2688)
      • slui.exe (PID: 6916)
    • Create files in a temporary directory

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • msedgewebview2.exe (PID: 7728)
      • rajaware-api.exe (PID: 6872)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • setup.exe (PID: 5180)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • msedgewebview2.exe (PID: 7728)
      • msedgewebview2.exe (PID: 7792)
      • msedgewebview2.exe (PID: 8096)
    • Launching a file from a Registry key

      • MicrosoftEdgeUpdate.exe (PID: 7924)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • msedgewebview2.exe (PID: 7728)
    • Process checks computer location settings

      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • setup.exe (PID: 7488)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • msedgewebview2.exe (PID: 7728)
      • msedgewebview2.exe (PID: 2364)
      • msedgewebview2.exe (PID: 948)
    • Reads the machine GUID from the registry

      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • msedgewebview2.exe (PID: 7728)
    • Manual execution by a user

      • MicrosoftEdgeUpdateCore.exe (PID: 7408)
      • RajaWareElite.exe (PID: 4540)
    • Creates a software uninstall entry

      • setup.exe (PID: 7488)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
    • Reads CPU info

      • msedgewebview2.exe (PID: 7728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:08 23:05:20+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 139776
UninitializedDataSize: 2048
EntryPoint: 0x369f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: RajaWare Elite
FileVersion: 1.0.0
LegalCopyright: -
ProductName: RajaWare Elite
ProductVersion: 1.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
172
Monitored processes
35
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start rajawareelite_1.0.0_x64-setup.exe microsoftedgewebview2setup.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe microsoftedgeupdatecore.exe no specs microsoftedgeupdate.exe no specs slui.exe microsoftedge_x64_143.0.3650.96.exe setup.exe setup.exe no specs microsoftedgeupdate.exe rajawareelite.exe no specs rajawareelite.exe no specs rajawareelite.exe msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs rajaware-api.exe rajaware-api.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
948"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.rajaware.elite\EBWebView" --webview-exe-name=RajaWareElite.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --dma-cps-flags=0 --force-high-res-timeticks=disabled --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--expose-gc --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=6 --skip-read-main-dll --metrics-shmem-handle=3896,i,251473566407430406,11622761644356149781,2097152 --field-trial-handle=1856,i,10548227512180424239,10704815990677995371,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708991934122588 --mojo-platform-channel-handle=3960 /prefetch:1C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
1164"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /cC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateCore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.215.9
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ole32.dll
c:\windows\syswow64\ucrtbase.dll
1316"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\MicrosoftEdge_X64_143.0.3650.96.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --user-levelC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\MicrosoftEdge_X64_143.0.3650.96.exe
MicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{675bd95f-f804-46ba-8053-8f85931cccc2}\microsoftedge_x64_143.0.3650.96.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2364"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.rajaware.elite\EBWebView" --webview-exe-name=RajaWareElite.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --dma-cps-flags=0 --force-high-res-timeticks=disabled --autoplay-policy=no-user-gesture-required --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--expose-gc --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=5 --ram-no-pressure-read-main-dll --metrics-shmem-handle=3524,i,3845284867169591556,13483640270749127189,2097152 --field-trial-handle=1856,i,10548227512180424239,10704815990677995371,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708990997080739 --mojo-platform-channel-handle=3532 /prefetch:1C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
2624"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe" "C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe
RajaWareElite_1.0.0_x64-setup.exe
User:
admin
Company:
rajaware
Integrity Level:
HIGH
Description:
RajaWare Elite
Exit code:
1
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\rajaware elite\rajawareelite.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2680"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe" "C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exeRajaWareElite_1.0.0_x64-setup.exe
User:
admin
Company:
rajaware
Integrity Level:
MEDIUM
Description:
RajaWare Elite
Exit code:
3221226540
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\rajaware elite\rajawareelite.exe
c:\windows\system32\ntdll.dll
2688"\\?\C:\Users\admin\AppData\Local\RajaWare Elite\rajaware-api.exe"C:\Users\admin\AppData\Local\RajaWare Elite\rajaware-api.exe
rajaware-api.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\rajaware elite\rajaware-api.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4540"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exeexplorer.exe
User:
admin
Company:
rajaware
Integrity Level:
MEDIUM
Description:
RajaWare Elite
Exit code:
3221226540
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\rajaware elite\rajawareelite.exe
c:\windows\system32\ntdll.dll
5180C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\EDGEMITMP_72045.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=143.0.7499.147 --annotation=exe=C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\EDGEMITMP_72045.tmp\setup.exe --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=143.0.3650.96 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff75eaf4798,0x7ff75eaf47a4,0x7ff75eaf47b0C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\EDGEMITMP_72045.tmp\setup.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{675bd95f-f804-46ba-8053-8f85931cccc2}\edgemitmp_72045.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6404"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.rajaware.elite\EBWebView" --webview-exe-name=RajaWareElite.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --force-high-res-timeticks=disabled --startup-read-main-dll --metrics-shmem-handle=2404,i,6933552618440809133,13785230284303342295,524288 --field-trial-handle=1856,i,10548227512180424239,10704815990677995371,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708990060038890 --mojo-platform-channel-handle=2416 /prefetch:8C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
Total events
25 376
Read events
22 896
Write events
2 413
Delete events
67

Modification events

(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:path
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:CopilotUpdatePath
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\CopilotUpdate.exe
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:UninstallCmdLine
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /uninstall
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.215.9
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:name
Value:
Microsoft Edge Update
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.215.9
(PID) Process:(7972) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{81093D63-7825-417B-BFC8-ADC63FA4E53D}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7972) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{5EA43877-C6D8-4885-B77A-C0BB27E94372}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7972) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{0D91DDE3-CB00-406E-8E39-042A4590B1F0}\InprocHandler32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7972) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{448DD314-7FBB-429C-9DAA-C05A00D235A8}\InProcServer32
Operation:writeName:ThreadingModel
Value:
Both
Executable files
305
Suspicious files
120
Text files
1 058
Unknown types
3

Dropped files

PID
Process
Filename
Type
7848RajaWareElite_1.0.0_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nskF6EC.tmp\NSISdl.dllexecutable
MD5:8EABBE36E8B52E69322780D0F541FD19
SHA256:DDF40229DD9D6B268902D8DEA88C8A04AACF1AF218DD29F6DCD35BABC54AC08D
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\MicrosoftEdgeUpdate.exeexecutable
MD5:B299AA9A27C330A9B44E45BD1595DBEA
SHA256:955B5950FD92E5C5EEC395B022566C9A2594CA3126D894408E2E29BA25D8B0DD
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\MicrosoftEdgeUpdateBroker.exeexecutable
MD5:CCCD43E0947E3FD0F84346A1E2AE0F7D
SHA256:F4E2834C39B120D511B7536DCB491947403BC024EDF4D787C2E599EB035EBD10
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\MicrosoftEdgeUpdateComRegisterShell64.exeexecutable
MD5:52CA138709812DA4E9A02DC32C7FD6C9
SHA256:1EBCF13BB699961F59C33FAFD5088F70F1935AFC417469B3F3348E67C90FE8C6
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\psuser.dllexecutable
MD5:ED2697123275105298696BB829897CD7
SHA256:A8FD615A347A9B891B96004E0EC5BDD20D60B3AA77A381B3234D404289CDA331
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\psuser_arm64.dllexecutable
MD5:28C265CF11D6AA96ED9C601844FA10A5
SHA256:8DE772429B829DF895FDA18866F4EFF213FE5D620B7B2914A26BEED77FB3A20F
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\NOTICE.TXTtext
MD5:6DD5BF0743F2366A0BDD37E302783BCD
SHA256:91D3FC490565DED7621FF5198960E501B6DB857D5DD45AF2FE7C3ECD141145F5
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\EdgeUpdate.datbinary
MD5:369BBC37CFF290ADB8963DC5E518B9B8
SHA256:3D7EC761BEF1B1AF418B909F1C81CE577C769722957713FDAFBC8131B0A0C7D3
7848RajaWareElite_1.0.0_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nskF6EC.tmp\System.dllexecutable
MD5:9B38A1B07A0EBC5C7E59E63346ECC2DB
SHA256:C881253DAFCF1322A771139B1A429EC1E78C507CA81A218A20DC1A4B25ABBFE7
7848RajaWareElite_1.0.0_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nskF6EC.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
51
TCP/UDP connections
50
DNS requests
27
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6768
MoUsoCoreWorker.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
6768
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
POST
200
20.190.159.68:443
https://login.live.com/RST2.srf
US
xml
11.1 Kb
unknown
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
POST
200
20.190.160.17:443
https://login.live.com/RST2.srf
US
xml
10.3 Kb
unknown
POST
200
20.190.160.17:443
https://login.live.com/RST2.srf
US
xml
10.3 Kb
unknown
7848
RajaWareElite_1.0.0_x64-setup.exe
GET
301
88.221.169.205:80
http://go.microsoft.com/fwlink/p/?LinkId=2124703
US
whitelisted
7848
RajaWareElite_1.0.0_x64-setup.exe
GET
200
95.101.27.168:80
http://msedge.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/40c6dc4b-1601-4d19-8195-05b37913c743/MicrosoftEdgeWebview2Setup.exe
NL
executable
1.62 Mb
whitelisted
GET
200
150.171.22.17:443
https://config.edge.skype.com/config/v1/EdgeUpdate/1.3.215.9?clientId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&appChannel_edgeupdate=6&appConsentState_edgeupdate=0&appDayOfInstall_edgeupdate=0&appInactivityBadgeApplied_edgeupdate=0&appInactivityBadgeCleared_edgeupdate=0&appInactivityBadgeDuration_edgeupdate=0&appInstallTimeDiffSec_edgeupdate=0&appIsPinnedSystem_edgeupdate=false&appLastLaunchCount_edgeupdate=0&appLastLaunchTime_edgeupdate=0&appLastLaunchTimeJson_edgeupdate=0&appLastLaunchTimeDaysAgo_edgeupdate=0&appVersion_edgeupdate=1.3.215.9&appUpdateCheckIsUpdateDisabled_edgeupdate=false&appUpdatesAllowedForMeteredNetworks_edgeupdate=false&hwDiskType=2&hwHasSsse3=true&hwLogicalCpus=6&hwPhysmemory=6&isCTADevice=false&isMsftDomainJoined=false&oemProductManufacturer=DELL&oemProductName=DELL&osArch=x64&osIsDefaultNetworkConnectionMetered=false&osIsInLockdownMode=false&osIsWIP=false&osPlatform=win&osProductType=48&osVersion=10.0.19045.4046&requestCheckPeriodSec=-1&requestDomainJoined=false&requestInstallSource=otherinstallcmd&requestIsMachine=false&requestOmahaShellVersion=1.3.215.9&requestOmahaVersion=1.3.215.9
US
text
306 b
unknown
8084
MicrosoftEdgeUpdate.exe
GET
200
150.171.22.17:443
https://config.edge.skype.com/config/v1/EdgeUpdate/1.3.215.9?clientId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&appChannel_edgeupdate=6&appConsentState_edgeupdate=0&appDayOfInstall_edgeupdate=0&appInactivityBadgeApplied_edgeupdate=0&appInactivityBadgeCleared_edgeupdate=0&appInactivityBadgeDuration_edgeupdate=0&appInstallTimeDiffSec_edgeupdate=0&appIsPinnedSystem_edgeupdate=false&appLastLaunchCount_edgeupdate=0&appLastLaunchTime_edgeupdate=0&appLastLaunchTimeJson_edgeupdate=0&appLastLaunchTimeDaysAgo_edgeupdate=0&appVersion_edgeupdate=1.3.215.9&appUpdateCheckIsUpdateDisabled_edgeupdate=false&appUpdatesAllowedForMeteredNetworks_edgeupdate=false&hwDiskType=2&hwHasSsse3=true&hwLogicalCpus=6&hwPhysmemory=6&isCTADevice=false&isMsftDomainJoined=false&oemProductManufacturer=DELL&oemProductName=DELL&osArch=x64&osIsDefaultNetworkConnectionMetered=false&osIsInLockdownMode=false&osIsWIP=false&osPlatform=win&osProductType=48&osVersion=10.0.19045.4046&requestCheckPeriodSec=-1&requestDomainJoined=false&requestInstallSource=otherinstallcmd&requestIsMachine=false&requestOmahaShellVersion=1.3.215.9&requestOmahaVersion=1.3.215.9
US
text
306 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6300
svchost.exe
23.216.77.18:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6768
MoUsoCoreWorker.exe
23.216.77.18:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
23.216.77.18:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6300
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
6768
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 172.217.18.14
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.21
  • 23.216.77.25
  • 2.16.164.129
  • 2.16.164.112
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.59.18.102
whitelisted
login.live.com
  • 20.190.177.146
  • 20.190.177.19
  • 20.190.147.8
  • 20.190.147.4
  • 20.190.177.148
  • 20.190.147.9
  • 20.190.147.2
  • 20.190.177.21
whitelisted
go.microsoft.com
  • 88.221.169.205
whitelisted
msedge.sf.dl.delivery.mp.microsoft.com
  • 95.101.27.168
  • 95.101.27.172
whitelisted
config.edge.skype.com
  • 150.171.22.17
whitelisted
msedge.api.cdp.microsoft.com
  • 135.232.92.34
whitelisted

Threats

PID
Process
Class
Message
7848
RajaWareElite_1.0.0_x64-setup.exe
Misc activity
ET INFO Packed Executable Download
5480
svchost.exe
Misc activity
ET INFO Packed Executable Download
2688
rajaware-api.exe
Misc activity
ET INFO Observed Cloudflare workers.dev Domain in TLS SNI
2292
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] DNS Query to Cloudflare Worker App
2292
svchost.exe
Misc activity
ET INFO Observed DNS Query to Cloudflare workers.dev Domain
Process
Message
msedgewebview2.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\com.rajaware.elite directory exists )