File name:

RajaWareElite_1.0.0_x64-setup.exe

Full analysis: https://app.any.run/tasks/66b7899e-79f8-4e19-9f9a-c4cf86d82ccf
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 05, 2026, 18:00:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
auto-reg
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

C851CCA3732CB8BA91C5CC4F4DA4EFE2

SHA1:

81B3BB5A062D4283045357A8F3E2712971D1E654

SHA256:

66AA19AA0FA49186FAC4F9D8D47C2CCA24590417683F661776C3E1299462B07C

SSDEEP:

393216:s9KlSee9YmBY1yQbJpfNuEi15vY811k8SlWQ5uZSbogqmN0jq:3feBBcyQbJd0bjPEuZooK0W

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 7924)
    • Potential DLL hijacking behavior detected

      • msedgewebview2.exe (PID: 7952)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
    • Searches for installed software

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • setup.exe (PID: 7488)
    • The process creates files with name similar to system file names

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
    • Process drops legitimate windows executable

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • rajaware-api.exe (PID: 6872)
    • Executable content was dropped or overwritten

      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • rajaware-api.exe (PID: 6872)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 7924)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8000)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7972)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8028)
      • MicrosoftEdgeUpdate.exe (PID: 7948)
    • Reads security settings of Internet Explorer

      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • msedgewebview2.exe (PID: 7728)
    • There is functionality for taking screenshot (YARA)

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
    • Application launched itself

      • setup.exe (PID: 7488)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • msedgewebview2.exe (PID: 7728)
      • rajaware-api.exe (PID: 6872)
    • Process drops python dynamic module

      • rajaware-api.exe (PID: 6872)
    • The process drops C-runtime libraries

      • rajaware-api.exe (PID: 6872)
    • Loads Python modules

      • rajaware-api.exe (PID: 2688)
    • Drops a system driver (possible attempt to evade defenses)

      • rajaware-api.exe (PID: 6872)
    • Starts CMD.EXE for commands execution

      • rajaware-api.exe (PID: 2688)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 8064)
      • cmd.exe (PID: 7944)
  • INFO

    • Checks supported languages

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • MicrosoftEdgeUpdate.exe (PID: 7948)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7972)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8000)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8028)
      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdgeUpdate.exe (PID: 8124)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • MicrosoftEdgeUpdateCore.exe (PID: 7408)
      • MicrosoftEdgeUpdate.exe (PID: 1164)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • setup.exe (PID: 5180)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • RajaWareElite.exe (PID: 2624)
      • msedgewebview2.exe (PID: 7792)
      • msedgewebview2.exe (PID: 7952)
      • msedgewebview2.exe (PID: 7728)
      • msedgewebview2.exe (PID: 8096)
      • msedgewebview2.exe (PID: 6404)
      • msedgewebview2.exe (PID: 2364)
      • msedgewebview2.exe (PID: 948)
      • rajaware-api.exe (PID: 6872)
      • rajaware-api.exe (PID: 2688)
    • The sample compiled with english language support

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • rajaware-api.exe (PID: 6872)
    • Checks proxy server information

      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • msedgewebview2.exe (PID: 7728)
      • slui.exe (PID: 6916)
      • rajaware-api.exe (PID: 2688)
    • Create files in a temporary directory

      • MicrosoftEdgeWebview2Setup.exe (PID: 7900)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • rajaware-api.exe (PID: 6872)
      • msedgewebview2.exe (PID: 7728)
    • Reads the computer name

      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • MicrosoftEdgeUpdate.exe (PID: 7948)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7972)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8000)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8028)
      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • MicrosoftEdgeUpdate.exe (PID: 8124)
      • MicrosoftEdgeUpdate.exe (PID: 1164)
      • MicrosoftEdgeUpdateCore.exe (PID: 7408)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • msedgewebview2.exe (PID: 7728)
      • RajaWareElite.exe (PID: 2624)
      • msedgewebview2.exe (PID: 7952)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • msedgewebview2.exe (PID: 8096)
      • rajaware-api.exe (PID: 6872)
      • rajaware-api.exe (PID: 2688)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • setup.exe (PID: 5180)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 1316)
      • setup.exe (PID: 7488)
      • msedgewebview2.exe (PID: 7728)
      • msedgewebview2.exe (PID: 7792)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • msedgewebview2.exe (PID: 8096)
    • Launching a file from a Registry key

      • MicrosoftEdgeUpdate.exe (PID: 7924)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • msedgewebview2.exe (PID: 7728)
    • Reads the machine GUID from the registry

      • MicrosoftEdgeUpdate.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 8160)
      • MicrosoftEdgeUpdate.exe (PID: 7664)
      • msedgewebview2.exe (PID: 7728)
    • Manual execution by a user

      • MicrosoftEdgeUpdateCore.exe (PID: 7408)
      • RajaWareElite.exe (PID: 4540)
    • Process checks computer location settings

      • MicrosoftEdgeUpdate.exe (PID: 7924)
      • setup.exe (PID: 7488)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
      • msedgewebview2.exe (PID: 7728)
      • msedgewebview2.exe (PID: 2364)
      • msedgewebview2.exe (PID: 948)
    • Creates a software uninstall entry

      • setup.exe (PID: 7488)
      • RajaWareElite_1.0.0_x64-setup.exe (PID: 7848)
    • Reads CPU info

      • msedgewebview2.exe (PID: 7728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:08 23:05:20+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 139776
UninitializedDataSize: 2048
EntryPoint: 0x369f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: RajaWare Elite
FileVersion: 1.0.0
LegalCopyright: -
ProductName: RajaWare Elite
ProductVersion: 1.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
172
Monitored processes
35
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start rajawareelite_1.0.0_x64-setup.exe microsoftedgewebview2setup.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe microsoftedgeupdatecore.exe no specs microsoftedgeupdate.exe no specs slui.exe microsoftedge_x64_143.0.3650.96.exe setup.exe setup.exe no specs microsoftedgeupdate.exe rajawareelite.exe no specs rajawareelite.exe no specs rajawareelite.exe msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs rajaware-api.exe rajaware-api.exe cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs taskkill.exe no specs taskkill.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
948"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.rajaware.elite\EBWebView" --webview-exe-name=RajaWareElite.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --dma-cps-flags=0 --force-high-res-timeticks=disabled --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--expose-gc --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=6 --skip-read-main-dll --metrics-shmem-handle=3896,i,251473566407430406,11622761644356149781,2097152 --field-trial-handle=1856,i,10548227512180424239,10704815990677995371,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708991934122588 --mojo-platform-channel-handle=3960 /prefetch:1C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
1164"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /cC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateCore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.215.9
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ole32.dll
c:\windows\syswow64\ucrtbase.dll
1316"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\MicrosoftEdge_X64_143.0.3650.96.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --user-levelC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\MicrosoftEdge_X64_143.0.3650.96.exe
MicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{675bd95f-f804-46ba-8053-8f85931cccc2}\microsoftedge_x64_143.0.3650.96.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2364"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.rajaware.elite\EBWebView" --webview-exe-name=RajaWareElite.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --dma-cps-flags=0 --force-high-res-timeticks=disabled --autoplay-policy=no-user-gesture-required --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--expose-gc --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=5 --ram-no-pressure-read-main-dll --metrics-shmem-handle=3524,i,3845284867169591556,13483640270749127189,2097152 --field-trial-handle=1856,i,10548227512180424239,10704815990677995371,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708990997080739 --mojo-platform-channel-handle=3532 /prefetch:1C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
2624"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe" "C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe
RajaWareElite_1.0.0_x64-setup.exe
User:
admin
Company:
rajaware
Integrity Level:
HIGH
Description:
RajaWare Elite
Exit code:
1
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\rajaware elite\rajawareelite.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2680"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe" "C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exeRajaWareElite_1.0.0_x64-setup.exe
User:
admin
Company:
rajaware
Integrity Level:
MEDIUM
Description:
RajaWare Elite
Exit code:
3221226540
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\rajaware elite\rajawareelite.exe
c:\windows\system32\ntdll.dll
2688"\\?\C:\Users\admin\AppData\Local\RajaWare Elite\rajaware-api.exe"C:\Users\admin\AppData\Local\RajaWare Elite\rajaware-api.exe
rajaware-api.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\rajaware elite\rajaware-api.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4540"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exe"C:\Users\admin\AppData\Local\RajaWare Elite\RajaWareElite.exeexplorer.exe
User:
admin
Company:
rajaware
Integrity Level:
MEDIUM
Description:
RajaWare Elite
Exit code:
3221226540
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\rajaware elite\rajawareelite.exe
c:\windows\system32\ntdll.dll
5180C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\EDGEMITMP_72045.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=143.0.7499.147 --annotation=exe=C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\EDGEMITMP_72045.tmp\setup.exe --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=143.0.3650.96 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff75eaf4798,0x7ff75eaf47a4,0x7ff75eaf47b0C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{675BD95F-F804-46BA-8053-8F85931CCCC2}\EDGEMITMP_72045.tmp\setup.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{675bd95f-f804-46ba-8053-8f85931cccc2}\edgemitmp_72045.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6404"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.rajaware.elite\EBWebView" --webview-exe-name=RajaWareElite.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --force-high-res-timeticks=disabled --startup-read-main-dll --metrics-shmem-handle=2404,i,6933552618440809133,13785230284303342295,524288 --field-trial-handle=1856,i,10548227512180424239,10704815990677995371,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708990060038890 --mojo-platform-channel-handle=2416 /prefetch:8C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
Total events
25 376
Read events
22 896
Write events
2 413
Delete events
67

Modification events

(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:path
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:CopilotUpdatePath
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\CopilotUpdate.exe
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:UninstallCmdLine
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /uninstall
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.215.9
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:name
Value:
Microsoft Edge Update
(PID) Process:(7924) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.215.9
(PID) Process:(7972) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{81093D63-7825-417B-BFC8-ADC63FA4E53D}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7972) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{5EA43877-C6D8-4885-B77A-C0BB27E94372}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7972) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{0D91DDE3-CB00-406E-8E39-042A4590B1F0}\InprocHandler32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7972) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{448DD314-7FBB-429C-9DAA-C05A00D235A8}\InProcServer32
Operation:writeName:ThreadingModel
Value:
Both
Executable files
305
Suspicious files
120
Text files
1 058
Unknown types
3

Dropped files

PID
Process
Filename
Type
7848RajaWareElite_1.0.0_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nskF6EC.tmp\NSISdl.dllexecutable
MD5:8EABBE36E8B52E69322780D0F541FD19
SHA256:DDF40229DD9D6B268902D8DEA88C8A04AACF1AF218DD29F6DCD35BABC54AC08D
7848RajaWareElite_1.0.0_x64-setup.exeC:\Users\admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeexecutable
MD5:B768BDD72BFD424DF5F3E810EFD5BE0F
SHA256:6A2F2492EA642E3965CE2421E257DA53FF18C5DEE08DF33C84C061AE47A8A302
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\MicrosoftEdgeUpdate.exeexecutable
MD5:B299AA9A27C330A9B44E45BD1595DBEA
SHA256:955B5950FD92E5C5EEC395B022566C9A2594CA3126D894408E2E29BA25D8B0DD
7848RajaWareElite_1.0.0_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nskF6EC.tmp\nsDialogs.dllexecutable
MD5:8F0E7415F33843431DF308BB8E06AF81
SHA256:BB49F15FA83452370047A7801E39FC7F64E70C7545B8999BB85AA4749EAA048B
7848RajaWareElite_1.0.0_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nskF6EC.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\psmachine_arm64.dllexecutable
MD5:B24065F689072FFA65EC476615E7C13E
SHA256:F53CAB4454F710E7D3B8B7C1B4A2AE3A37E05FAF73407A362D5B07A6B75EDFB1
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\msedgeupdate.dllexecutable
MD5:4FB7A9D21D9172EBE74213734F6A0CB9
SHA256:F3B294746B21AE8F8E114DCE1A8709F6F43290663A397F9B045A2CB22703A9E0
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\CopilotUpdate.exeexecutable
MD5:189F783B7528D7B33DB76EEF52565E18
SHA256:D1DB60024604426462A5382E0504441E6965A127A5CE5B6920A154E8E022D174
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\MicrosoftEdgeUpdateBroker.exeexecutable
MD5:CCCD43E0947E3FD0F84346A1E2AE0F7D
SHA256:F4E2834C39B120D511B7536DCB491947403BC024EDF4D787C2E599EB035EBD10
7900MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EU36D.tmp\MicrosoftEdgeUpdateOnDemand.exeexecutable
MD5:8A2A0F939BA8B91D65FB16F1F713F59A
SHA256:85B83F130AE6150250923CA0FAC6593376C56C37B5EB9827071FBD4E7D23BA02
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
51
TCP/UDP connections
50
DNS requests
27
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6300
svchost.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6768
MoUsoCoreWorker.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6768
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6300
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
20.190.159.68:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
unknown
POST
200
20.190.160.17:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
unknown
POST
200
20.190.160.17:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
unknown
7848
RajaWareElite_1.0.0_x64-setup.exe
GET
301
88.221.169.205:80
http://go.microsoft.com/fwlink/p/?LinkId=2124703
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6300
svchost.exe
23.216.77.18:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6768
MoUsoCoreWorker.exe
23.216.77.18:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
23.216.77.18:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6300
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
6768
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 172.217.18.14
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.21
  • 23.216.77.25
  • 2.16.164.129
  • 2.16.164.112
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.59.18.102
whitelisted
login.live.com
  • 20.190.177.146
  • 20.190.177.19
  • 20.190.147.8
  • 20.190.147.4
  • 20.190.177.148
  • 20.190.147.9
  • 20.190.147.2
  • 20.190.177.21
whitelisted
go.microsoft.com
  • 88.221.169.205
whitelisted
msedge.sf.dl.delivery.mp.microsoft.com
  • 95.101.27.168
  • 95.101.27.172
whitelisted
config.edge.skype.com
  • 150.171.22.17
whitelisted
msedge.api.cdp.microsoft.com
  • 135.232.92.34
whitelisted

Threats

PID
Process
Class
Message
7848
RajaWareElite_1.0.0_x64-setup.exe
Misc activity
ET INFO Packed Executable Download
5480
svchost.exe
Misc activity
ET INFO Packed Executable Download
2688
rajaware-api.exe
Misc activity
ET INFO Observed Cloudflare workers.dev Domain in TLS SNI
2292
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] DNS Query to Cloudflare Worker App
2292
svchost.exe
Misc activity
ET INFO Observed DNS Query to Cloudflare workers.dev Domain
Process
Message
msedgewebview2.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\com.rajaware.elite directory exists )