URL:

https://en.exloader.net/tree/modifications/en1gma-tech/

Full analysis: https://app.any.run/tasks/793149a6-2471-437a-aca4-4fc9b3207342
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 28, 2025, 05:44:53
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
github
auto
generic
stealer
loader
Indicators:
MD5:

2A013A4902260A76A8479EC3A1F40DA9

SHA1:

2EFBE920B7BB3C5BE1221A1B3D168F3AFFDC802E

SHA256:

73F102F364D16E8676F481E85739C08BA089380FFD0E6CE6FDFFFB2B7D815183

SSDEEP:

3:N8nBAv9XAATwTNWbZYKn:2ZQhbBn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • msedge.exe (PID: 5168)
      • msedge.exe (PID: 5080)
    • Adds path to the Windows Defender exclusion list

      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 4948)
      • replacedtimercomenetwork.exe (PID: 7712)
    • Changes Windows Defender settings

      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 4948)
      • replacedtimercomenetwork.exe (PID: 7712)
    • Changes the autorun value in the registry

      • dxwebsetup.exe (PID: 6368)
      • icarus.exe (PID: 5900)
    • Executing a file with an untrusted certificate

      • infinst.exe (PID: 7484)
      • infinst.exe (PID: 7504)
      • infinst.exe (PID: 8148)
      • infinst.exe (PID: 8588)
      • infinst.exe (PID: 8304)
      • infinst.exe (PID: 9028)
      • infinst.exe (PID: 10128)
      • infinst.exe (PID: 10172)
      • infinst.exe (PID: 9516)
      • infinst.exe (PID: 9568)
      • infinst.exe (PID: 9628)
      • infinst.exe (PID: 7496)
      • infinst.exe (PID: 9592)
      • infinst.exe (PID: 2512)
      • infinst.exe (PID: 7992)
      • infinst.exe (PID: 7432)
      • infinst.exe (PID: 1080)
      • infinst.exe (PID: 7516)
    • Steals credentials from Web Browsers

      • AvastSvc.exe (PID: 7808)
      • aswEngSrv.exe (PID: 7288)
      • engsup.exe (PID: 9984)
    • Antivirus name has been found in the command line (generic signature)

      • AvastUI.exe (PID: 9908)
    • Actions looks like stealing of personal data

      • engsup.exe (PID: 9984)
    • Registers / Runs the DLL via REGSVR32.EXE

      • dxwsetup.exe (PID: 5716)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • ExLoader_Installer.exe (PID: 5184)
      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 7072)
      • ExLoader_Installer.exe (PID: 4948)
      • avast_free_antivirus_setup_online.exe (PID: 8052)
      • icarus.exe (PID: 7500)
      • avast_free_antivirus_online_setup.exe (PID: 8076)
      • ExLoader.exe (PID: 2180)
      • icarus.exe (PID: 5900)
      • replacedtimercomenetwork.exe (PID: 7712)
      • dxwebsetup.exe (PID: 6368)
      • dxwsetup.exe (PID: 5716)
      • icarus.exe (PID: 7308)
      • engsup.exe (PID: 3972)
      • AvEmUpdate.exe (PID: 2136)
      • infinst.exe (PID: 7484)
      • infinst.exe (PID: 7504)
      • AvastSvc.exe (PID: 7808)
      • infinst.exe (PID: 8148)
      • infinst.exe (PID: 8304)
      • infinst.exe (PID: 8588)
      • infinst.exe (PID: 9028)
      • infinst.exe (PID: 10128)
      • infinst.exe (PID: 10172)
      • infinst.exe (PID: 9568)
      • infinst.exe (PID: 9516)
      • infinst.exe (PID: 9628)
      • infinst.exe (PID: 7496)
      • infinst.exe (PID: 9592)
      • infinst.exe (PID: 7992)
      • infinst.exe (PID: 7432)
      • infinst.exe (PID: 2512)
      • infinst.exe (PID: 1080)
      • infinst.exe (PID: 7516)
    • Process drops legitimate windows executable

      • ExLoader_Installer.exe (PID: 5184)
      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 7072)
      • ExLoader_Installer.exe (PID: 4948)
      • replacedtimercomenetwork.exe (PID: 7712)
      • dxwebsetup.exe (PID: 6368)
      • icarus.exe (PID: 5900)
      • dxwsetup.exe (PID: 5716)
      • infinst.exe (PID: 7484)
      • infinst.exe (PID: 8148)
      • infinst.exe (PID: 7504)
      • infinst.exe (PID: 8304)
      • infinst.exe (PID: 8588)
      • infinst.exe (PID: 9028)
      • infinst.exe (PID: 10128)
      • infinst.exe (PID: 10172)
      • infinst.exe (PID: 9516)
      • infinst.exe (PID: 9568)
      • infinst.exe (PID: 9592)
      • infinst.exe (PID: 9628)
      • infinst.exe (PID: 7496)
      • infinst.exe (PID: 7992)
      • infinst.exe (PID: 7432)
      • infinst.exe (PID: 2512)
      • infinst.exe (PID: 1080)
      • infinst.exe (PID: 7516)
    • Reads security settings of Internet Explorer

      • ExLoader_Installer.exe (PID: 5184)
      • ExLoader_Installer.exe (PID: 7072)
      • dxwsetup.exe (PID: 5716)
      • AvastSvc.exe (PID: 7808)
    • The process drops C-runtime libraries

      • ExLoader_Installer.exe (PID: 5184)
      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 7072)
      • ExLoader_Installer.exe (PID: 4948)
      • icarus.exe (PID: 5900)
    • Reads the date of Windows installation

      • ExLoader_Installer.exe (PID: 5184)
      • ExLoader_Installer.exe (PID: 7072)
      • aswidsagent.exe (PID: 8684)
    • Script adds exclusion path to Windows Defender

      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 4948)
      • replacedtimercomenetwork.exe (PID: 7712)
    • Connects to unusual port

      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 4948)
      • ExLoader.exe (PID: 2180)
      • replacedtimercomenetwork.exe (PID: 7712)
      • AvastSvc.exe (PID: 7808)
    • Checks for external IP

      • svchost.exe (PID: 2200)
      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 4948)
      • avast_free_antivirus_setup_online.exe (PID: 8052)
      • AvEmUpdate.exe (PID: 2136)
      • aswToolsSvc.exe (PID: 4560)
      • AvastSvc.exe (PID: 7808)
    • Starts POWERSHELL.EXE for commands execution

      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 4948)
      • replacedtimercomenetwork.exe (PID: 7712)
    • Starts itself from another location

      • icarus.exe (PID: 7500)
      • ExLoader.exe (PID: 2180)
      • icarus.exe (PID: 9200)
    • The process creates files with name similar to system file names

      • icarus.exe (PID: 5900)
    • The executable file from the user directory is run by the CMD process

      • dxwebsetup.exe (PID: 6368)
    • Starts CMD.EXE for commands execution

      • replacedtimercomenetwork.exe (PID: 7712)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7216)
    • The process verifies whether the antivirus software is installed

      • icarus.exe (PID: 5900)
      • icarus.exe (PID: 7308)
      • SetupInf.exe (PID: 2288)
      • SetupInf.exe (PID: 4116)
      • engsup.exe (PID: 3972)
      • SetupInf.exe (PID: 8160)
      • SetupInf.exe (PID: 3840)
      • SetupInf.exe (PID: 3624)
      • SetupInf.exe (PID: 4864)
      • AvEmUpdate.exe (PID: 536)
      • RegSvr.exe (PID: 8160)
      • AvEmUpdate.exe (PID: 2136)
      • SetupInf.exe (PID: 5288)
      • wsc_proxy.exe (PID: 6896)
      • RegSvr.exe (PID: 3760)
      • wsc_proxy.exe (PID: 2880)
      • afwServ.exe (PID: 5992)
      • AvastSvc.exe (PID: 7808)
      • aswToolsSvc.exe (PID: 4560)
      • aswEngSrv.exe (PID: 7288)
      • aswidsagent.exe (PID: 8684)
      • icarus.exe (PID: 8248)
      • icarus.exe (PID: 9200)
      • icarus.exe (PID: 9140)
      • AvastNM.exe (PID: 9772)
      • AvastUI.exe (PID: 9908)
      • engsup.exe (PID: 9984)
      • icarus.exe (PID: 7500)
      • overseer.exe (PID: 9828)
      • regsvr32.exe (PID: 6756)
      • infinst.exe (PID: 7432)
      • regsvr32.exe (PID: 9344)
      • infinst.exe (PID: 1080)
      • msedge.exe (PID: 7752)
      • infinst.exe (PID: 7516)
    • Starts a Microsoft application from unusual location

      • dxwsetup.exe (PID: 5716)
    • Drops a system driver (possible attempt to evade defenses)

      • icarus.exe (PID: 5900)
      • engsup.exe (PID: 3972)
    • Creates files in the driver directory

      • engsup.exe (PID: 3972)
      • icarus.exe (PID: 5900)
    • Creates a software uninstall entry

      • icarus.exe (PID: 5900)
    • Creates/Modifies COM task schedule object

      • icarus.exe (PID: 5900)
      • RegSvr.exe (PID: 8160)
      • RegSvr.exe (PID: 3760)
      • dxwsetup.exe (PID: 5716)
      • regsvr32.exe (PID: 10148)
      • regsvr32.exe (PID: 9540)
      • regsvr32.exe (PID: 9596)
      • regsvr32.exe (PID: 5616)
      • regsvr32.exe (PID: 6756)
      • regsvr32.exe (PID: 9344)
    • Executes as Windows Service

      • VSSVC.exe (PID: 5528)
      • wsc_proxy.exe (PID: 2880)
      • AvastSvc.exe (PID: 7808)
      • afwServ.exe (PID: 5992)
      • aswToolsSvc.exe (PID: 4560)
      • aswidsagent.exe (PID: 8684)
    • Creates or modifies Windows services

      • icarus.exe (PID: 5900)
    • Process checks presence of unattended files

      • icarus.exe (PID: 5900)
    • Searches for installed software

      • dllhost.exe (PID: 6188)
      • overseer.exe (PID: 9828)
      • AvastSvc.exe (PID: 7808)
    • Write to the desktop.ini file (may be used to cloak folders)

      • dxwsetup.exe (PID: 5716)
    • Adds/modifies Windows certificates

      • AvastSvc.exe (PID: 7808)
      • dxwsetup.exe (PID: 5716)
    • Modifies hosts file to alter network resolution

      • AvastSvc.exe (PID: 7808)
    • Process requests binary or script from the Internet

      • AvastSvc.exe (PID: 7808)
    • Read startup parameters

      • aswidsagent.exe (PID: 8684)
    • Checks for Java to be installed

      • AvastSvc.exe (PID: 7808)
    • Application launched itself

      • icarus.exe (PID: 9200)
  • INFO

    • Executable content was dropped or overwritten

      • msedge.exe (PID: 5080)
      • msedge.exe (PID: 5168)
    • Reads Environment values

      • identity_helper.exe (PID: 8000)
      • icarus.exe (PID: 5900)
      • replacedtimercomenetwork.exe (PID: 7712)
      • AvEmUpdate.exe (PID: 536)
      • AvEmUpdate.exe (PID: 2136)
      • afwServ.exe (PID: 5992)
      • AvastSvc.exe (PID: 7808)
      • aswToolsSvc.exe (PID: 4560)
      • aswidsagent.exe (PID: 8684)
      • icarus.exe (PID: 3624)
    • Reads the computer name

      • identity_helper.exe (PID: 8000)
      • ExLoader_Installer.exe (PID: 5184)
      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 7072)
      • ExLoader_Installer.exe (PID: 4948)
      • avast_free_antivirus_online_setup.exe (PID: 8076)
      • ExLoader.exe (PID: 2180)
      • avast_free_antivirus_setup_online.exe (PID: 8052)
      • icarus.exe (PID: 7500)
      • icarus.exe (PID: 5900)
      • icarus.exe (PID: 7308)
      • replacedtimercomenetwork.exe (PID: 7712)
      • dxwsetup.exe (PID: 5716)
      • engsup.exe (PID: 3972)
      • SetupInf.exe (PID: 4116)
      • SetupInf.exe (PID: 2288)
      • SetupInf.exe (PID: 8160)
      • SetupInf.exe (PID: 3840)
      • SetupInf.exe (PID: 3624)
      • SetupInf.exe (PID: 4864)
      • AvEmUpdate.exe (PID: 536)
      • AvEmUpdate.exe (PID: 2136)
      • RegSvr.exe (PID: 3760)
      • SetupInf.exe (PID: 5288)
      • RegSvr.exe (PID: 8160)
      • wsc_proxy.exe (PID: 2880)
      • afwServ.exe (PID: 5992)
      • wsc_proxy.exe (PID: 6896)
      • aswToolsSvc.exe (PID: 4560)
      • AvastSvc.exe (PID: 7808)
      • icarus.exe (PID: 8248)
      • aswidsagent.exe (PID: 8684)
      • icarus.exe (PID: 9200)
      • icarus.exe (PID: 9140)
      • icarus.exe (PID: 7296)
      • icarus_ui.exe (PID: 9656)
      • icarus.exe (PID: 3624)
      • engsup.exe (PID: 9984)
      • AvastUI.exe (PID: 9908)
    • Application launched itself

      • msedge.exe (PID: 5080)
    • Checks supported languages

      • identity_helper.exe (PID: 8000)
      • ExLoader_Installer.exe (PID: 5184)
      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 4948)
      • ExLoader_Installer.exe (PID: 7072)
      • ExLoader.exe (PID: 2180)
      • avast_free_antivirus_online_setup.exe (PID: 8076)
      • avast_free_antivirus_setup_online.exe (PID: 8052)
      • icarus.exe (PID: 7500)
      • icarus.exe (PID: 5900)
      • icarus.exe (PID: 7308)
      • replacedtimercomenetwork.exe (PID: 7712)
      • dxwebsetup.exe (PID: 6368)
      • dxwsetup.exe (PID: 5716)
      • engsup.exe (PID: 3972)
      • SetupInf.exe (PID: 2288)
      • SetupInf.exe (PID: 4116)
      • SetupInf.exe (PID: 8160)
      • SetupInf.exe (PID: 3624)
      • SetupInf.exe (PID: 4864)
      • SetupInf.exe (PID: 3840)
      • AvEmUpdate.exe (PID: 536)
      • AvEmUpdate.exe (PID: 2136)
      • RegSvr.exe (PID: 3760)
      • SetupInf.exe (PID: 5288)
      • wsc_proxy.exe (PID: 6896)
      • RegSvr.exe (PID: 8160)
      • wsc_proxy.exe (PID: 2880)
      • afwServ.exe (PID: 5992)
      • AvastSvc.exe (PID: 7808)
      • infinst.exe (PID: 7484)
      • aswToolsSvc.exe (PID: 4560)
      • infinst.exe (PID: 7504)
      • infinst.exe (PID: 8148)
      • aswEngSrv.exe (PID: 7288)
      • infinst.exe (PID: 8304)
      • infinst.exe (PID: 8588)
      • aswidsagent.exe (PID: 8684)
      • infinst.exe (PID: 9028)
      • icarus.exe (PID: 8248)
      • icarus.exe (PID: 9140)
      • icarus.exe (PID: 9200)
      • icarus.exe (PID: 3624)
      • icarus_ui.exe (PID: 9656)
      • overseer.exe (PID: 9828)
      • AvastNM.exe (PID: 9772)
      • icarus.exe (PID: 7296)
      • engsup.exe (PID: 9984)
      • infinst.exe (PID: 10128)
      • AvastUI.exe (PID: 9908)
      • infinst.exe (PID: 10172)
      • infinst.exe (PID: 9516)
      • infinst.exe (PID: 9568)
      • infinst.exe (PID: 9592)
      • infinst.exe (PID: 9628)
      • infinst.exe (PID: 7496)
      • infinst.exe (PID: 7432)
      • infinst.exe (PID: 2512)
      • infinst.exe (PID: 7992)
      • infinst.exe (PID: 1080)
      • infinst.exe (PID: 7516)
    • Launching a file from the Downloads directory

      • msedge.exe (PID: 5080)
    • The sample compiled with english language support

      • ExLoader_Installer.exe (PID: 5184)
      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 7072)
      • ExLoader_Installer.exe (PID: 4948)
      • avast_free_antivirus_setup_online.exe (PID: 8052)
      • avast_free_antivirus_online_setup.exe (PID: 8076)
      • icarus.exe (PID: 7500)
      • ExLoader.exe (PID: 2180)
      • icarus.exe (PID: 5900)
      • replacedtimercomenetwork.exe (PID: 7712)
      • dxwebsetup.exe (PID: 6368)
      • dxwsetup.exe (PID: 5716)
      • icarus.exe (PID: 7308)
      • engsup.exe (PID: 3972)
      • AvEmUpdate.exe (PID: 2136)
      • infinst.exe (PID: 7484)
      • infinst.exe (PID: 7504)
      • AvastSvc.exe (PID: 7808)
      • infinst.exe (PID: 8148)
      • infinst.exe (PID: 8304)
      • infinst.exe (PID: 8588)
      • infinst.exe (PID: 9028)
      • infinst.exe (PID: 10128)
      • infinst.exe (PID: 10172)
      • infinst.exe (PID: 9516)
      • infinst.exe (PID: 9568)
      • infinst.exe (PID: 9592)
      • infinst.exe (PID: 9628)
      • infinst.exe (PID: 7496)
      • infinst.exe (PID: 7992)
      • infinst.exe (PID: 7432)
      • infinst.exe (PID: 2512)
      • infinst.exe (PID: 1080)
      • infinst.exe (PID: 7516)
    • Create files in a temporary directory

      • ExLoader_Installer.exe (PID: 5184)
      • powershell.exe (PID: 3148)
      • ExLoader_Installer.exe (PID: 7072)
      • powershell.exe (PID: 4844)
      • avast_free_antivirus_online_setup.exe (PID: 8076)
      • ExLoader_Installer.exe (PID: 4948)
      • replacedtimercomenetwork.exe (PID: 7712)
      • dxwebsetup.exe (PID: 6368)
      • dxwsetup.exe (PID: 5716)
      • engsup.exe (PID: 9984)
    • Process checks computer location settings

      • ExLoader_Installer.exe (PID: 5184)
      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 7072)
      • ExLoader_Installer.exe (PID: 4948)
      • ExLoader.exe (PID: 2180)
      • replacedtimercomenetwork.exe (PID: 7712)
      • aswToolsSvc.exe (PID: 4560)
      • AvastSvc.exe (PID: 7808)
    • Creates files in the program directory

      • ExLoader_Installer.exe (PID: 7132)
      • ExLoader_Installer.exe (PID: 4948)
      • avast_free_antivirus_online_setup.exe (PID: 8076)
      • icarus.exe (PID: 7500)
      • icarus.exe (PID: 5900)
      • ExLoader.exe (PID: 2180)
      • icarus.exe (PID: 7308)
      • engsup.exe (PID: 3972)
      • AvEmUpdate.exe (PID: 536)
      • AvEmUpdate.exe (PID: 2136)
      • wsc_proxy.exe (PID: 6896)
      • afwServ.exe (PID: 5992)
      • AvastSvc.exe (PID: 7808)
      • aswToolsSvc.exe (PID: 4560)
      • aswidsagent.exe (PID: 8684)
      • icarus.exe (PID: 9200)
      • icarus_ui.exe (PID: 9656)
      • AvastNM.exe (PID: 9772)
      • AvastUI.exe (PID: 9908)
      • engsup.exe (PID: 9984)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7512)
      • powershell.exe (PID: 7552)
      • powershell.exe (PID: 7668)
      • powershell.exe (PID: 1948)
      • powershell.exe (PID: 7440)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7512)
      • powershell.exe (PID: 7552)
      • powershell.exe (PID: 7668)
      • powershell.exe (PID: 1948)
      • powershell.exe (PID: 7440)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 3148)
      • powershell.exe (PID: 4844)
    • Reads the software policy settings

      • powershell.exe (PID: 3148)
      • powershell.exe (PID: 4844)
      • avast_free_antivirus_setup_online.exe (PID: 8052)
      • avast_free_antivirus_online_setup.exe (PID: 8076)
      • slui.exe (PID: 7772)
      • dxwsetup.exe (PID: 5716)
      • AvEmUpdate.exe (PID: 2136)
      • AvastSvc.exe (PID: 7808)
      • aswToolsSvc.exe (PID: 4560)
    • Creates files or folders in the user directory

      • ExLoader_Installer.exe (PID: 4948)
      • replacedtimercomenetwork.exe (PID: 7712)
      • dxwsetup.exe (PID: 5716)
    • Manual execution by a user

      • ExLoader_Installer.exe (PID: 7072)
      • AvastUI.exe (PID: 9908)
    • Reads the machine GUID from the registry

      • avast_free_antivirus_setup_online.exe (PID: 8052)
      • avast_free_antivirus_online_setup.exe (PID: 8076)
      • icarus.exe (PID: 7500)
      • icarus.exe (PID: 5900)
      • icarus.exe (PID: 7308)
      • dxwsetup.exe (PID: 5716)
      • wsc_proxy.exe (PID: 6896)
      • afwServ.exe (PID: 5992)
      • AvastSvc.exe (PID: 7808)
      • aswToolsSvc.exe (PID: 4560)
      • aswidsagent.exe (PID: 8684)
      • icarus.exe (PID: 9200)
      • icarus.exe (PID: 9140)
      • icarus.exe (PID: 8248)
      • icarus_ui.exe (PID: 9656)
      • AvastUI.exe (PID: 9908)
      • overseer.exe (PID: 9828)
    • Checks proxy server information

      • avast_free_antivirus_online_setup.exe (PID: 8076)
      • slui.exe (PID: 7772)
      • dxwsetup.exe (PID: 5716)
      • AvEmUpdate.exe (PID: 536)
      • AvEmUpdate.exe (PID: 2136)
      • AvastUI.exe (PID: 9908)
    • Reads CPU info

      • icarus.exe (PID: 7500)
      • icarus.exe (PID: 5900)
      • icarus.exe (PID: 7308)
      • SetupInf.exe (PID: 2288)
      • engsup.exe (PID: 3972)
      • SetupInf.exe (PID: 8160)
      • SetupInf.exe (PID: 3840)
      • SetupInf.exe (PID: 3624)
      • SetupInf.exe (PID: 4864)
      • SetupInf.exe (PID: 4116)
      • AvEmUpdate.exe (PID: 2136)
      • AvEmUpdate.exe (PID: 536)
      • RegSvr.exe (PID: 8160)
      • RegSvr.exe (PID: 3760)
      • SetupInf.exe (PID: 5288)
      • wsc_proxy.exe (PID: 2880)
      • wsc_proxy.exe (PID: 6896)
      • afwServ.exe (PID: 5992)
      • aswToolsSvc.exe (PID: 4560)
      • AvastSvc.exe (PID: 7808)
      • aswEngSrv.exe (PID: 7288)
      • aswidsagent.exe (PID: 8684)
      • icarus.exe (PID: 8248)
      • icarus.exe (PID: 9200)
      • icarus.exe (PID: 9140)
      • icarus.exe (PID: 7296)
      • icarus.exe (PID: 3624)
      • AvastNM.exe (PID: 9772)
      • AvastUI.exe (PID: 9908)
      • engsup.exe (PID: 9984)
    • Reads product name

      • replacedtimercomenetwork.exe (PID: 7712)
      • aswidsagent.exe (PID: 8684)
    • The sample compiled with czech language support

      • icarus.exe (PID: 5900)
    • Launching a file from a Registry key

      • dxwebsetup.exe (PID: 6368)
      • icarus.exe (PID: 5900)
    • Manages system restore points

      • SrTasks.exe (PID: 7536)
    • Reads the time zone

      • aswidsagent.exe (PID: 8684)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • aswidsagent.exe (PID: 8684)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
285
Monitored processes
132
Malicious processes
60
Suspicious processes
5

Behavior graph

Click at the process to see the details
start #GENERIC msedge.exe msedge.exe no specs #GENERIC msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs exloader_installer.exe exloader_installer.exe no specs exloader_installer.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs svchost.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs exloader_installer.exe exloader_installer.exe no specs exloader_installer.exe slui.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs exloader.exe powershell.exe no specs conhost.exe no specs avast_free_antivirus_setup_online.exe avast_free_antivirus_online_setup.exe icarus.exe icarus.exe icarus.exe replacedtimercomenetwork.exe powershell.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs powershell.exe no specs msedge.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs dxwebsetup.exe dxwsetup.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs engsup.exe setupinf.exe no specs SPPSurrogate no specs vssvc.exe no specs setupinf.exe no specs setupinf.exe no specs setupinf.exe no specs setupinf.exe no specs setupinf.exe no specs avemupdate.exe no specs avemupdate.exe srtasks.exe no specs conhost.exe no specs regsvr.exe no specs regsvr.exe no specs setupinf.exe no specs wsc_proxy.exe no specs wsc_proxy.exe no specs afwserv.exe no specs avastsvc.exe infinst.exe aswtoolssvc.exe infinst.exe infinst.exe aswengsrv.exe infinst.exe infinst.exe aswidsagent.exe infinst.exe unsecapp.exe no specs icarus.exe icarus.exe icarus.exe icarus.exe no specs icarus.exe no specs icarus_ui.exe no specs wpr.exe no specs avastnm.exe no specs conhost.exe no specs overseer.exe no specs avastui.exe no specs engsup.exe infinst.exe regsvr32.exe no specs infinst.exe infinst.exe regsvr32.exe no specs infinst.exe infinst.exe regsvr32.exe no specs infinst.exe infinst.exe regsvr32.exe no specs infinst.exe infinst.exe regsvr32.exe no specs infinst.exe msedge.exe no specs infinst.exe infinst.exe regsvr32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
420"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=904,i,988961452077263627,12841864583001226605,262144 --variations-seed-version --mojo-platform-channel-handle=6852 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
536"C:\Program Files\Avast Software\Avast\AvEmUpdate.exe" /installer /regC:\Program Files\Avast Software\Avast\AvEmUpdate.exeicarus.exe
User:
admin
Company:
Gen Digital Inc.
Integrity Level:
HIGH
Description:
Avast Emergency Update
Exit code:
0
Version:
25.6.10221.0
Modules
Images
c:\program files\avast software\avast\avemupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
1080C:\Users\admin\AppData\Local\Temp\DXBF89.tmp\infinst.exe d3dx10_00_x64.infC:\Users\admin\AppData\Local\Temp\DXBF89.tmp\infinst.exe
dxwsetup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dxbf89.tmp\infinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\avast software\avast\aswhook.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
1208"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.142 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.92 --initial-client-data=0x304,0x308,0x30c,0x2fc,0x314,0x7ffc4387f208,0x7ffc4387f214,0x7ffc4387f220C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1268\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1324"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --message-loop-type-ui --string-annotations --always-read-main-dll --field-trial-handle=5416,i,988961452077263627,12841864583001226605,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1356\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1388"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=7260,i,988961452077263627,12841864583001226605,262144 --variations-seed-version --mojo-platform-channel-handle=3932 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1828C:\Windows\System32\cmd.exe /C C:\Users\admin\AppData\Roaming\com.swiftsoft\ExLoader\tools\dxwebsetup.exe /QC:\Windows\System32\cmd.exereplacedtimercomenetwork.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1872"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6736,i,988961452077263627,12841864583001226605,262144 --variations-seed-version --mojo-platform-channel-handle=6844 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
277 149
Read events
275 861
Write events
1 138
Delete events
150

Modification events

(PID) Process:(5080) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5080) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5080) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5080) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\590702
Operation:writeName:WindowTabManagerFileMappingId
Value:
{218A5872-BFAB-481E-9462-05F5CA8F48B9}
(PID) Process:(5080) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5080) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
88C9339431972F00
(PID) Process:(5080) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\590702
Operation:writeName:WindowTabManagerFileMappingId
Value:
{B9930E84-A488-4F1B-B261-7174A3C3F5FF}
(PID) Process:(5080) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\590702
Operation:writeName:WindowTabManagerFileMappingId
Value:
{73985EA3-66B2-44C4-9608-4A75EBC20D39}
(PID) Process:(5080) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\590702
Operation:writeName:WindowTabManagerFileMappingId
Value:
{5BDFE827-658C-4D00-B791-7E2DD3918D6B}
(PID) Process:(5080) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\590702
Operation:writeName:WindowTabManagerFileMappingId
Value:
{695A324F-6673-432C-8F74-8E107E6E0317}
Executable files
1 031
Suspicious files
2 679
Text files
1 270
Unknown types
0

Dropped files

PID
Process
Filename
Type
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old~RF17596a.TMP
MD5:
SHA256:
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old
MD5:
SHA256:
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF17597a.TMP
MD5:
SHA256:
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF17597a.TMP
MD5:
SHA256:
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF17597a.TMP
MD5:
SHA256:
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF17597a.TMP
MD5:
SHA256:
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
5080msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
310
TCP/UDP connections
333
DNS requests
250
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5168
msedge.exe
GET
200
150.171.28.11:80
http://edge.microsoft.com/browsernetworktime/time/1/current?cup2key=2:IUAgK_jJKQPSLcuD_N6Wjzs1IDzq5rva4F8RRo9ZSkI&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
unknown
whitelisted
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2876
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7552
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5920
svchost.exe
HEAD
200
208.89.74.31:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bf8090eb-6e5c-4c51-9250-5bf9b46cf160?P1=1751162515&P2=404&P3=2&P4=PdtFeneQqcoDHsfwT4wceNIc3PcansXSJsnR5xGCn7jS1y9MmEFTw8Pd7P2QuGtsFopnUQdyBz%2btFDO3gAv3Lw%3d%3d
unknown
whitelisted
7552
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5920
svchost.exe
GET
206
208.89.74.31:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bf8090eb-6e5c-4c51-9250-5bf9b46cf160?P1=1751162515&P2=404&P3=2&P4=PdtFeneQqcoDHsfwT4wceNIc3PcansXSJsnR5xGCn7jS1y9MmEFTw8Pd7P2QuGtsFopnUQdyBz%2btFDO3gAv3Lw%3d%3d
unknown
whitelisted
8052
avast_free_antivirus_setup_online.exe
POST
204
34.117.223.223:80
http://v7event.stats.avast.com/cgi-bin/iavsevents.cgi
unknown
whitelisted
5920
svchost.exe
GET
206
208.89.74.31:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bf8090eb-6e5c-4c51-9250-5bf9b46cf160?P1=1751162515&P2=404&P3=2&P4=PdtFeneQqcoDHsfwT4wceNIc3PcansXSJsnR5xGCn7jS1y9MmEFTw8Pd7P2QuGtsFopnUQdyBz%2btFDO3gAv3Lw%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2192
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5168
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5168
msedge.exe
150.171.28.11:80
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5168
msedge.exe
150.171.28.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5168
msedge.exe
172.67.22.232:443
en.exloader.net
CLOUDFLARENET
US
malicious
5168
msedge.exe
104.126.37.169:443
copilot.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 172.217.18.14
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
en.exloader.net
  • 172.67.22.232
  • 104.22.29.239
  • 104.22.28.239
malicious
copilot.microsoft.com
  • 104.126.37.169
  • 104.126.37.136
whitelisted
www.bing.com
  • 104.126.37.163
  • 104.126.37.130
  • 104.126.37.147
  • 104.126.37.186
  • 104.126.37.144
  • 104.126.37.161
  • 104.126.37.160
  • 104.126.37.184
  • 104.126.37.155
  • 2.16.241.205
  • 2.16.241.218
  • 2.16.241.201
  • 2.16.241.207
  • 92.123.104.38
  • 92.123.104.31
  • 92.123.104.33
  • 92.123.104.34
  • 92.123.104.63
  • 92.123.104.32
  • 92.123.104.28
  • 92.123.104.62
whitelisted
www.googletagmanager.com
  • 142.250.185.200
whitelisted
analytics.exloader.net
  • 104.22.29.239
  • 104.22.28.239
  • 172.67.22.232
unknown
data.exloader.net
  • 104.22.29.239
  • 104.22.28.239
  • 172.67.22.232
  • 2606:4700:10::6816:1cef
  • 2606:4700:10::6816:1def
  • 2606:4700:10::ac43:16e8
unknown

Threats

PID
Process
Class
Message
5168
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
5168
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
5168
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
5168
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
5168
msedge.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain (ipapi .co in DNS lookup)
5168
msedge.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain (ipapi .co in DNS lookup)
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2200
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
2200
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
2200
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
Process
Message
dxwsetup.exe
DLL_PROCESS_ATTACH
dxwsetup.exe
DLL_PROCESS_ATTACH
AvastSvc.exe
[2025-06-28 05:49:08.286] [error ] [events_rep ] [ 7808: 1688] [244FEC: 49] asw::burger_event::regular_burger_event_reporter_holder::start_all : starting of class asw::burger_event::data_sharing_preference_report failed with an exception : Identity of Burger client was not set.
AvastSvc.exe
[2025-06-28 05:49:12.587] [error ] [dnsdoh ] [ 7808: 8644] [4D6837: 73] failed to restore usage statistics Exception: corrupted file
AvastSvc.exe
[2025-06-28 05:49:13.623] [info ] [nsf_urlinfo] [ 7808: 8644] [C22399: 39] Initialize UrlInfoMgr
AvastSvc.exe
[2025-06-28 05:49:13.623] [info ] [nsf_urlinfo] [ 7808: 8644] [BA6D43: 46] Starting UrlInfo
AvastSvc.exe
[2025-06-28 05:49:13.672] [info ] [nsf_urlinfo] [ 7808: 8644] [C22399: 72] UrlInfoMgr initialized
AvastSvc.exe
[2025-06-28 05:49:18.678] [error ] [tasks ] [ 7808: 6860] [526EA1: 321] task wait_for_request_handler_data svc.alpha.GetOneMigrationData: failed without a caller check. Exception: Unable to convert module "pam" to product enum. Code: 0x00000057 (87)
AvastSvc.exe
[2025-06-28 05:49:26.562] [error ] [evnt_mgr ] [ 7808: 8184] [44AF47: 501] Set options and identity failed. Exception: Unable to convert module "pam" to product enum. Code: 0x00000057 (87)
AvastSvc.exe
[2025-06-28 05:49:28.880] [error ] [evnt_mgr ] [ 7808: 5268] [44AF47: 501] Set options and identity failed. Exception: Unable to convert module "pam" to product enum. Code: 0x00000057 (87)