URL:

https://nya.globalslb.net/natfrp/client/launcher-windows/3.1.2.1/SakuraLauncher.exe

Full analysis: https://app.any.run/tasks/ad78995e-acbb-4f1f-8c04-512db5bb326e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 26, 2025, 09:35:48
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
delphi
inno
installer
loader
Indicators:
MD5:

CAE884E13FDA095584ECB5B0F01114A5

SHA1:

399052DE44FE574697BF2A0C6CCE985C2696E6FF

SHA256:

7810E7BE0A326B5C03CDCFB6F1F56AB042AF01F0996709EC9251E822C4ED7E5B

SSDEEP:

3:N8aBRKkLV2LiKSi9EfEqztdA:2anKkE2KSimfEIdA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • SakuraLauncher.exe (PID: 4400)
      • SakuraLauncher.exe (PID: 7608)
      • SakuraFrpService.exe (PID: 6336)
      • SakuraFrpService.exe (PID: 6360)
      • SakuraLauncher.exe (PID: 7148)
      • SakuraFrpService.exe (PID: 6672)
      • SakuraFrpService.exe (PID: 7620)
      • SakuraLauncher.exe (PID: 6220)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7276)
    • Changes powershell execution policy (Bypass)

      • SakuraLauncher.tmp (PID: 7660)
    • Adds path to the Windows Defender exclusion list

      • SakuraLauncher.tmp (PID: 7660)
    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 7956)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SakuraLauncher.exe (PID: 4400)
      • SakuraLauncher.exe (PID: 7608)
      • SakuraLauncher.tmp (PID: 7660)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6736)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
      • MicrosoftEdgeWebview2Setup.exe (PID: 4160)
      • MicrosoftEdge_X64_132.0.2957.127.exe (PID: 7016)
      • setup.exe (PID: 6692)
    • Reads security settings of Internet Explorer

      • SakuraLauncher.tmp (PID: 5748)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • SakuraLauncher.exe (PID: 7148)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
      • MicrosoftEdgeUpdate.exe (PID: 7196)
      • SakuraLauncher.exe (PID: 6220)
    • Reads the Windows owner or organization settings

      • SakuraLauncher.tmp (PID: 7660)
    • Process drops legitimate windows executable

      • SakuraLauncher.tmp (PID: 7660)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6736)
      • msedge.exe (PID: 6360)
      • msedge.exe (PID: 7520)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
      • MicrosoftEdgeWebview2Setup.exe (PID: 4160)
      • MicrosoftEdge_X64_132.0.2957.127.exe (PID: 7016)
      • setup.exe (PID: 6692)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 6736)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
    • Disables SEHOP

      • MicrosoftEdgeUpdate.exe (PID: 7284)
    • Base64-obfuscated command line is found

      • SakuraLauncher.tmp (PID: 7660)
    • Script adds exclusion path to Windows Defender

      • SakuraLauncher.tmp (PID: 7660)
    • Starts POWERSHELL.EXE for commands execution

      • SakuraLauncher.tmp (PID: 7660)
    • Uses RUNDLL32.EXE to load library

      • SakuraFrpService.exe (PID: 6672)
    • Windows service management via SC.EXE

      • sc.exe (PID: 4952)
    • Starts SC.EXE for service management

      • SakuraLauncher.tmp (PID: 5748)
    • Executes as Windows Service

      • SakuraFrpService.exe (PID: 7620)
    • Adds/modifies Windows certificates

      • SakuraFrpService.exe (PID: 7620)
    • Checks Windows Trust Settings

      • SakuraLauncher.exe (PID: 7148)
      • MicrosoftEdgeUpdate.exe (PID: 7196)
      • SakuraLauncher.exe (PID: 6220)
    • Connects to unusual port

      • SakuraFrpService.exe (PID: 7620)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4652)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 768)
      • MicrosoftEdgeUpdate.exe (PID: 6940)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 5592)
    • Manipulates environment variables

      • powershell.exe (PID: 7276)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 7956)
    • Application launched itself

      • setup.exe (PID: 6692)
      • MicrosoftEdgeUpdate.exe (PID: 7196)
    • Searches for installed software

      • setup.exe (PID: 6692)
    • Creates a software uninstall entry

      • setup.exe (PID: 6692)
  • INFO

    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6404)
      • msedge.exe (PID: 4872)
      • msedge.exe (PID: 6360)
      • msedge.exe (PID: 7520)
      • msedge.exe (PID: 6988)
    • Reads the computer name

      • identity_helper.exe (PID: 7840)
      • SakuraLauncher.tmp (PID: 5748)
      • SakuraLauncher.tmp (PID: 7660)
      • identity_helper.exe (PID: 2224)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • SakuraFrpService.exe (PID: 6336)
      • SakuraFrpService.exe (PID: 6360)
      • SakuraLauncher.exe (PID: 7148)
      • SakuraFrpService.exe (PID: 7620)
      • identity_helper.exe (PID: 7512)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
      • MicrosoftEdgeUpdate.exe (PID: 6940)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4652)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 768)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 5592)
      • MicrosoftEdgeUpdate.exe (PID: 3524)
      • MicrosoftEdgeUpdate.exe (PID: 7228)
      • MicrosoftEdgeUpdate.exe (PID: 7196)
      • MicrosoftEdge_X64_132.0.2957.127.exe (PID: 7016)
      • setup.exe (PID: 6692)
      • MicrosoftEdgeUpdate.exe (PID: 7840)
      • SakuraLauncher.exe (PID: 6220)
      • identity_helper.exe (PID: 4504)
    • Create files in a temporary directory

      • SakuraLauncher.exe (PID: 4400)
      • SakuraLauncher.exe (PID: 7608)
      • SakuraLauncher.tmp (PID: 7660)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
      • MicrosoftEdgeWebview2Setup.exe (PID: 4160)
    • Checks supported languages

      • SakuraLauncher.tmp (PID: 5748)
      • identity_helper.exe (PID: 7840)
      • SakuraLauncher.exe (PID: 4400)
      • SakuraLauncher.exe (PID: 7608)
      • SakuraLauncher.tmp (PID: 7660)
      • identity_helper.exe (PID: 2224)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6736)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • SakuraFrpService.exe (PID: 6336)
      • SakuraFrpService.exe (PID: 6360)
      • SakuraFrpService.exe (PID: 6672)
      • SakuraLauncher.exe (PID: 7148)
      • SakuraFrpService.exe (PID: 7620)
      • frpc.exe (PID: 6780)
      • identity_helper.exe (PID: 7512)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
      • MicrosoftEdgeWebview2Setup.exe (PID: 4160)
      • MicrosoftEdgeUpdate.exe (PID: 6940)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4652)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 768)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 5592)
      • MicrosoftEdgeUpdate.exe (PID: 7228)
      • MicrosoftEdgeUpdate.exe (PID: 7196)
      • MicrosoftEdgeUpdate.exe (PID: 3524)
      • MicrosoftEdge_X64_132.0.2957.127.exe (PID: 7016)
      • setup.exe (PID: 4384)
      • setup.exe (PID: 6692)
      • MicrosoftEdgeUpdate.exe (PID: 7840)
      • SakuraLauncher.exe (PID: 6220)
      • identity_helper.exe (PID: 4504)
    • Reads Environment values

      • identity_helper.exe (PID: 7840)
      • identity_helper.exe (PID: 2224)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • identity_helper.exe (PID: 7512)
      • MicrosoftEdgeUpdate.exe (PID: 3524)
      • identity_helper.exe (PID: 4504)
      • MicrosoftEdgeUpdate.exe (PID: 7840)
    • Process checks computer location settings

      • SakuraLauncher.tmp (PID: 5748)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
      • setup.exe (PID: 6692)
    • Application launched itself

      • msedge.exe (PID: 4872)
      • msedge.exe (PID: 6852)
      • msedge.exe (PID: 7520)
      • msedge.exe (PID: 1224)
    • Detects InnoSetup installer (YARA)

      • SakuraLauncher.exe (PID: 4400)
      • SakuraLauncher.tmp (PID: 5748)
      • SakuraLauncher.exe (PID: 7608)
      • SakuraLauncher.tmp (PID: 7660)
    • Compiled with Borland Delphi (YARA)

      • SakuraLauncher.exe (PID: 4400)
      • SakuraLauncher.exe (PID: 7608)
      • SakuraLauncher.tmp (PID: 5748)
      • SakuraLauncher.tmp (PID: 7660)
    • Reads the software policy settings

      • SakuraLauncher.tmp (PID: 7660)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • SakuraFrpService.exe (PID: 7620)
      • SakuraLauncher.exe (PID: 7148)
      • wermgr.exe (PID: 7184)
      • MicrosoftEdgeUpdate.exe (PID: 7196)
      • MicrosoftEdgeUpdate.exe (PID: 3524)
      • MicrosoftEdgeUpdate.exe (PID: 7840)
      • SakuraLauncher.exe (PID: 6220)
    • The sample compiled with english language support

      • SakuraLauncher.tmp (PID: 7660)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6736)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • msedge.exe (PID: 6360)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
      • msedge.exe (PID: 7520)
      • MicrosoftEdgeWebview2Setup.exe (PID: 4160)
      • MicrosoftEdge_X64_132.0.2957.127.exe (PID: 7016)
      • setup.exe (PID: 6692)
      • msedge.exe (PID: 6988)
    • Checks proxy server information

      • SakuraLauncher.tmp (PID: 7660)
      • MicrosoftEdgeUpdate.exe (PID: 7284)
      • wermgr.exe (PID: 7184)
      • MicrosoftEdgeUpdate.exe (PID: 7196)
      • MicrosoftEdgeUpdate.exe (PID: 3524)
      • MicrosoftEdgeUpdate.exe (PID: 7840)
    • Creates files in the program directory

      • MicrosoftEdgeWebview2Setup.exe (PID: 6736)
      • SakuraLauncher.tmp (PID: 7660)
      • SakuraFrpService.exe (PID: 6336)
      • SakuraFrpService.exe (PID: 6672)
      • SakuraFrpService.exe (PID: 7620)
      • SakuraLauncher.exe (PID: 7148)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7276)
    • Creates a software uninstall entry

      • SakuraLauncher.tmp (PID: 7660)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7276)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • SakuraFrpService.exe (PID: 6672)
    • Reads security settings of Internet Explorer

      • rundll32.exe (PID: 5572)
    • Reads the machine GUID from the registry

      • SakuraLauncher.exe (PID: 7148)
      • SakuraFrpService.exe (PID: 7620)
      • MicrosoftEdgeUpdate.exe (PID: 7196)
      • SakuraLauncher.exe (PID: 6220)
    • Creates files or folders in the user directory

      • SakuraLauncher.exe (PID: 7148)
      • MicrosoftEdgeUpdate.exe (PID: 7956)
      • setup.exe (PID: 4384)
      • MicrosoftEdgeUpdate.exe (PID: 7196)
      • MicrosoftEdge_X64_132.0.2957.127.exe (PID: 7016)
      • setup.exe (PID: 6692)
      • SakuraLauncher.exe (PID: 6220)
    • Manual execution by a user

      • SakuraLauncher.exe (PID: 6220)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
289
Monitored processes
148
Malicious processes
14
Suspicious processes
8

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sakuralauncher.exe sakuralauncher.tmp no specs sakuralauncher.exe sakuralauncher.tmp msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs microsoftedgewebview2setup.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs microsoftedgeupdate.exe wermgr.exe powershell.exe no specs conhost.exe no specs sakurafrpservice.exe no specs conhost.exe no specs sakurafrpservice.exe no specs conhost.exe no specs sakuralauncher.exe sakurafrpservice.exe no specs conhost.exe no specs rundll32.exe no specs sc.exe no specs conhost.exe no specs sakurafrpservice.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs frpc.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs microsoftedgewebview2setup.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs microsoftedge_x64_132.0.2957.127.exe setup.exe setup.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs microsoftedgeupdate.exe msedge.exe no specs msedge.exe no specs sakuralauncher.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
244"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x294,0x298,0x29c,0x28c,0x2a4,0x7ff8185d5fd8,0x7ff8185d5fe4,0x7ff8185d5ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
396"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4184 --field-trial-handle=2380,i,12085680366142306611,1128282301762980133,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
768"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe" /user C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update COM Registration Helper
Exit code:
0
Version:
1.3.195.43
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\1.3.195.43\microsoftedgeupdatecomregistershell64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
848"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4368 --field-trial-handle=2304,i,4805139084205055359,16431857377550093485,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
968"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6760 --field-trial-handle=2304,i,4805139084205055359,16431857377550093485,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1016"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/p/?LinkId=2124703C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeSakuraLauncher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1080"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --mojo-platform-channel-handle=6824 --field-trial-handle=2364,i,14010515961799824529,3581443038757326451,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1224"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-windowC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1612"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5340 --field-trial-handle=2304,i,4805139084205055359,16431857377550093485,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1760"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://launcher.natfrp.com/?install&host=ws%3A%2F%2Flocalhost%3A7102&token=NbnY%2Abs4a%21PqfOHHoGF4sB0pC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
57 474
Read events
54 722
Write events
2 681
Delete events
71

Modification events

(PID) Process:(4872) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4872) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(4872) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(4872) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(4872) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
1C8B11F82E8B2F00
(PID) Process:(4872) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
37BF1CF82E8B2F00
(PID) Process:(4872) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\459468
Operation:writeName:WindowTabManagerFileMappingId
Value:
{7EE7BA74-2F6B-4077-B376-F1DC68DFB178}
(PID) Process:(4872) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\459468
Operation:writeName:WindowTabManagerFileMappingId
Value:
{47C7D3A6-FDA8-42A1-9EB0-09195F6BDF88}
(PID) Process:(4872) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
1BC574F82E8B2F00
(PID) Process:(7648) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
01000000000000006C969BB4D56FDB01
Executable files
515
Suspicious files
509
Text files
186
Unknown types
0

Dropped files

PID
Process
Filename
Type
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF1352f5.TMP
MD5:
SHA256:
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF1352f5.TMP
MD5:
SHA256:
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF1352f5.TMP
MD5:
SHA256:
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF135305.TMP
MD5:
SHA256:
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF13543e.TMP
MD5:
SHA256:
4872msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
111
DNS requests
116
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2736
svchost.exe
GET
200
2.16.164.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2736
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4872
msedge.exe
GET
200
18.173.205.113:80
http://ocsps.ssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQg3SSkKA74hABkhmlBtJTz8w3hlAQU%2BWC71OPVNPa49QaAJadz20ZpqJ4CEEJLalPOx2YUHCpjsaUcQQQ%3D
unknown
whitelisted
4516
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4516
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4872
msedge.exe
GET
200
18.173.205.113:80
http://ocsps.ssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSoEwb5tith0jIBy9frSyNGB1lsAAQUNr1J%2FzEs669qQP6ZwBbtuvxI3V8CEHQOo4ZiC1VGd04Gi9UupiU%3D
unknown
whitelisted
7184
wermgr.exe
GET
200
2.16.164.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6976
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2736
svchost.exe
2.16.164.18:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2736
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3092
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4872
msedge.exe
239.255.255.250:1900
whitelisted
5064
SearchApp.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
6404
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.164.18
  • 2.16.164.106
  • 2.16.164.43
  • 2.16.164.9
  • 2.16.164.99
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.19.217.218
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
nya.globalslb.net
  • 104.18.30.36
  • 104.18.31.36
unknown
business.bing.com
  • 13.107.6.158
whitelisted

Threats

PID
Process
Class
Message
7800
svchost.exe
Misc activity
ET INFO Packed Executable Download
Process
Message
SakuraLauncher.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
SakuraLauncher.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.