File name:

install.exe

Full analysis: https://app.any.run/tasks/3df5bc54-d8a4-467b-981b-69ae1101e8a2
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 30, 2024, 23:06:40
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
expiro
m0yv
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

A9E407DB02368988B5927D038A68E06C

SHA1:

32A2AEB42E7CA942AEF62861A1F3F6AD005D6C89

SHA256:

80406D91BBC0906163805815B33CF96104537D24B51EE47D586ECFFC187742B2

SSDEEP:

98304:U15TA2EMEKzWwWzcy+KV6cV+DgJAbAOSHi7Yf9J5gplGDbr8y3KsnLPGvCgbQirK:ywHbl68Jx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • M0YV mutex has been found

      • armsvc.exe (PID: 4584)
      • FlashPlayerUpdateService.exe (PID: 7080)
      • install.exe (PID: 1788)
      • alg.exe (PID: 7100)
      • AppVClient.exe (PID: 3728)
      • DiagnosticsHub.StandardCollector.Service.exe (PID: 5592)
      • MicrosoftEdgeUpdate.exe (PID: 948)
      • MicrosoftEdgeUpdate.exe (PID: 3648)
      • FXSSVC.exe (PID: 5004)
      • MicrosoftEdgeUpdate.exe (PID: 6776)
      • GameInputSvc.exe (PID: 2928)
      • GameInputSvc.exe (PID: 7148)
      • elevation_service.exe (PID: 1784)
      • GoogleUpdate.exe (PID: 6396)
      • MicrosoftEdgeUpdate.exe (PID: 6888)
      • GoogleUpdate.exe (PID: 6320)
      • elevation_service.exe (PID: 6584)
      • maintenanceservice.exe (PID: 2648)
      • GoogleUpdate.exe (PID: 2632)
      • msdtc.exe (PID: 6128)
      • GoogleUpdate.exe (PID: 3620)
      • PerceptionSimulationService.exe (PID: 4476)
      • MicrosoftEdgeUpdate.exe (PID: 4432)
    • M0YV has been detected (YARA)

      • install.exe (PID: 1788)
      • alg.exe (PID: 7100)
      • armsvc.exe (PID: 4584)
      • DiagnosticsHub.StandardCollector.Service.exe (PID: 5592)
      • MicrosoftEdgeUpdate.exe (PID: 3648)
      • GameInputSvc.exe (PID: 2928)
    • EXPIRO has been detected (SURICATA)

      • install.exe (PID: 1788)
    • Expiro has been found (SURICATA)

      • install.exe (PID: 1788)
    • Connects to the CnC server

      • install.exe (PID: 1788)
  • SUSPICIOUS

    • Executes as Windows Service

      • armsvc.exe (PID: 4584)
      • alg.exe (PID: 7100)
      • FlashPlayerUpdateService.exe (PID: 7080)
      • AppVClient.exe (PID: 3728)
      • DiagnosticsHub.StandardCollector.Service.exe (PID: 5592)
      • MicrosoftEdgeUpdate.exe (PID: 948)
      • FXSSVC.exe (PID: 5004)
      • GameInputSvc.exe (PID: 2928)
      • GoogleUpdate.exe (PID: 6396)
      • MicrosoftEdgeUpdate.exe (PID: 4432)
      • maintenanceservice.exe (PID: 2648)
      • msdtc.exe (PID: 6128)
      • perfhost.exe (PID: 2360)
      • PerceptionSimulationService.exe (PID: 4476)
      • PSEXESVC.exe (PID: 6232)
      • Locator.exe (PID: 6516)
      • Spectrum.exe (PID: 7388)
      • snmptrap.exe (PID: 7324)
      • AgentService.exe (PID: 7648)
      • ssh-agent.exe (PID: 7456)
      • vds.exe (PID: 7700)
      • SensorDataService.exe (PID: 7180)
      • WmiApSrv.exe (PID: 7924)
      • TieringEngineService.exe (PID: 7520)
      • wbengine.exe (PID: 7836)
      • VSSVC.exe (PID: 7768)
      • GoogleUpdate.exe (PID: 8248)
      • updater.exe (PID: 8900)
      • updater.exe (PID: 5920)
      • updater.exe (PID: 6416)
    • Application launched itself

      • MicrosoftEdgeUpdate.exe (PID: 948)
      • MicrosoftEdgeUpdate.exe (PID: 3648)
      • GameInputSvc.exe (PID: 2928)
      • GoogleUpdate.exe (PID: 6396)
      • GoogleUpdate.exe (PID: 6320)
      • MicrosoftEdgeUpdate.exe (PID: 4432)
      • updater.exe (PID: 8656)
      • GoogleUpdate.exe (PID: 8248)
      • updater.exe (PID: 8900)
      • updater.exe (PID: 6244)
      • updater.exe (PID: 5920)
      • updater.exe (PID: 6416)
      • setup.exe (PID: 8292)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 5792)
      • MicrosoftEdgeUpdate.exe (PID: 6776)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4836)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7132)
    • Process drops legitimate windows executable

      • install.exe (PID: 1788)
      • MicrosoftEdge_X64_130.0.2849.56.exe (PID: 8536)
      • armsvc.exe (PID: 4584)
    • Executable content was dropped or overwritten

      • install.exe (PID: 1788)
      • svchost.exe (PID: 6484)
      • GoogleUpdate.exe (PID: 8248)
      • updater.exe (PID: 8656)
      • MicrosoftEdge_X64_130.0.2849.56.exe (PID: 8536)
      • armsvc.exe (PID: 4584)
      • updater.exe (PID: 5920)
    • Contacting a server suspected of hosting an CnC

      • install.exe (PID: 1788)
    • Process requests binary or script from the Internet

      • svchost.exe (PID: 6484)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 6484)
    • Drops 7-zip archiver for unpacking

      • install.exe (PID: 1788)
  • INFO

    • Reads the computer name

      • install.exe (PID: 1788)
      • armsvc.exe (PID: 4584)
      • FlashPlayerUpdateService.exe (PID: 7080)
      • MicrosoftEdgeUpdate.exe (PID: 948)
      • MicrosoftEdgeUpdate.exe (PID: 3648)
      • MicrosoftEdgeUpdate.exe (PID: 6776)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 5792)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7132)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4836)
      • elevation_service.exe (PID: 1784)
      • GoogleUpdate.exe (PID: 6396)
      • MicrosoftEdgeUpdate.exe (PID: 6888)
      • GoogleUpdate.exe (PID: 6320)
      • MicrosoftEdgeUpdate.exe (PID: 4432)
      • maintenanceservice.exe (PID: 2648)
      • GoogleUpdate.exe (PID: 2632)
      • GoogleCrashHandler.exe (PID: 5792)
      • GoogleUpdate.exe (PID: 3620)
      • GoogleCrashHandler64.exe (PID: 6392)
      • elevation_service.exe (PID: 6584)
    • Creates files or folders in the user directory

      • install.exe (PID: 1788)
      • GoogleUpdate.exe (PID: 2632)
    • Checks supported languages

      • armsvc.exe (PID: 4584)
      • FlashPlayerUpdateService.exe (PID: 7080)
      • install.exe (PID: 1788)
      • MicrosoftEdgeUpdate.exe (PID: 948)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 5792)
      • MicrosoftEdgeUpdate.exe (PID: 6776)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4836)
      • MicrosoftEdgeUpdate.exe (PID: 3648)
      • elevation_service.exe (PID: 1784)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7132)
      • GoogleUpdate.exe (PID: 6396)
      • MicrosoftEdgeUpdate.exe (PID: 6888)
      • GoogleUpdate.exe (PID: 6320)
      • MicrosoftEdgeUpdate.exe (PID: 4432)
      • elevation_service.exe (PID: 6584)
      • maintenanceservice.exe (PID: 2648)
      • GoogleUpdate.exe (PID: 2632)
      • GoogleCrashHandler.exe (PID: 5792)
      • GoogleCrashHandler64.exe (PID: 6392)
      • GoogleUpdate.exe (PID: 3620)
    • Checks proxy server information

      • install.exe (PID: 1788)
    • Creates files in the program directory

      • FXSSVC.exe (PID: 5004)
      • GoogleUpdate.exe (PID: 6396)
      • maintenanceservice.exe (PID: 2648)
      • GoogleUpdate.exe (PID: 2632)
      • GoogleUpdate.exe (PID: 3620)
      • GoogleUpdate.exe (PID: 6320)
    • Reads the software policy settings

      • GameInputSvc.exe (PID: 7148)
    • Executes as Windows Service

      • elevation_service.exe (PID: 1784)
      • elevation_service.exe (PID: 6584)
      • SearchIndexer.exe (PID: 8084)
    • Checks transactions between databases Windows and Oracle

      • msdtc.exe (PID: 6128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:01:12 00:05:48+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 5.12
CodeSize: 6144
InitializedDataSize: 5182976
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 11.0.0.0
ProductVersionNumber: 11.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: The MASM32 SDK
FileDescription: MASM32 Installation
FileVersion: 11
InternalName: Install
OriginalFileName: install.exe
LegalCopyright: © 2011 The MASM32 SDK
ProductName: MASM32 SDK
ProductVersion: 11
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
197
Monitored processes
67
Malicious processes
23
Suspicious processes
3

Behavior graph

Click at the process to see the details
start #M0YV install.exe #M0YV armsvc.exe #M0YV flashplayerupdateservice.exe no specs #M0YV alg.exe no specs #M0YV appvclient.exe no specs #M0YV diagnosticshub.standardcollector.service.exe no specs #M0YV microsoftedgeupdate.exe no specs #M0YV microsoftedgeupdate.exe no specs #M0YV microsoftedgeupdate.exe no specs #M0YV fxssvc.exe no specs microsoftedgeupdatecomregistershell64.exe no specs #M0YV gameinputsvc.exe no specs microsoftedgeupdatecomregistershell64.exe no specs #M0YV gameinputsvc.exe no specs microsoftedgeupdatecomregistershell64.exe no specs #M0YV elevation_service.exe no specs #M0YV googleupdate.exe no specs #M0YV microsoftedgeupdate.exe no specs #M0YV googleupdate.exe no specs #M0YV microsoftedgeupdate.exe #M0YV elevation_service.exe no specs #M0YV googleupdate.exe #M0YV maintenanceservice.exe no specs googlecrashhandler.exe no specs #M0YV msdtc.exe no specs googlecrashhandler64.exe no specs #M0YV googleupdate.exe no specs #M0YV perceptionsimulationservice.exe no specs perfhost.exe no specs psexesvc.exe no specs locator.exe no specs microsoftedgeupdate.exe sensordataservice.exe no specs snmptrap.exe no specs spectrum.exe no specs ssh-agent.exe no specs tieringengineservice.exe no specs agentservice.exe no specs vds.exe no specs svchost.exe vssvc.exe no specs wbengine.exe no specs wmiapsrv.exe no specs Delivery Optimization User no specs searchindexer.exe no specs googleupdate.exe svchost.exe tstexe.exe no specs masm32ci.exe no specs updatersetup.exe no specs googleupdate.exe updater.exe updater.exe no specs searchprotocolhost.exe no specs searchfilterhost.exe no specs microsoftedge_x64_130.0.2849.56.exe setup.exe no specs setup.exe no specs updater.exe no specs updater.exe no specs updater.exe no specs updater.exe no specs updater.exe updater.exe no specs updater.exe no specs updater.exe no specs install.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
692"C:\Program Files (x86)\Google\GoogleUpdater\131.0.6776.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\131.0.6776.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=131.0.6776.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x308,0x30c,0x310,0x304,0x314,0x896290,0x89629c,0x8962a8C:\Program Files (x86)\Google\GoogleUpdater\131.0.6776.0\updater.exeupdater.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Updater
Exit code:
0
Version:
131.0.6776.0
Modules
Images
c:\program files (x86)\google\googleupdater\131.0.6776.0\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
948"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svcC:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.147.37
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ole32.dll
c:\windows\syswow64\ucrtbase.dll
1784"C:\Program Files\Google\Chrome\Application\122.0.6261.70\elevation_service.exe"C:\Program Files\Google\Chrome\Application\122.0.6261.70\elevation_service.exe
services.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\122.0.6261.70\elevation_service.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
1788"C:\Users\admin\Desktop\install.exe" C:\Users\admin\Desktop\install.exe
explorer.exe
User:
admin
Company:
The MASM32 SDK
Integrity Level:
HIGH
Description:
MASM32 Installation
Version:
11.0
Modules
Images
c:\users\admin\desktop\install.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2360C:\WINDOWS\SysWow64\perfhost.exeC:\Windows\SysWOW64\perfhost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
x86 Performance Counter Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\perfhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\rpcrt4.dll
2632"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /crC:\Program Files (x86)\Google\Update\GoogleUpdate.exe
GoogleUpdate.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Installer
Exit code:
0
Version:
1.3.36.51
Modules
Images
c:\program files (x86)\google\update\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
2648"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
services.exe
User:
SYSTEM
Company:
Mozilla Foundation
Integrity Level:
SYSTEM
Exit code:
0
Version:
123.0
Modules
Images
c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shlwapi.dll
2928C:\WINDOWS\System32\GameInputSvc.exeC:\Windows\System32\GameInputSvc.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
GameInput Host Service
Version:
0.2309.19041.4046
Modules
Images
c:\windows\system32\gameinputsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\wintrust.dll
3620"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource coreC:\Program Files (x86)\Google\Update\GoogleUpdate.exe
GoogleUpdate.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Installer
Exit code:
0
Version:
1.3.36.51
Modules
Images
c:\program files (x86)\google\update\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
Total events
28 383
Read events
24 083
Write events
4 204
Delete events
96

Modification events

(PID) Process:(4584) armsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Adobe\Adobe ARM\1.0\ARM
Operation:writeName:iLastSvcSuccess
Value:
574328
(PID) Process:(948) MicrosoftEdgeUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\UsageStats\Daily\Integers
Operation:writeName:omaha_version
Value:
1100B90003000100
(PID) Process:(948) MicrosoftEdgeUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\UsageStats\Daily\Booleans
Operation:writeName:is_system_install
Value:
01000000
(PID) Process:(948) MicrosoftEdgeUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\UsageStats\Daily\Counts
Operation:writeName:goopdate_main
Value:
1500000000000000
(PID) Process:(948) MicrosoftEdgeUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\UsageStats\Daily\Counts
Operation:writeName:goopdate_constructor
Value:
1500000000000000
(PID) Process:(948) MicrosoftEdgeUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\UsageStats\Daily\Integers
Operation:writeName:windows_major_version
Value:
0A00000000000000
(PID) Process:(3648) MicrosoftEdgeUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
Operation:writeName:InstallTime
Value:
(PID) Process:(6776) MicrosoftEdgeUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(6776) MicrosoftEdgeUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(6776) MicrosoftEdgeUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25D72A6A-8A84-4E25-886B-02FD23A7A104}\InprocHandler32
Operation:writeName:ThreadingModel
Value:
Both
Executable files
158
Suspicious files
79
Text files
1 072
Unknown types
0

Dropped files

PID
Process
Filename
Type
1788install.exeC:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeexecutable
MD5:3B7C19B2D0EB2E75F8C0D50557CF2B22
SHA256:9F2A5A857D02784B4B70FA7AE2B6905DCC0F3ED94B937EEBD3885E3F71DCD140
1788install.exeC:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\elevation_service.exeexecutable
MD5:912E56AD54825CAF32E8CD58F5EE45D6
SHA256:BF2491AEA83BA5DDC9A6AB35754928F32C1B3130958E2219E06A552A599D7CD8
1788install.exeC:\Windows\System32\msdtc.exeexecutable
MD5:324C9C8AE40101309FF19CC663A2DBD1
SHA256:02C44021BA34E122E218A2C95D09D999BEE8E0FCB3D1266B9F1BED2B3FF7DD1E
1788install.exeC:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exeexecutable
MD5:7B2E67C2D05FB19E4D5268EA5F52E5F6
SHA256:FEE562007EC8A18FD1881758F1E03337BADA64D41A8F956D7AE4AC45EBA402D7
1788install.exeC:\Users\admin\AppData\Roaming\26b799fa89ba8c8f.binbinary
MD5:9CE274693EFBF3383BD5A6CBF3DA3994
SHA256:A0D24070457D36557BBE1D7ACC2160C65F0D77DD4D9BD80B98CA7A123CD8069A
1788install.exeC:\Windows\System32\alg.exeexecutable
MD5:57A281DEC38048F48658E9FF40AAD6A4
SHA256:F05CABBA4202698BAD54611CBDD5172B6B94221C0253276A09CA16864F9AACC5
1788install.exeC:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exeexecutable
MD5:8D8EEF122BC947897B9C02A3B31F77BD
SHA256:EC6421D703F70390A7EFE54B84DCDAB07B91D274E0C0423E338393265DF2AF27
1788install.exeC:\Windows\System32\msiexec.exeexecutable
MD5:2EA66429395343DB6F5EDA63CB487D62
SHA256:BBE1E8DF2D3041EB1EEEE6602AE19EBFF0F84B189BA838351335E66B837C9193
1788install.exeC:\Windows\System32\FXSSVC.exeexecutable
MD5:9B3E6055A18882C90D4FF27B1C7997B9
SHA256:A988AA511F215F0802D458F396AD47CCFD767C141BE68960574C75E151438E86
1788install.exeC:\Windows\System32\AppVClient.exeexecutable
MD5:6634E7E46800986654051794A765567A
SHA256:8FF04A42DE7A22DCFD4331F5B81D1E7CDAD5B0C293609360D25BF2946C1A7EAE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
446
TCP/UDP connections
171
DNS requests
142
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1788
install.exe
POST
200
54.244.188.177:80
http://pywolwnvd.biz/jlefmj
unknown
malicious
1788
install.exe
POST
200
18.141.10.107:80
http://ssbzmoy.biz/xfixqyeokrrhcn
unknown
unknown
4584
armsvc.exe
POST
200
54.244.188.177:80
http://pywolwnvd.biz/caipgmwq
unknown
unknown
4584
armsvc.exe
POST
200
54.244.188.177:80
http://cvgrf.biz/dfrc
unknown
malicious
1788
install.exe
POST
200
54.244.188.177:80
http://cvgrf.biz/dfrc
unknown
malicious
1788
install.exe
POST
172.234.222.138:80
http://przvgke.biz/ytdwldavwphlpb
unknown
unknown
4584
armsvc.exe
POST
172.234.222.138:80
http://przvgke.biz/ytdwldavwphlpb
unknown
unknown
1788
install.exe
POST
172.234.222.138:80
http://przvgke.biz/khpplcexqnfqxcr
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
104.126.37.162:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1252
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5488
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1788
install.exe
54.244.188.177:80
pywolwnvd.biz
AMAZON-02
US
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
www.bing.com
  • 104.126.37.162
  • 104.126.37.128
  • 104.126.37.176
  • 104.126.37.144
  • 104.126.37.153
  • 104.126.37.136
  • 104.126.37.155
  • 104.126.37.137
  • 104.126.37.170
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.174
whitelisted
pywolwnvd.biz
  • 54.244.188.177
malicious
ssbzmoy.biz
  • 18.141.10.107
unknown
cvgrf.biz
  • 54.244.188.177
malicious
clients2.google.com
  • 142.250.186.174
whitelisted
npukfztj.biz
  • 44.221.84.105
unknown

Threats

PID
Process
Class
Message
2172
svchost.exe
A Network Trojan was detected
ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz)
2172
svchost.exe
A Network Trojan was detected
ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz)
6484
svchost.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6484
svchost.exe
Misc activity
ET INFO EXE - Served Attached HTTP
2 ETPRO signatures available at the full report
No debug info