URL:

update.drp.su

Full analysis: https://app.any.run/tasks/db69697d-aac1-48f6-96e9-bcb977b52f18
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 29, 2025, 22:50:11
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
pua
adware
loader
qrcode
Indicators:
MD5:

B2A3E875F44F50329151E23D6A05C963

SHA1:

02D5A52E165864FA1BEF1B7284D9B683B094F212

SHA256:

85E8A8CB0122D53C1F2482B201E38D17BDE4959877566F8B0C04F0B7B2048E00

SSDEEP:

3:AC4VLWQn:ACmWQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ADWARE has been detected (SURICATA)

      • msedge.exe (PID: 7628)
      • svchost.exe (PID: 2196)
      • aria2c.exe (PID: 240)
      • aria2c.exe (PID: 7184)
      • aria2c.exe (PID: 5084)
      • aria2c.exe (PID: 4348)
    • Downloads files via BITSADMIN.EXE

      • cmd.exe (PID: 6960)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4652)
    • Starts Visual C# compiler

      • powershell.exe (PID: 4652)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 4996)
  • SUSPICIOUS

    • Access to an unwanted program domain was detected

      • msedge.exe (PID: 7628)
      • svchost.exe (PID: 2196)
      • aria2c.exe (PID: 240)
      • aria2c.exe (PID: 7184)
      • aria2c.exe (PID: 5084)
      • aria2c.exe (PID: 4348)
    • Process requests binary or script from the Internet

      • mshta.exe (PID: 7980)
      • mshta.exe (PID: 6512)
      • aria2c.exe (PID: 240)
      • aria2c.exe (PID: 4348)
      • aria2c.exe (PID: 5084)
      • aria2c.exe (PID: 7184)
      • aria2c.exe (PID: 7932)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6960)
      • cmd.exe (PID: 2564)
      • cmd.exe (PID: 8144)
      • cmd.exe (PID: 7912)
      • cmd.exe (PID: 7932)
      • cmd.exe (PID: 6108)
      • cmd.exe (PID: 7104)
    • Query Microsoft Defender status

      • mshta.exe (PID: 7980)
      • cmd.exe (PID: 7892)
    • The process verifies whether the antivirus software is installed

      • mshta.exe (PID: 7980)
    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 7980)
      • cmd.exe (PID: 6276)
      • mshta.exe (PID: 6960)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 7892)
      • cmd.exe (PID: 4996)
    • Cmdlet gets the status of antimalware software installed on the computer

      • cmd.exe (PID: 7892)
    • Unpacks CAB file

      • expand.exe (PID: 3332)
    • Executable content was dropped or overwritten

      • expand.exe (PID: 3332)
      • 7za.exe (PID: 5344)
      • csc.exe (PID: 2564)
      • aria2c.exe (PID: 5084)
    • Drops 7-zip archiver for unpacking

      • expand.exe (PID: 3332)
      • 7za.exe (PID: 5344)
    • Found strings related to reading or modifying Windows Defender settings

      • mshta.exe (PID: 7980)
    • The executable file from the user directory is run by the CMD process

      • 7za.exe (PID: 5344)
      • driverpack-wget.exe (PID: 6800)
      • driverpack-wget.exe (PID: 8060)
      • driverpack-wget.exe (PID: 5376)
      • driverpack-wget.exe (PID: 240)
      • driverpack-wget.exe (PID: 8248)
      • driverpack-wget.exe (PID: 8264)
      • driverpack-wget.exe (PID: 8344)
      • driverpack-wget.exe (PID: 8372)
      • driverpack-wget.exe (PID: 8476)
      • driverpack-wget.exe (PID: 8540)
      • driverpack-wget.exe (PID: 8284)
      • driverpack-wget.exe (PID: 8468)
      • aria2c.exe (PID: 4348)
      • driverpack-wget.exe (PID: 8964)
      • driverpack-wget.exe (PID: 9028)
      • driverpack-wget.exe (PID: 9120)
      • driverpack-wget.exe (PID: 9132)
      • aria2c.exe (PID: 240)
      • aria2c.exe (PID: 7184)
      • aria2c.exe (PID: 7932)
      • aria2c.exe (PID: 5084)
      • driverpack-wget.exe (PID: 9072)
      • driverpack-wget.exe (PID: 3248)
      • driverpack-wget.exe (PID: 8840)
      • driverpack-wget.exe (PID: 8000)
      • driverpack-wget.exe (PID: 5984)
      • driverpack-wget.exe (PID: 7008)
      • driverpack-wget.exe (PID: 8876)
      • driverpack-wget.exe (PID: 8968)
      • driverpack-wget.exe (PID: 8964)
      • driverpack-wget.exe (PID: 9056)
      • driverpack-wget.exe (PID: 5180)
      • driverpack-wget.exe (PID: 8168)
      • driverpack-wget.exe (PID: 8160)
      • driverpack-wget.exe (PID: 8716)
      • driverpack-wget.exe (PID: 4016)
      • driverpack-wget.exe (PID: 8712)
      • driverpack-wget.exe (PID: 3960)
    • Process drops legitimate windows executable

      • 7za.exe (PID: 5344)
    • Get information on the list of running processes

      • cmd.exe (PID: 4996)
    • Application launched itself

      • cmd.exe (PID: 6276)
      • mshta.exe (PID: 7980)
    • Executing commands from a ".bat" file

      • cmd.exe (PID: 6276)
      • mshta.exe (PID: 7980)
    • Executing commands from ".cmd" file

      • mshta.exe (PID: 6960)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 4996)
    • The process hide an interactive prompt from the user

      • cmd.exe (PID: 4996)
    • The process hides Powershell's copyright startup banner

      • cmd.exe (PID: 4996)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 4996)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • cmd.exe (PID: 1276)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • cmd.exe (PID: 6964)
    • Uses .NET C# to load dll

      • powershell.exe (PID: 4652)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 2564)
    • Starts application with an unusual extension

      • cmd.exe (PID: 8600)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 8600)
    • Potential Corporate Privacy Violation

      • aria2c.exe (PID: 240)
      • aria2c.exe (PID: 4348)
      • aria2c.exe (PID: 7932)
      • aria2c.exe (PID: 5084)
      • aria2c.exe (PID: 7184)
  • INFO

    • Reads the computer name

      • identity_helper.exe (PID: 4892)
    • Reads Environment values

      • identity_helper.exe (PID: 4892)
    • Checks supported languages

      • identity_helper.exe (PID: 4892)
    • Application launched itself

      • msedge.exe (PID: 7320)
    • The sample compiled with english language support

      • msedge.exe (PID: 7308)
      • expand.exe (PID: 3332)
      • 7za.exe (PID: 5344)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 7308)
    • Checks proxy server information

      • slui.exe (PID: 472)
      • mshta.exe (PID: 7980)
    • Reads the software policy settings

      • slui.exe (PID: 472)
      • slui.exe (PID: 7284)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 7980)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 7320)
    • Uses BITSADMIN.EXE

      • cmd.exe (PID: 2564)
      • cmd.exe (PID: 7104)
      • cmd.exe (PID: 7932)
      • cmd.exe (PID: 7912)
      • cmd.exe (PID: 8144)
      • cmd.exe (PID: 6108)
    • The sample compiled with russian language support

      • 7za.exe (PID: 5344)
    • Changes the display of characters in the console

      • cmd.exe (PID: 8600)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
406
Monitored processes
261
Malicious processes
14
Suspicious processes
7

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs #ADWARE msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs mshta.exe msedge.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs bitsadmin.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs expand.exe cmd.exe no specs conhost.exe no specs 7za.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs mshta.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs rundll32.exe no specs conhost.exe no specs #ADWARE svchost.exe netsh.exe no specs mshta.exe csc.exe cvtres.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe msedge.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-7za.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe rundll32.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs #ADWARE aria2c.exe #ADWARE aria2c.exe #ADWARE aria2c.exe aria2c.exe #ADWARE aria2c.exe cmd.exe no specs conhost.exe no specs driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe cmd.exe no specs conhost.exe no specs driverpack-wget.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs driverpack-wget.exe driverpack-wget.exe driverpack-wget.exe

Process information

PID
CMD
Path
Indicators
Parent process
232"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6804 --field-trial-handle=2312,i,13429326962693113094,15874862145475437975,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
236C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES5F55.tmp" "c:\Users\admin\AppData\Local\Temp\ydgqmx1p\CSC41A0712DA3384E85BE3DA2EBBD72118D.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
240"tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Users\admin\AppData\Local\Temp\beetle-cab\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/START-SETUP-1.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_8210.log" C:\Users\admin\AppData\Local\Temp\beetle-cab\DriverPack\Tools\driverpack-wget.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\beetle-cab\driverpack\tools\driverpack-wget.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
240"tools\aria2c.exe" "http://dl.driverpack.io/soft/ab/4/Internet-Start.exe.torrent" --dir="C:\Users\admin\AppData\Roaming\DRPSu\PROGRAMS" --quiet --continue --min-split-size=1M --follow-torrent=true --check-integrity --seed-time=0 --bt-stop-timeout=120 C:\Users\admin\AppData\Local\Temp\beetle-cab\DriverPack\Tools\aria2c.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\beetle-cab\driverpack\tools\aria2c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
472C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
680\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
800"C:\Windows\System32\cmd.exe" /c ""tools\driverpack-wget.exe" --tries=3 --timeout 5 --retry-connrefused --wait=5 --timestamping --directory-prefix="C:\Users\admin\AppData\Local\Temp\beetle-cab\DriverPack\audio\en" "http://dl.driverpack.io/assistant/beetle/audio/en/TEAM-PROOF-2.mp3" -o "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_log_18612.log" & echo DONE > "C:\Users\admin\AppData\Roaming\DRPSu\temp\wget_finished_18612.txt""C:\Windows\SysWOW64\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
920"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=3936 --field-trial-handle=2312,i,13429326962693113094,15874862145475437975,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1040"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=1476 --field-trial-handle=2312,i,13429326962693113094,15874862145475437975,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1056"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6324 --field-trial-handle=2312,i,13429326962693113094,15874862145475437975,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
45 555
Read events
45 332
Write events
223
Delete events
0

Modification events

(PID) Process:(7320) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(7320) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(7320) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(7320) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(7320) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
8CD782E888922F00
(PID) Process:(7320) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
DC6C8BE888922F00
(PID) Process:(7320) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262980
Operation:writeName:WindowTabManagerFileMappingId
Value:
{25AA922D-41D4-4BD5-B44A-17AEA3DF930E}
(PID) Process:(7320) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
Operation:writeName:EnhancedLinkOpeningDefault
Value:
Default
(PID) Process:(7320) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
842FBFE888922F00
(PID) Process:(7320) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MicrosoftEdgeAutoLaunch_29EBC4579851B72EE312C449CF839B1A
Value:
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
Executable files
57
Suspicious files
1 163
Text files
778
Unknown types
2

Dropped files

PID
Process
Filename
Type
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10bff6.TMP
MD5:
SHA256:
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10bff6.TMP
MD5:
SHA256:
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10bff6.TMP
MD5:
SHA256:
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10c006.TMP
MD5:
SHA256:
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10c006.TMP
MD5:
SHA256:
7320msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
550
TCP/UDP connections
358
DNS requests
215
Threats
281

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7628
msedge.exe
GET
403
37.9.8.75:80
http://update.drp.su/favicon.ico
unknown
malicious
7628
msedge.exe
GET
403
37.9.8.75:80
http://update.drp.su/
unknown
malicious
4896
svchost.exe
HEAD
200
208.89.74.31:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/52f29a75-af43-43c2-b5ad-ab8c4b266a65?P1=1746520494&P2=404&P3=2&P4=LMJ7XRA4D0ZJVYFLPDtX6Q5Fp1ja%2bzkun%2fRv2B4rFSq6vB9WDnIHi7KIY9lR3PuTnAm5WUlevsMjxQ6u1o0iEw%3d%3d
unknown
whitelisted
8012
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4896
svchost.exe
GET
206
208.89.74.31:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/52f29a75-af43-43c2-b5ad-ab8c4b266a65?P1=1746520494&P2=404&P3=2&P4=LMJ7XRA4D0ZJVYFLPDtX6Q5Fp1ja%2bzkun%2fRv2B4rFSq6vB9WDnIHi7KIY9lR3PuTnAm5WUlevsMjxQ6u1o0iEw%3d%3d
unknown
whitelisted
4896
svchost.exe
GET
206
208.89.74.31:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/52f29a75-af43-43c2-b5ad-ab8c4b266a65?P1=1746520494&P2=404&P3=2&P4=LMJ7XRA4D0ZJVYFLPDtX6Q5Fp1ja%2bzkun%2fRv2B4rFSq6vB9WDnIHi7KIY9lR3PuTnAm5WUlevsMjxQ6u1o0iEw%3d%3d
unknown
whitelisted
8012
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
7320
msedge.exe
239.255.255.250:1900
whitelisted
7628
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7628
msedge.exe
150.171.28.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7628
msedge.exe
37.9.8.75:80
update.drp.su
OOO Network of data-centers Selectel
RU
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
  • 104.124.11.58
  • 104.124.11.17
whitelisted
google.com
  • 142.250.185.206
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 104.119.109.218
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
update.drp.su
  • 37.9.8.75
malicious
business.bing.com
  • 13.107.6.158
whitelisted
bzib.nelreports.net
  • 23.50.131.74
  • 23.50.131.78
whitelisted

Threats

PID
Process
Class
Message
7628
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP DriverPack Domain in DNS Query
7628
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP DriverPack Domain in DNS Query
7628
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP DriverPack Domain in DNS Query
7628
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to DriverPack Domain ( .drp .su)
7628
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to DriverPack Domain ( .drp .su)
7628
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to DriverPack Domain ( .drp .su)
7628
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to DriverPack Domain ( .drp .su)
7628
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP DriverPack Domain in DNS Query
7628
msedge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7628
msedge.exe
Potentially Bad Traffic
ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related
No debug info