URL:

https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa0taTDltcG5FSDh1UjdBRXFVVklJVHNvWXZ4Z3xBQ3Jtc0tscUNfTS1pdDlmYUhVaGw2UjdqLWdZQ2dHNDVYN2h3TkZVMS1EOXNUN0NoVzMxNzB6alJLZm1nLTRDV2FxYlRBRWZLbk9kRDgyRWdsUkoxZExkbGFWcHpaTVZoVFQxSldLanRtZDRYZ0dYOUNKT1pBNA&q=https%3A%2F%2Fwww.mediafire.com%2Ffolder%2Foy6ghyawjrk35%2FLastVersion&v=vTKUdMtqxw0

Full analysis: https://app.any.run/tasks/13be31dc-bdcb-40eb-94bc-4f93234ea34f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 31, 2024, 14:48:36
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
loader
metastealer
xmrig
pastebin
susp-powershell
Indicators:
MD5:

A3565D499847B216084BBF3FD732FDCE

SHA1:

846BB0A19D831E7D7BB6A36ACD789198F525F1C5

SHA256:

994854A75F94B7334ECE28C620216F1481089610D6A30DA54741FB91D44DC972

SSDEEP:

6:2OLUxGKmKLqZWA2LBfz5QRWdz2B5cxiQk5Oj+r8q3MGzh3eG8mdL:2jGRfl212Wdz2DcwQHj5GF3eLmdL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • AddInProcess32.exe (PID: 1288)
      • svchost.exe (PID: 2256)
      • AddInProcess32.exe (PID: 1116)
    • Actions looks like stealing of personal data

      • AddInProcess32.exe (PID: 1288)
      • InstallUtil.exe (PID: 1136)
      • InstallUtil.exe (PID: 7932)
      • AddInProcess32.exe (PID: 1116)
    • Stealers network behavior

      • AddInProcess32.exe (PID: 1288)
      • InstallUtil.exe (PID: 1136)
      • AddInProcess32.exe (PID: 1116)
    • METASTEALER has been detected (SURICATA)

      • InstallUtil.exe (PID: 1136)
      • InstallUtil.exe (PID: 7932)
    • Steals credentials from Web Browsers

      • InstallUtil.exe (PID: 1136)
      • InstallUtil.exe (PID: 7932)
    • Connects to the CnC server

      • InstallUtil.exe (PID: 1136)
      • InstallUtil.exe (PID: 7932)
    • Scans artifacts that could help determine the target

      • Installer.exe (PID: 2508)
      • Installer.exe (PID: 2992)
    • XMRig has been detected

      • RegSvcs.exe (PID: 7212)
      • RegSvcs.exe (PID: 2136)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 6976)
      • cmd.exe (PID: 6620)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 7524)
    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 8168)
      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
      • Installer.exe (PID: 2508)
      • Installer.exe (PID: 2992)
    • Connects to the server without a host name

      • AddInProcess32.exe (PID: 1288)
      • AddInProcess32.exe (PID: 1116)
    • Searches for installed software

      • AddInProcess32.exe (PID: 1288)
      • InstallUtil.exe (PID: 1136)
      • AddInProcess32.exe (PID: 1116)
      • InstallUtil.exe (PID: 7932)
    • Process requests binary or script from the Internet

      • AddInProcess32.exe (PID: 1288)
      • AddInProcess32.exe (PID: 1116)
    • Potential Corporate Privacy Violation

      • AddInProcess32.exe (PID: 1288)
      • AddInProcess32.exe (PID: 1116)
    • Executable content was dropped or overwritten

      • AddInProcess32.exe (PID: 1288)
      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • 7z.exe (PID: 3256)
      • cmd.exe (PID: 6692)
      • AddInProcess32.exe (PID: 1116)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
      • 7z.exe (PID: 7476)
    • Drops the executable file immediately after the start

      • AddInProcess32.exe (PID: 1288)
      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • 7z.exe (PID: 3256)
      • cmd.exe (PID: 6692)
      • AddInProcess32.exe (PID: 1116)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
      • 7z.exe (PID: 7476)
    • Drops 7-zip archiver for unpacking

      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
    • Starts CMD.EXE for commands execution

      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
      • RegSvcs.exe (PID: 7212)
    • The executable file from the user directory is run by the CMD process

      • 7z.exe (PID: 7540)
      • 7z.exe (PID: 4080)
      • 7z.exe (PID: 3956)
      • 7z.exe (PID: 7412)
      • 7z.exe (PID: 7384)
      • 7z.exe (PID: 7088)
      • 7z.exe (PID: 7968)
      • 7z.exe (PID: 6456)
      • 7z.exe (PID: 4364)
      • 7z.exe (PID: 6428)
      • 7z.exe (PID: 1828)
      • 7z.exe (PID: 3256)
      • Installer.exe (PID: 2508)
      • 7z.exe (PID: 6096)
      • 7z.exe (PID: 1132)
      • 7z.exe (PID: 508)
      • 7z.exe (PID: 4440)
      • 7z.exe (PID: 1360)
      • 7z.exe (PID: 6368)
      • 7z.exe (PID: 3308)
      • 7z.exe (PID: 1020)
      • 7z.exe (PID: 6736)
      • 7z.exe (PID: 6660)
      • 7z.exe (PID: 4592)
      • 7z.exe (PID: 7476)
      • Installer.exe (PID: 2992)
    • Reads the date of Windows installation

      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
    • Executing commands from a ".bat" file

      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 6692)
      • cmd.exe (PID: 6780)
    • Contacting a server suspected of hosting an CnC

      • InstallUtil.exe (PID: 1136)
    • Connects to unusual port

      • InstallUtil.exe (PID: 1136)
      • InstallUtil.exe (PID: 7932)
    • BASE64 encoded PowerShell command has been detected

      • cmd.exe (PID: 7372)
    • Base64-obfuscated command line is found

      • cmd.exe (PID: 7372)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 7372)
    • Creates file in the systems drive root

      • RegSvcs.exe (PID: 7212)
  • INFO

    • Reads the computer name

      • identity_helper.exe (PID: 5816)
      • Software.exe (PID: 6240)
      • ShellExperienceHost.exe (PID: 8168)
      • AddInProcess32.exe (PID: 6872)
      • AddInProcess32.exe (PID: 7980)
      • Software.exe (PID: 7556)
      • AddInProcess32.exe (PID: 1288)
      • InstallUtil.exe (PID: 1136)
      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • 7z.exe (PID: 7540)
      • 7z.exe (PID: 4080)
      • 7z.exe (PID: 3956)
      • 7z.exe (PID: 7412)
      • 7z.exe (PID: 7384)
      • 7z.exe (PID: 7088)
      • 7z.exe (PID: 6456)
      • 7z.exe (PID: 7968)
      • 7z.exe (PID: 6428)
      • 7z.exe (PID: 1828)
      • 7z.exe (PID: 4364)
      • 7z.exe (PID: 3256)
      • AddInProcess32.exe (PID: 1116)
      • InstallUtil.exe (PID: 7932)
      • 7z.exe (PID: 6096)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
      • 7z.exe (PID: 1132)
      • 7z.exe (PID: 3308)
      • 7z.exe (PID: 508)
      • 7z.exe (PID: 1360)
      • 7z.exe (PID: 4440)
      • 7z.exe (PID: 1020)
      • 7z.exe (PID: 6736)
      • 7z.exe (PID: 6660)
      • 7z.exe (PID: 6368)
      • 7z.exe (PID: 7476)
      • 7z.exe (PID: 4592)
      • Installer.exe (PID: 2508)
      • RegSvcs.exe (PID: 7212)
      • Installer.exe (PID: 2992)
      • RegSvcs.exe (PID: 2136)
    • Manual execution by a user

      • Taskmgr.exe (PID: 7908)
      • Taskmgr.exe (PID: 7084)
      • Software.exe (PID: 6240)
      • Software.exe (PID: 7556)
      • notepad.exe (PID: 6424)
      • Taskmgr.exe (PID: 7828)
      • Taskmgr.exe (PID: 7192)
    • Checks supported languages

      • identity_helper.exe (PID: 5816)
      • Software.exe (PID: 6240)
      • ShellExperienceHost.exe (PID: 8168)
      • Software.exe (PID: 7556)
      • AddInProcess32.exe (PID: 7980)
      • AddInProcess32.exe (PID: 6872)
      • AddInProcess32.exe (PID: 1288)
      • InstallUtil.exe (PID: 1136)
      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • mode.com (PID: 7196)
      • 7z.exe (PID: 7540)
      • 7z.exe (PID: 4080)
      • 7z.exe (PID: 7384)
      • 7z.exe (PID: 3956)
      • 7z.exe (PID: 7412)
      • 7z.exe (PID: 6456)
      • 7z.exe (PID: 7088)
      • 7z.exe (PID: 7968)
      • 7z.exe (PID: 4364)
      • 7z.exe (PID: 6428)
      • 7z.exe (PID: 1828)
      • 7z.exe (PID: 3256)
      • Installer.exe (PID: 2508)
      • AddInProcess32.exe (PID: 1116)
      • InstallUtil.exe (PID: 7932)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
      • mode.com (PID: 7896)
      • 7z.exe (PID: 6096)
      • 7z.exe (PID: 3308)
      • 7z.exe (PID: 508)
      • 7z.exe (PID: 1360)
      • 7z.exe (PID: 1132)
      • 7z.exe (PID: 1020)
      • 7z.exe (PID: 6368)
      • 7z.exe (PID: 6736)
      • 7z.exe (PID: 6660)
      • 7z.exe (PID: 4440)
      • 7z.exe (PID: 4592)
      • 7z.exe (PID: 7476)
      • Installer.exe (PID: 2992)
      • RegSvcs.exe (PID: 7212)
      • RegSvcs.exe (PID: 2136)
    • The process uses the downloaded file

      • msedge.exe (PID: 7852)
      • WinRAR.exe (PID: 7524)
      • msedge.exe (PID: 2892)
      • Software.exe (PID: 6240)
      • Software.exe (PID: 7556)
      • AddInProcess32.exe (PID: 6872)
      • AddInProcess32.exe (PID: 7980)
      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
      • powershell.exe (PID: 6248)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 7908)
      • notepad.exe (PID: 6424)
      • Taskmgr.exe (PID: 7192)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 2892)
    • Reads Environment values

      • identity_helper.exe (PID: 5816)
      • InstallUtil.exe (PID: 1136)
      • InstallUtil.exe (PID: 7932)
      • RegSvcs.exe (PID: 7212)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7524)
    • Reads the software policy settings

      • slui.exe (PID: 7264)
      • slui.exe (PID: 3028)
      • AddInProcess32.exe (PID: 1288)
      • InstallUtil.exe (PID: 1136)
      • AddInProcess32.exe (PID: 1116)
      • InstallUtil.exe (PID: 7932)
      • RegSvcs.exe (PID: 7212)
    • Application launched itself

      • msedge.exe (PID: 2892)
    • Reads the machine GUID from the registry

      • Software.exe (PID: 6240)
      • AddInProcess32.exe (PID: 6872)
      • Software.exe (PID: 7556)
      • AddInProcess32.exe (PID: 7980)
      • InstallUtil.exe (PID: 1136)
      • InstallUtil.exe (PID: 7932)
      • RegSvcs.exe (PID: 7212)
    • Checks proxy server information

      • slui.exe (PID: 3028)
      • Installer.exe (PID: 2508)
      • RegSvcs.exe (PID: 7212)
      • Installer.exe (PID: 2992)
    • Create files in a temporary directory

      • AddInProcess32.exe (PID: 1288)
      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • 7z.exe (PID: 7540)
      • 7z.exe (PID: 4080)
      • 7z.exe (PID: 3956)
      • 7z.exe (PID: 7412)
      • 7z.exe (PID: 7384)
      • 7z.exe (PID: 6456)
      • 7z.exe (PID: 7088)
      • 7z.exe (PID: 7968)
      • 7z.exe (PID: 4364)
      • 7z.exe (PID: 6428)
      • 7z.exe (PID: 1828)
      • 7z.exe (PID: 3256)
      • AddInProcess32.exe (PID: 1116)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
      • 7z.exe (PID: 6096)
      • 7z.exe (PID: 1132)
      • 7z.exe (PID: 3308)
      • 7z.exe (PID: 508)
      • 7z.exe (PID: 6368)
      • 7z.exe (PID: 1020)
      • 7z.exe (PID: 6736)
      • 7z.exe (PID: 6660)
      • 7z.exe (PID: 4440)
      • 7z.exe (PID: 1360)
      • 7z.exe (PID: 7476)
      • 7z.exe (PID: 4592)
      • RegSvcs.exe (PID: 7212)
    • Process checks computer location settings

      • HVQB91JH4U14RZSHS8D3BV9.exe (PID: 6988)
      • G3MNG9E5QXHTABXA2UD57GK43YLNNM7.exe (PID: 3696)
    • Creates files in the program directory

      • RegSvcs.exe (PID: 7212)
    • Disables trace logs

      • RegSvcs.exe (PID: 7212)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 6248)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 6248)
    • Found Base64 encoded access to Windows Defender via PowerShell (YARA)

      • RegSvcs.exe (PID: 7212)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
276
Monitored processes
134
Malicious processes
17
Suspicious processes
3

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs taskmgr.exe no specs taskmgr.exe msedge.exe no specs msedge.exe no specs winrar.exe msedge.exe no specs msedge.exe no specs rundll32.exe no specs slui.exe msedge.exe no specs software.exe no specs shellexperiencehost.exe no specs addinprocess32.exe no specs software.exe msedge.exe no specs addinprocess32.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs addinprocess32.exe no specs msedge.exe no specs msedge.exe no specs notepad.exe no specs addinprocess32.exe no specs msedge.exe no specs addinprocess32.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs taskmgr.exe no specs taskmgr.exe msedge.exe no specs #LUMMA addinprocess32.exe installutil.exe no specs #METASTEALER installutil.exe #LUMMA addinprocess32.exe #METASTEALER installutil.exe #LUMMA svchost.exe msedge.exe no specs msedge.exe no specs conhost.exe no specs hvqb91jh4u14rzshs8d3bv9.exe cmd.exe conhost.exe no specs mode.com no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe attrib.exe no specs installer.exe conhost.exe no specs g3mng9e5qxhtabxa2ud57gk43ylnnm7.exe cmd.exe no specs conhost.exe no specs mode.com no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe attrib.exe no specs installer.exe THREAT regsvcs.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs schtasks.exe no specs schtasks.exe no specs regsvcs.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6156 --field-trial-handle=2396,i,7336184956460564957,4078650895521888212,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5087z.exe e extracted/file_9.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
10207z.exe e extracted/file_5.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1116"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
Software.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
AddInProcess.exe
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\addinprocess32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
11327z.exe e extracted/file_11.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1136"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
AddInProcess32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1184"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x300,0x304,0x308,0x2f8,0x310,0x7fffd2325fd8,0x7fffd2325fe4,0x7fffd2325ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
4294967295
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1288"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
Software.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AddInProcess.exe
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\addinprocess32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1296"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=1948 --field-trial-handle=2396,i,7336184956460564957,4078650895521888212,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
13607z.exe e extracted/file_7.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
62 321
Read events
62 104
Write events
209
Delete events
8

Modification events

(PID) Process:(2892) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2892) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2892) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2892) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2892) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2892) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(2892) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(2892) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
(PID) Process:(2892) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:usagestats
Value:
0
(PID) Process:(2892) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:urlstats
Value:
0
Executable files
46
Suspicious files
436
Text files
167
Unknown types
2

Dropped files

PID
Process
Filename
Type
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF129dfd.TMP
MD5:
SHA256:
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF129e0d.TMP
MD5:
SHA256:
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF129e0d.TMP
MD5:
SHA256:
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF129e0d.TMP
MD5:
SHA256:
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF129e2c.TMP
MD5:
SHA256:
2892msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
41
TCP/UDP connections
230
DNS requests
239
Threats
42

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6452
svchost.exe
HEAD
200
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
6452
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
6452
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
6452
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
6452
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
6452
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
6452
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
6452
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
6452
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
6452
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9e987a3f-7b8b-495b-a173-197137c9bbfc?P1=1725571405&P2=404&P3=2&P4=kiC%2b7fXcrKSEO%2f6NVMSV4zXYlhsBv7BUgc4vQiNYa3Mw6e38MXcBCowkS6und3oLFJqXp29%2f8P%2fIbnWDVqtNXw%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6440
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6192
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6684
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2892
msedge.exe
239.255.255.250:1900
whitelisted
6684
msedge.exe
142.250.185.174:443
www.youtube.com
GOOGLE
US
whitelisted
6684
msedge.exe
13.107.21.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6684
msedge.exe
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6684
msedge.exe
94.245.104.56:443
api.edgeoffer.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.184.238
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
www.youtube.com
  • 142.250.185.174
  • 172.217.18.110
  • 172.217.18.14
  • 142.250.184.238
  • 142.250.186.110
  • 142.250.186.46
  • 142.250.185.238
  • 142.250.186.78
  • 142.250.186.174
  • 142.250.185.142
  • 142.250.181.238
  • 172.217.16.142
  • 216.58.206.78
  • 142.250.185.78
  • 142.250.185.206
  • 142.250.185.110
whitelisted
edge.microsoft.com
  • 13.107.21.239
  • 204.79.197.239
whitelisted
api.edgeoffer.microsoft.com
  • 94.245.104.56
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
bzib.nelreports.net
  • 23.48.23.51
  • 23.48.23.46
whitelisted
www.bing.com
  • 2.16.110.121
  • 2.16.110.171
  • 2.23.209.130
  • 2.23.209.143
  • 2.23.209.149
  • 2.23.209.154
  • 2.23.209.141
  • 2.23.209.133
  • 2.23.209.135
  • 2.23.209.150
  • 2.23.209.140
whitelisted

Threats

PID
Process
Class
Message
6684
msedge.exe
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup
6684
msedge.exe
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup
6684
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
6684
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
6684
msedge.exe
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup
6684
msedge.exe
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup
6684
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
6684
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
6684
msedge.exe
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain in DNS Lookup (download .mediafire .com)
6684
msedge.exe
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain in DNS Lookup (download .mediafire .com)
Process
Message
msedge.exe
[0831/144912.332:WARNING:device_ticket.cc(151)] Timed out waiting for device ticket. Canceling async operation.
msedge.exe
[0831/144913.202:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ff6278d0000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
msedge.exe
[0831/144913.202:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
[0831/144913.202:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ffff85f0000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
msedge.exe
[0831/144913.202:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\WINDOWS\SYSTEM32\ntdll.dll
msedge.exe
[0831/144913.203:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ffff6f10000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
msedge.exe
[0831/144913.203:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\WINDOWS\System32\KERNEL32.DLL
msedge.exe
[0831/144913.203:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ffff5da0000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
msedge.exe
[0831/144913.203:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\WINDOWS\System32\KERNELBASE.dll
msedge.exe
[0831/144913.203:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7fffd1f40000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)