URL:

https://acs.pandasoftware.com/Panda/PDP/190721/PDP.exe

Full analysis: https://app.any.run/tasks/69e865fc-a615-4a3d-b6b5-77cfdfc02d9d
Verdict: Malicious activity
Analysis date: January 14, 2025, 14:22:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MD5:

B89C00BD216737F440A6572F53AF311B

SHA1:

B3CDF5D957BC401CF2D3EA190D412405A0BF9696

SHA256:

AD2C153FFE809C06BC41F0E1F2FB5365B7316869FA601280A1931C17CF762AA5

SSDEEP:

3:N80S5FJ9SXpNn:20S9ipNn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Hydra.Sdk.Windows.Service.exe (PID: 7472)
    • Reads the value of a key from the registry (SCRIPT)

      • PSUAService.exe (PID: 3820)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • PDP.exe (PID: 2624)
      • Stub.exe (PID: 5528)
      • {72A5356D-A21A-4866-8F41-26C560159243}.exe (PID: 7264)
      • msiexec.exe (PID: 6076)
      • msiexec.exe (PID: 2976)
    • Executable content was dropped or overwritten

      • PDP.exe (PID: 2624)
      • Stub.exe (PID: 5528)
      • {72A5356D-A21A-4866-8F41-26C560159243}.exe (PID: 7264)
      • PSINanoRun64.exe (PID: 1016)
      • pnputil.exe (PID: 5964)
      • drvinst.exe (PID: 308)
      • PSINanoRun64.exe (PID: 4228)
      • pnputil.exe (PID: 4668)
      • drvinst.exe (PID: 3632)
      • PSINanoRun64.exe (PID: 7496)
      • pnputil.exe (PID: 3488)
      • PSINanoRun64.exe (PID: 7924)
      • pnputil.exe (PID: 7952)
      • drvinst.exe (PID: 7232)
      • pnputil.exe (PID: 8172)
      • PSINanoRun64.exe (PID: 7760)
      • drvinst.exe (PID: 6832)
      • pnputil.exe (PID: 7352)
      • drvinst.exe (PID: 3060)
      • PSINanoRun64.exe (PID: 5536)
      • drvinst.exe (PID: 7980)
      • pnputil.exe (PID: 3888)
      • drvinst.exe (PID: 2572)
      • PSINanoRun64.exe (PID: 7320)
      • pnputil.exe (PID: 7364)
      • drvinst.exe (PID: 6712)
      • PSINanoRun64.exe (PID: 7768)
      • pnputil.exe (PID: 7780)
      • drvinst.exe (PID: 5252)
      • PSINanoRun64.exe (PID: 524)
      • pnputil.exe (PID: 8016)
      • PSINanoRun64.exe (PID: 3208)
      • pnputil.exe (PID: 7756)
      • drvinst.exe (PID: 8136)
      • PSINanoRun64.exe (PID: 7512)
      • pnputil.exe (PID: 7516)
      • drvinst.exe (PID: 7956)
      • PSINanoRun64.exe (PID: 2828)
      • pnputil.exe (PID: 1200)
      • drvinst.exe (PID: 7580)
      • PSINanoRun64.exe (PID: 5680)
      • drvinst.exe (PID: 4384)
      • PSINanoRun64.exe (PID: 3628)
      • drvinst.exe (PID: 7572)
      • pnputil.exe (PID: 7748)
      • PSINanoRun64.exe (PID: 3052)
      • pnputil.exe (PID: 3652)
      • drvinst.exe (PID: 1540)
      • drvinst.exe (PID: 2160)
      • PSINanoRun64.exe (PID: 7808)
      • pnputil.exe (PID: 7668)
      • drvinst.exe (PID: 2428)
      • pnputil.exe (PID: 3840)
      • PSINanoRun64.exe (PID: 4336)
    • Reads security settings of Internet Explorer

      • Tunnel.exe (PID: 3260)
      • Stub.exe (PID: 1796)
      • Tunnel.exe (PID: 1076)
      • Setup.exe (PID: 5752)
      • msiexec.exe (PID: 6076)
    • Checks Windows Trust Settings

      • Tunnel.exe (PID: 3260)
      • Tunnel.exe (PID: 1076)
      • Setup.exe (PID: 5752)
      • msiexec.exe (PID: 2976)
      • msiexec.exe (PID: 6076)
      • msiexec.exe (PID: 7292)
      • drvinst.exe (PID: 308)
    • The process drops C-runtime libraries

      • PDP.exe (PID: 2624)
      • Stub.exe (PID: 5528)
      • {72A5356D-A21A-4866-8F41-26C560159243}.exe (PID: 7264)
      • msiexec.exe (PID: 6076)
      • msiexec.exe (PID: 2976)
    • Drops a system driver (possible attempt to evade defenses)

      • PDP.exe (PID: 2624)
      • {72A5356D-A21A-4866-8F41-26C560159243}.exe (PID: 7264)
      • msiexec.exe (PID: 7712)
      • PSINanoRun64.exe (PID: 1016)
      • pnputil.exe (PID: 5964)
      • drvinst.exe (PID: 308)
      • msiexec.exe (PID: 2976)
      • PSINanoRun64.exe (PID: 4228)
      • pnputil.exe (PID: 4668)
      • drvinst.exe (PID: 3632)
      • PSINanoRun64.exe (PID: 7496)
      • pnputil.exe (PID: 3488)
      • drvinst.exe (PID: 7232)
      • drvinst.exe (PID: 3060)
      • PSINanoRun64.exe (PID: 7924)
      • pnputil.exe (PID: 7952)
      • PSINanoRun64.exe (PID: 5536)
      • pnputil.exe (PID: 8172)
      • drvinst.exe (PID: 6832)
      • pnputil.exe (PID: 7352)
      • PSINanoRun64.exe (PID: 7760)
      • PSINanoRun64.exe (PID: 4336)
      • pnputil.exe (PID: 3888)
      • drvinst.exe (PID: 2572)
      • PSINanoRun64.exe (PID: 7320)
      • pnputil.exe (PID: 7364)
      • drvinst.exe (PID: 7980)
      • PSINanoRun64.exe (PID: 7768)
      • drvinst.exe (PID: 6712)
      • drvinst.exe (PID: 5252)
      • PSINanoRun64.exe (PID: 524)
      • pnputil.exe (PID: 8016)
      • pnputil.exe (PID: 7780)
      • drvinst.exe (PID: 7956)
      • drvinst.exe (PID: 8136)
      • PSINanoRun64.exe (PID: 7512)
      • PSINanoRun64.exe (PID: 3208)
      • pnputil.exe (PID: 7756)
      • drvinst.exe (PID: 4384)
      • PSINanoRun64.exe (PID: 2828)
      • pnputil.exe (PID: 1200)
      • drvinst.exe (PID: 7580)
      • PSINanoRun64.exe (PID: 5680)
      • pnputil.exe (PID: 7516)
      • drvinst.exe (PID: 7572)
      • PSINanoRun64.exe (PID: 3628)
      • drvinst.exe (PID: 1540)
      • PSINanoRun64.exe (PID: 3052)
      • pnputil.exe (PID: 3652)
      • pnputil.exe (PID: 7748)
      • drvinst.exe (PID: 2160)
      • PSINanoRun64.exe (PID: 7808)
      • pnputil.exe (PID: 7668)
      • drvinst.exe (PID: 2428)
      • pnputil.exe (PID: 3840)
    • Creates/Modifies COM task schedule object

      • msiexec.exe (PID: 2976)
    • Starts a Microsoft application from unusual location

      • Hydra.Sdk.Windows.Service.subinacl.exe (PID: 1888)
    • Executes as Windows Service

      • pselamsvc.exe (PID: 4648)
      • AgentSvc.exe (PID: 6296)
      • PSANHost.exe (PID: 7992)
      • PSUAService.exe (PID: 3820)
    • Application launched itself

      • PSANCU.exe (PID: 7056)
  • INFO

    • Reads Environment values

      • identity_helper.exe (PID: 7764)
      • Tunnel.exe (PID: 3260)
      • Tunnel.exe (PID: 1076)
      • msiexec.exe (PID: 6076)
      • msiexec.exe (PID: 7712)
    • The sample compiled with spanish language support

      • PDP.exe (PID: 2624)
      • Stub.exe (PID: 5528)
      • {72A5356D-A21A-4866-8F41-26C560159243}.exe (PID: 7264)
      • msiexec.exe (PID: 6076)
      • msiexec.exe (PID: 2976)
    • Reads the computer name

      • PDP.exe (PID: 2624)
      • identity_helper.exe (PID: 7764)
      • Tunnel.exe (PID: 3260)
      • Stub.exe (PID: 1796)
      • Tunnel.exe (PID: 1076)
      • msiexec.exe (PID: 2976)
      • msiexec.exe (PID: 7712)
      • msiexec.exe (PID: 7292)
      • PSINanoRun64.exe (PID: 1016)
      • PSINanoRun64.exe (PID: 4228)
      • PSINanoRun64.exe (PID: 7924)
      • drvinst.exe (PID: 7980)
      • PSINanoRun64.exe (PID: 7320)
    • The sample compiled with english language support

      • PDP.exe (PID: 2624)
      • Stub.exe (PID: 5528)
      • msedge.exe (PID: 1732)
      • {72A5356D-A21A-4866-8F41-26C560159243}.exe (PID: 7264)
      • msiexec.exe (PID: 2976)
      • msiexec.exe (PID: 6076)
      • msiexec.exe (PID: 7712)
      • PSINanoRun64.exe (PID: 1016)
      • pnputil.exe (PID: 5964)
      • drvinst.exe (PID: 308)
      • PSINanoRun64.exe (PID: 4228)
      • pnputil.exe (PID: 4668)
      • drvinst.exe (PID: 3632)
      • PSINanoRun64.exe (PID: 7496)
      • pnputil.exe (PID: 3488)
      • drvinst.exe (PID: 7232)
      • PSINanoRun64.exe (PID: 7924)
      • drvinst.exe (PID: 3060)
      • pnputil.exe (PID: 7952)
      • pnputil.exe (PID: 8172)
      • drvinst.exe (PID: 6832)
      • PSINanoRun64.exe (PID: 7760)
      • pnputil.exe (PID: 7352)
      • drvinst.exe (PID: 7980)
      • PSINanoRun64.exe (PID: 5536)
      • PSINanoRun64.exe (PID: 7320)
      • drvinst.exe (PID: 2572)
      • PSINanoRun64.exe (PID: 4336)
      • pnputil.exe (PID: 3888)
      • pnputil.exe (PID: 7364)
      • drvinst.exe (PID: 6712)
      • drvinst.exe (PID: 5252)
      • pnputil.exe (PID: 7780)
      • PSINanoRun64.exe (PID: 524)
      • pnputil.exe (PID: 8016)
      • PSINanoRun64.exe (PID: 7768)
      • pnputil.exe (PID: 7756)
      • drvinst.exe (PID: 8136)
      • PSINanoRun64.exe (PID: 7512)
      • pnputil.exe (PID: 7516)
      • drvinst.exe (PID: 7956)
      • PSINanoRun64.exe (PID: 3208)
      • pnputil.exe (PID: 1200)
      • PSINanoRun64.exe (PID: 2828)
      • drvinst.exe (PID: 7580)
      • PSINanoRun64.exe (PID: 5680)
      • pnputil.exe (PID: 3652)
      • drvinst.exe (PID: 4384)
      • PSINanoRun64.exe (PID: 3628)
      • pnputil.exe (PID: 7748)
      • PSINanoRun64.exe (PID: 3052)
      • pnputil.exe (PID: 3840)
      • drvinst.exe (PID: 7572)
      • drvinst.exe (PID: 1540)
      • drvinst.exe (PID: 2160)
      • PSINanoRun64.exe (PID: 7808)
      • pnputil.exe (PID: 7668)
      • drvinst.exe (PID: 2428)
    • Checks supported languages

      • PDP.exe (PID: 2624)
      • identity_helper.exe (PID: 7764)
      • Tunnel.exe (PID: 3260)
      • Stub.exe (PID: 5528)
      • Stub.exe (PID: 1796)
      • Tunnel.exe (PID: 1076)
      • Setup.exe (PID: 5752)
      • msiexec.exe (PID: 2976)
      • msiexec.exe (PID: 7712)
      • msiexec.exe (PID: 7292)
      • drvinst.exe (PID: 308)
      • PSINanoRun64.exe (PID: 4228)
      • drvinst.exe (PID: 6712)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 3688)
      • msedge.exe (PID: 1732)
      • msiexec.exe (PID: 6076)
      • msiexec.exe (PID: 2976)
      • msiexec.exe (PID: 7712)
    • Reads the software policy settings

      • Tunnel.exe (PID: 3260)
      • Setup.exe (PID: 5752)
      • msiexec.exe (PID: 2976)
      • msiexec.exe (PID: 7292)
      • drvinst.exe (PID: 3632)
    • Create files in a temporary directory

      • Stub.exe (PID: 5528)
      • PDP.exe (PID: 2624)
      • {72A5356D-A21A-4866-8F41-26C560159243}.exe (PID: 7264)
      • Setup.exe (PID: 5752)
      • msiexec.exe (PID: 6076)
    • Reads the machine GUID from the registry

      • Tunnel.exe (PID: 3260)
      • Stub.exe (PID: 1796)
      • Tunnel.exe (PID: 1076)
      • Setup.exe (PID: 5752)
      • msiexec.exe (PID: 2976)
      • msiexec.exe (PID: 6076)
      • msiexec.exe (PID: 7292)
      • drvinst.exe (PID: 308)
      • drvinst.exe (PID: 3632)
      • drvinst.exe (PID: 7232)
      • drvinst.exe (PID: 3060)
      • drvinst.exe (PID: 6832)
    • Creates files in the program directory

      • Tunnel.exe (PID: 3260)
      • Setup.exe (PID: 5752)
    • Application launched itself

      • msedge.exe (PID: 3688)
      • msiexec.exe (PID: 2976)
    • Checks proxy server information

      • Stub.exe (PID: 1796)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 2976)
    • Reads security settings of Internet Explorer

      • ie4uinit.exe (PID: 3124)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
311
Monitored processes
176
Malicious processes
23
Suspicious processes
17

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs pdp.exe no specs pdp.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs tunnel.exe no specs stub.exe msedge.exe no specs stub.exe msedge.exe no specs msedge.exe no specs msedge.exe {72a5356d-a21a-4866-8f41-26c560159243}.exe msedge.exe no specs msedge.exe no specs tunnel.exe no specs setup.exe no specs msedge.exe no specs tracelog.exe no specs conhost.exe no specs psancu.exe no specs msiexec.exe msiexec.exe psmsiexe.exe no specs msiexec.exe msiexec.exe no specs psancu.exe no specs psinanorun64.exe no specs psinanorun64.exe no specs msedge.exe no specs msedge.exe no specs psinanorun64.exe no specs ie4uinit.exe no specs ie4uinit.exe no specs psancu.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs msedge.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe pnputil.exe conhost.exe no specs drvinst.exe psinanorun64.exe no specs pnputil.exe no specs conhost.exe no specs drvinst.exe no specs drvinst.exe no specs drvinst.exe no specs psinanorun64.exe no specs certutil.exe no specs conhost.exe no specs hydra.sdk.windows.service.exe hydra.sdk.windows.service.subinacl.exe conhost.exe no specs psanhost.exe no specs psuaservice.exe no specs pselamsvc.exe no specs psinanorun64.exe no specs psanhost.exe psuaservice.exe no specs pselamsvc.exe no specs pselamsvc.exe no specs psancu.exe no specs psancu.exe no specs psancu.exe psuaconsole.exe psuamain.exe no specs msiexec.exe no specs psuaconsole.exe msiexec.exe no specs agentsvc.exe no specs agentsvc.exe no specs tracelog.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
308DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{ff1b2862-62c6-d547-bc7e-e59bc06ecffa}\psinelam.inf" "9" "4a1d56e27" "00000000000000EC" "WinSta0\Default" "00000000000001D4" "208" "C:\Program Files (x86)\Panda Security\Panda Security Protection\Drivers\psinelam\W10"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepnputil.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
436"C:\Users\admin\AppData\Local\Temp\{3980162D-8CA6-4D49-9F46-CAEAD7435994}\PSINanoRun64.exe" /RemoveInvalidInfs:"NNSNAHS|NETIMFLT" C:\Users\admin\AppData\Local\Temp\{3980162D-8CA6-4D49-9F46-CAEAD7435994}\PSINanoRun64.exemsiexec.exe
User:
SYSTEM
Company:
Panda Security, S.L.
Integrity Level:
SYSTEM
Description:
Panda Setup Bootstrap Run Utilities
Exit code:
0
Version:
7.10.3.0
524"C:\Users\admin\AppData\Local\Temp\{3980162D-8CA6-4D49-9F46-CAEAD7435994}\PSINanoRun64.exe" /InstallDriver:"C:\Program Files (x86)\Panda Security\Panda Security Protection\Drivers\NNSProt\NNSProt.inf" /HasCatalog:"TRUE" C:\Users\admin\AppData\Local\Temp\{3980162D-8CA6-4D49-9F46-CAEAD7435994}\PSINanoRun64.exe
msiexec.exe
User:
SYSTEM
Company:
Panda Security, S.L.
Integrity Level:
SYSTEM
Description:
Panda Setup Bootstrap Run Utilities
Exit code:
0
Version:
7.10.3.0
556"C:\WINDOWS\system32\certutil.exe" -addstore root "C:\Users\admin\AppData\Local\Temp\7zS06C5E395\Program Files\Panda Security\Panda Cloud Antivirus\wbsnca.crt"C:\Windows\SysWOW64\certutil.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
CertUtil.exe
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
628"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7140 --field-trial-handle=2312,i,10819627677907838640,7828989206291435508,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
640"C:\Program Files (x86)\Panda Security\Panda Security Protection\pselamsvc.exe" -protectC:\Program Files (x86)\Panda Security\Panda Security Protection\pselamsvc.exemsiexec.exe
User:
SYSTEM
Company:
Panda Security S.L.
Integrity Level:
SYSTEM
Description:
Antimalware service protection
Exit code:
0
Version:
1.0.0.5
1016"C:\Users\admin\AppData\Local\Temp\{3980162D-8CA6-4D49-9F46-CAEAD7435994}\PSINanoRun64.exe" /InstallDriver:"C:\Program Files (x86)\Panda Security\Panda Security Protection\Drivers\psinelam\W10\psinelam.inf" /HasCatalog:"TRUE" C:\Users\admin\AppData\Local\Temp\{3980162D-8CA6-4D49-9F46-CAEAD7435994}\PSINanoRun64.exe
msiexec.exe
User:
SYSTEM
Company:
Panda Security, S.L.
Integrity Level:
SYSTEM
Description:
Panda Setup Bootstrap Run Utilities
Exit code:
0
Version:
7.10.3.0
1076".\Tunnel.exe" /ConfigurationFile:"C:\ProgramData\Panda Security\PSLogs\C9F1\CloudAvBootstrap.xml"C:\Users\admin\AppData\Local\Temp\7zS06C5E395\Tunnel.exe{72A5356D-A21A-4866-8F41-26C560159243}.exe
User:
admin
Company:
Panda Security, S.L.
Integrity Level:
HIGH
Description:
Panda Tunnel
Exit code:
0
Version:
7.10.3.0
Modules
Images
c:\users\admin\appdata\local\temp\7zs06c5e395\tunnel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1200"C:\WINDOWS\system32\\pnputil.exe" /add-driver "C:\Program Files (x86)\Panda Security\Panda Security Protection\Drivers\NNSPop3\NNSPop3.inf" /installC:\Windows\System32\pnputil.exe
PSINanoRun64.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft PnP Utility - Tool to add, delete, export, and enumerate driver packages.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Total events
119 394
Read events
118 226
Write events
1 149
Delete events
19

Modification events

(PID) Process:(3688) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262892
Operation:writeName:WindowTabManagerFileMappingId
Value:
{547BF2BB-0262-4776-9E62-708F6ABF362F}
(PID) Process:(3688) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262892
Operation:writeName:WindowTabManagerFileMappingId
Value:
{BC7A37EE-69EB-4C15-A984-80937BD73911}
(PID) Process:(3688) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3688) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3688) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3688) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3688) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
B52FC093418A2F00
(PID) Process:(3688) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
D579C993418A2F00
(PID) Process:(3688) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
9CD40494418A2F00
(PID) Process:(3688) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MicrosoftEdgeAutoLaunch_29EBC4579851B72EE312C449CF839B1A
Value:
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
Executable files
1 643
Suspicious files
1 259
Text files
1 426
Unknown types
452

Dropped files

PID
Process
Filename
Type
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF13545d.TMP
MD5:
SHA256:
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF13545d.TMP
MD5:
SHA256:
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF13545d.TMP
MD5:
SHA256:
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF13546c.TMP
MD5:
SHA256:
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF13547c.TMP
MD5:
SHA256:
3688msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
76
TCP/UDP connections
79
DNS requests
77
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7676
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0c269ced-c74b-4e70-9b58-6e7999b292c0?P1=1736915290&P2=404&P3=2&P4=YhgKBybsCEa3FpjJNee%2bTtTSNvPJ27e7k%2b4ttTEEtGOhEwq8jftfc0WTehgzt3Dzewn34U47DCb5W6Fv5Jr54g%3d%3d
unknown
whitelisted
7676
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0c269ced-c74b-4e70-9b58-6e7999b292c0?P1=1736915290&P2=404&P3=2&P4=YhgKBybsCEa3FpjJNee%2bTtTSNvPJ27e7k%2b4ttTEEtGOhEwq8jftfc0WTehgzt3Dzewn34U47DCb5W6Fv5Jr54g%3d%3d
unknown
whitelisted
7676
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0c269ced-c74b-4e70-9b58-6e7999b292c0?P1=1736915290&P2=404&P3=2&P4=YhgKBybsCEa3FpjJNee%2bTtTSNvPJ27e7k%2b4ttTEEtGOhEwq8jftfc0WTehgzt3Dzewn34U47DCb5W6Fv5Jr54g%3d%3d
unknown
whitelisted
7676
svchost.exe
HEAD
200
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/fb6dd03b-99d7-4cc8-a878-91c8e655c2d3?P1=1736915288&P2=404&P3=2&P4=I5Sik%2bXtJ3QRnNYjKjWe49bb4YKlZK62mn%2bHmkegeVJdqkfGdlZwClHx%2fXMfQ6G0IHuD7Hqzbmyf3rRW1RyO%2bA%3d%3d
unknown
whitelisted
6388
msedge.exe
GET
204
13.107.6.158:80
http://edge-http.microsoft.com/captiveportal/generate_204
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7676
svchost.exe
HEAD
200
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0c269ced-c74b-4e70-9b58-6e7999b292c0?P1=1736915290&P2=404&P3=2&P4=YhgKBybsCEa3FpjJNee%2bTtTSNvPJ27e7k%2b4ttTEEtGOhEwq8jftfc0WTehgzt3Dzewn34U47DCb5W6Fv5Jr54g%3d%3d
unknown
whitelisted
6784
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2040
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
6388
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3688
msedge.exe
239.255.255.250:1900
whitelisted
6388
msedge.exe
13.107.21.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6388
msedge.exe
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6388
msedge.exe
13.107.253.45:443
edge-mobile-static.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6388
msedge.exe
2.16.168.101:443
acs.pandasoftware.com
Akamai International B.V.
RU
whitelisted
6388
msedge.exe
2.16.168.107:443
bzib.nelreports.net
Akamai International B.V.
RU
whitelisted

DNS requests

Domain
IP
Reputation
config.edge.skype.com
  • 13.107.42.16
whitelisted
acs.pandasoftware.com
  • 2.16.168.101
  • 2.16.168.119
  • 23.50.131.30
  • 23.50.131.26
whitelisted
edge.microsoft.com
  • 13.107.21.239
  • 204.79.197.239
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.253.45
whitelisted
bzib.nelreports.net
  • 2.16.168.107
  • 2.16.168.113
  • 23.216.77.175
  • 23.216.77.152
whitelisted
edge-http.microsoft.com
  • 13.107.6.158
whitelisted
www.bing.com
  • 2.23.227.198
  • 2.23.227.202
  • 2.23.227.208
  • 2.23.227.221
  • 2.23.227.215
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.22
  • 40.126.32.72
  • 40.126.32.76
  • 40.126.32.136
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info