File name:

bad-piggies-1.5.1-installer_qJU1-a1.exe

Full analysis: https://app.any.run/tasks/61753c60-94ef-41df-8371-2f084fd4bb2f
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 10, 2025, 21:08:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
arch-html
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

E261163C31DA0A883AD918E09627262D

SHA1:

33758B096F814EDB22511E6D021613CB280568A6

SHA256:

B63AA6EEF6DC1BB6FB087E2B15652B8FEE485D368537D12B4347E684C0978EF9

SSDEEP:

49152:z7HecD4dnbibBlaF8pb6fySgHq7hTOuc5i8HWkWG5IIebyttaaWlJ275XpPRniVn:/+cD4dnzF8pefyJHmhTw5i82JLvaGgFS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • servicehost.exe (PID: 7772)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 5036)
      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • saBSI.exe (PID: 3988)
      • installer.exe (PID: 7604)
    • Executable content was dropped or overwritten

      • bad-piggies-1.5.1-installer_qJU1-a1.exe (PID: 6576)
      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • bad-piggies-1.5.1-installer_qJU1-a1.exe (PID: 2612)
      • avg_antivirus_free_online_setup.exe (PID: 6540)
      • avg_antivirus_free_setup.exe (PID: 2676)
      • saBSI.exe (PID: 3988)
      • installer.exe (PID: 4144)
      • icarus.exe (PID: 1704)
      • icarus.exe (PID: 7472)
      • installer.exe (PID: 7604)
    • Reads the Windows owner or organization settings

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
    • Checks Windows Trust Settings

      • saBSI.exe (PID: 3988)
      • installer.exe (PID: 7604)
      • servicehost.exe (PID: 7772)
      • updater.exe (PID: 6960)
    • Executes application which crashes

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
    • Adds/modifies Windows certificates

      • saBSI.exe (PID: 3988)
      • servicehost.exe (PID: 7772)
    • Starts itself from another location

      • icarus.exe (PID: 1704)
    • The process verifies whether the antivirus software is installed

      • installer.exe (PID: 7604)
      • uihost.exe (PID: 2512)
      • updater.exe (PID: 6960)
      • installer.exe (PID: 4144)
      • servicehost.exe (PID: 7772)
      • icarus.exe (PID: 7480)
      • icarus.exe (PID: 7472)
    • The process creates files with name similar to system file names

      • installer.exe (PID: 7604)
      • icarus.exe (PID: 7472)
    • Creates/Modifies COM task schedule object

      • installer.exe (PID: 7604)
    • Process drops legitimate windows executable

      • icarus.exe (PID: 7472)
      • installer.exe (PID: 7604)
    • The process drops C-runtime libraries

      • icarus.exe (PID: 7472)
    • Executes as Windows Service

      • servicehost.exe (PID: 7772)
    • Creates a software uninstall entry

      • installer.exe (PID: 7604)
      • servicehost.exe (PID: 7772)
    • Hides command output

      • cmd.exe (PID: 6848)
    • Starts CMD.EXE for commands execution

      • servicehost.exe (PID: 7772)
      • updater.exe (PID: 6960)
    • Reads Mozilla Firefox installation path

      • servicehost.exe (PID: 7772)
      • uihost.exe (PID: 2512)
    • Searches for installed software

      • updater.exe (PID: 6960)
    • Drops a system driver (possible attempt to evade defenses)

      • icarus.exe (PID: 7472)
  • INFO

    • Checks supported languages

      • bad-piggies-1.5.1-installer_qJU1-a1.exe (PID: 2612)
      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 5036)
      • bad-piggies-1.5.1-installer_qJU1-a1.exe (PID: 6576)
      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • avg_antivirus_free_setup.exe (PID: 2676)
      • icarus.exe (PID: 1704)
      • installer.exe (PID: 4144)
      • icarus.exe (PID: 7472)
      • installer.exe (PID: 7604)
      • icarus.exe (PID: 7480)
      • uihost.exe (PID: 2512)
      • servicehost.exe (PID: 7772)
      • identity_helper.exe (PID: 7072)
      • identity_helper.exe (PID: 7020)
    • Process checks computer location settings

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 5036)
      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • servicehost.exe (PID: 7772)
    • Checks proxy server information

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • avg_antivirus_free_online_setup.exe (PID: 6540)
      • WerFault.exe (PID: 6756)
      • WerFault.exe (PID: 7360)
    • Create files in a temporary directory

      • bad-piggies-1.5.1-installer_qJU1-a1.exe (PID: 2612)
      • bad-piggies-1.5.1-installer_qJU1-a1.exe (PID: 6576)
      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • saBSI.exe (PID: 3988)
    • Reads the computer name

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 5036)
      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • avg_antivirus_free_online_setup.exe (PID: 6540)
      • icarus.exe (PID: 1704)
      • icarus.exe (PID: 7480)
      • identity_helper.exe (PID: 7736)
      • servicehost.exe (PID: 7772)
      • uihost.exe (PID: 2512)
    • Reads the machine GUID from the registry

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • saBSI.exe (PID: 3988)
      • avg_antivirus_free_setup.exe (PID: 2676)
      • avg_antivirus_free_online_setup.exe (PID: 6540)
      • icarus.exe (PID: 1704)
      • icarus.exe (PID: 7472)
      • installer.exe (PID: 7604)
      • icarus.exe (PID: 7480)
      • servicehost.exe (PID: 7772)
      • uihost.exe (PID: 2512)
      • updater.exe (PID: 6960)
    • The sample compiled with english language support

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • avg_antivirus_free_setup.exe (PID: 2676)
      • avg_antivirus_free_online_setup.exe (PID: 6540)
      • icarus.exe (PID: 1704)
      • saBSI.exe (PID: 3988)
      • installer.exe (PID: 4144)
      • installer.exe (PID: 7604)
      • icarus.exe (PID: 7472)
    • Reads the software policy settings

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
      • avg_antivirus_free_setup.exe (PID: 2676)
      • saBSI.exe (PID: 3988)
      • WerFault.exe (PID: 6756)
      • WerFault.exe (PID: 7360)
      • installer.exe (PID: 7604)
      • uihost.exe (PID: 2512)
      • updater.exe (PID: 6960)
    • Creates files in the program directory

      • saBSI.exe (PID: 3988)
      • avg_antivirus_free_online_setup.exe (PID: 6540)
      • icarus.exe (PID: 1704)
      • installer.exe (PID: 4144)
      • installer.exe (PID: 7604)
      • icarus.exe (PID: 7472)
      • servicehost.exe (PID: 7772)
      • uihost.exe (PID: 2512)
      • icarus.exe (PID: 7480)
    • Sends debugging messages

      • saBSI.exe (PID: 3988)
      • installer.exe (PID: 7604)
    • The process uses the downloaded file

      • bad-piggies-1.5.1-installer_qJU1-a1.tmp (PID: 6660)
    • Manual execution by a user

      • msedge.exe (PID: 6092)
      • msedge.exe (PID: 8996)
    • Application launched itself

      • msedge.exe (PID: 6432)
      • msedge.exe (PID: 6092)
      • msedge.exe (PID: 9164)
      • msedge.exe (PID: 2448)
    • Reads CPU info

      • icarus.exe (PID: 1704)
      • icarus.exe (PID: 7480)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6756)
      • WerFault.exe (PID: 7360)
    • Reads Environment values

      • icarus.exe (PID: 7472)
      • identity_helper.exe (PID: 7736)
    • The sample compiled with czech language support

      • icarus.exe (PID: 7472)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:15 14:54:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741888
InitializedDataSize: 89600
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 4.11.2.1487
ProductVersionNumber: 4.11.2.1487
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Softonic International SA
FileVersion: 4.11.2.1487
LegalCopyright: ©2023 Softonic International SA
OriginalFileName:
ProductName: Softonic International SA
ProductVersion: 4.11.2.1487
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
269
Monitored processes
129
Malicious processes
12
Suspicious processes
3

Behavior graph

Click at the process to see the details
start bad-piggies-1.5.1-installer_qju1-a1.exe bad-piggies-1.5.1-installer_qju1-a1.tmp no specs bad-piggies-1.5.1-installer_qju1-a1.exe bad-piggies-1.5.1-installer_qju1-a1.tmp sabsi.exe avg_antivirus_free_setup.exe avg_antivirus_free_online_setup.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs werfault.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs icarus.exe msedge.exe no specs installer.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs werfault.exe icarus.exe icarus.exe installer.exe identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs servicehost.exe uihost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs updater.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2612"C:\Users\admin\Desktop\bad-piggies-1.5.1-installer_qJU1-a1.exe" C:\Users\admin\Desktop\bad-piggies-1.5.1-installer_qJU1-a1.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Softonic International SA
Exit code:
3221226525
Version:
4.11.2.1487
Modules
Images
c:\users\admin\desktop\bad-piggies-1.5.1-installer_qju1-a1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
5036"C:\Users\admin\AppData\Local\Temp\is-U1DAP.tmp\bad-piggies-1.5.1-installer_qJU1-a1.tmp" /SL5="$502F2,837536,832512,C:\Users\admin\Desktop\bad-piggies-1.5.1-installer_qJU1-a1.exe" C:\Users\admin\AppData\Local\Temp\is-U1DAP.tmp\bad-piggies-1.5.1-installer_qJU1-a1.tmpbad-piggies-1.5.1-installer_qJU1-a1.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
3221226525
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-u1dap.tmp\bad-piggies-1.5.1-installer_qju1-a1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
6576"C:\Users\admin\Desktop\bad-piggies-1.5.1-installer_qJU1-a1.exe" /SPAWNWND=$50356 /NOTIFYWND=$502F2 C:\Users\admin\Desktop\bad-piggies-1.5.1-installer_qJU1-a1.exe
bad-piggies-1.5.1-installer_qJU1-a1.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
Softonic International SA
Exit code:
3221226525
Version:
4.11.2.1487
Modules
Images
c:\users\admin\desktop\bad-piggies-1.5.1-installer_qju1-a1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
6660"C:\Users\admin\AppData\Local\Temp\is-4PAB8.tmp\bad-piggies-1.5.1-installer_qJU1-a1.tmp" /SL5="$80354,837536,832512,C:\Users\admin\Desktop\bad-piggies-1.5.1-installer_qJU1-a1.exe" /SPAWNWND=$50356 /NOTIFYWND=$502F2 C:\Users\admin\AppData\Local\Temp\is-4PAB8.tmp\bad-piggies-1.5.1-installer_qJU1-a1.tmp
bad-piggies-1.5.1-installer_qJU1-a1.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
3221226525
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-4pab8.tmp\bad-piggies-1.5.1-installer_qju1-a1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
3988"C:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component0_extract\saBSI.exe" /affid 91082 PaidDistribution=true CountryCode=GBC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component0_extract\saBSI.exe
bad-piggies-1.5.1-installer_qJU1-a1.tmp
User:
admin
Company:
McAfee, LLC
Integrity Level:
HIGH
Description:
McAfee WebAdvisor(bootstrap installer)
Exit code:
0
Version:
4,1,1,865
Modules
Images
c:\users\admin\appdata\local\temp\is-qm0c8.tmp\component0_extract\sabsi.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
2676"C:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component1_extract\avg_antivirus_free_setup.exe" /silent /ws /psh:92pTuf4SwXjNpjgDe2AIlIpeAUA0FeufdUuqtGHyxHzFytSElipF2GaMo08Q5ugVDgCVoJ5C2BFFUSC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component1_extract\avg_antivirus_free_setup.exe
bad-piggies-1.5.1-installer_qJU1-a1.tmp
User:
admin
Company:
AVG Technologies CZ, s.r.o.
Integrity Level:
HIGH
Description:
AVG Installer
Version:
2.1.99.0
Modules
Images
c:\users\admin\appdata\local\temp\is-qm0c8.tmp\component1_extract\avg_antivirus_free_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6540"C:\WINDOWS\Temp\asw.fd804c00be079807\avg_antivirus_free_online_setup.exe" /silent /ws /psh:92pTuf4SwXjNpjgDe2AIlIpeAUA0FeufdUuqtGHyxHzFytSElipF2GaMo08Q5ugVDgCVoJ5C2BFFUS /cookie:mmm_irs_ppi_902_451_o /ga_clientid:18bfcb4d-b5ba-4546-928e-3217199f286b /edat_dir:C:\WINDOWS\Temp\asw.fd804c00be079807C:\Windows\Temp\asw.fd804c00be079807\avg_antivirus_free_online_setup.exe
avg_antivirus_free_setup.exe
User:
admin
Company:
Gen Digital Inc.
Integrity Level:
HIGH
Description:
AVG Self-Extract Package
Version:
24.12.8365.0
Modules
Images
c:\windows\temp\asw.fd804c00be079807\avg_antivirus_free_online_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
6432"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gsf-fl.softonic.com/5dc/86f/36feabaa82623867c0b9d2b7e287e7bd0f/file?Expires=1710140964&Signature=45eaadc692116584fee1f7368d530d60494da668&url=https://bad-piggies.en.softonic.com&Filename=fileC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exebad-piggies-1.5.1-installer_qJU1-a1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6316"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x310,0x314,0x318,0x308,0x320,0x7ff820de5fd8,0x7ff820de5fe4,0x7ff820de5ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6916"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2372 --field-trial-handle=2384,i,10005203541633205967,6936076521537937425,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
46 719
Read events
46 167
Write events
534
Delete events
18

Modification events

(PID) Process:(6660) bad-piggies-1.5.1-installer_qJU1-a1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Operation:writeName:Implementing
Value:
1C00000001000000E907010005000A001500090015005903010000001E768127E028094199FEB9D127C57AFE
(PID) Process:(6660) bad-piggies-1.5.1-installer_qJU1-a1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000B43473EBA363DB01
(PID) Process:(3988) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:UUID
Value:
{2576B15F-9691-4F6D-94D8-875515A33E8C}
(PID) Process:(3988) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:InstallerFlags
Value:
1
(PID) Process:(6540) avg_antivirus_free_online_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
Operation:writeName:5FD38555-4B16-40AE-9A09-E2C969CB74AF
Value:
F6D4F52220BB5A3D7246A004278BB23F
(PID) Process:(6540) avg_antivirus_free_online_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
Operation:writeName:7CCD586D-2ABC-42FF-A23B-3731F4F183D9
Value:
F6D4F52220BB5A3D7246A004278BB23F
(PID) Process:(3988) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:InstallationID
Value:
UNDEFINED
(PID) Process:(3988) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:CountryCode
Value:
GB
(PID) Process:(3988) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:InstallationStatus
Value:
PENDING
(PID) Process:(3988) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:NEW_USER_STATE
Value:
EXPIRED
Executable files
631
Suspicious files
1 953
Text files
1 233
Unknown types
6

Dropped files

PID
Process
Filename
Type
6660bad-piggies-1.5.1-installer_qJU1-a1.tmpC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\is-JMLNC.tmp
MD5:
SHA256:
6660bad-piggies-1.5.1-installer_qJU1-a1.tmpC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
6576bad-piggies-1.5.1-installer_qJU1-a1.exeC:\Users\admin\AppData\Local\Temp\is-4PAB8.tmp\bad-piggies-1.5.1-installer_qJU1-a1.tmpexecutable
MD5:3662098BC1DAF12A83A57F53FD88C73D
SHA256:9A536702F1A5D233115867B85E75531291E0A31E3EB570B3627AC746D101BC7E
6660bad-piggies-1.5.1-installer_qJU1-a1.tmpC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\is-PHVDM.tmpimage
MD5:AEE8E80B35DCB3CF2A5733BA99231560
SHA256:35BBD8F390865173D65BA2F38320A04755541A0783E9F825FDB9862F80D97AA9
6660bad-piggies-1.5.1-installer_qJU1-a1.tmpC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\x.pngimage
MD5:AD693B4CD2C00A6162C1F8DCA82BB867
SHA256:C773A249E6427B76AB29DC6303193584C5EA7B97B073271A7A69AD8F082B7039
6660bad-piggies-1.5.1-installer_qJU1-a1.tmpC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\AVG_AV.pngimage
MD5:AEE8E80B35DCB3CF2A5733BA99231560
SHA256:35BBD8F390865173D65BA2F38320A04755541A0783E9F825FDB9862F80D97AA9
6660bad-piggies-1.5.1-installer_qJU1-a1.tmpC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\v.pngimage
MD5:94E23586BB0FF2A1BD4E6889155C9DBF
SHA256:940ECF2325D812F8780239B0A1417D8774DE63AF615AC7EA1A8818F22A8D6D72
6660bad-piggies-1.5.1-installer_qJU1-a1.tmpC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\is-ID394.tmpimage
MD5:5FD73821F3F097D177009D88DFD33605
SHA256:A6ECCE54116936CA27D4BE9797E32BF2F3CFC7E41519A23032992970FBD9D3BA
6660bad-piggies-1.5.1-installer_qJU1-a1.tmpC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\WebAdvisor.pngimage
MD5:5FD73821F3F097D177009D88DFD33605
SHA256:A6ECCE54116936CA27D4BE9797E32BF2F3CFC7E41519A23032992970FBD9D3BA
6660bad-piggies-1.5.1-installer_qJU1-a1.tmpC:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component1.zipcompressed
MD5:56B0D3E1B154AE65682C167D25EC94A6
SHA256:434BFC9E005A7C8EE249B62F176979F1B4CDE69484DB1683EA07A63E6C1E93DE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
401
DNS requests
438
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4724
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6756
WerFault.exe
GET
200
23.48.23.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2676
avg_antivirus_free_setup.exe
POST
200
142.250.186.78:80
http://www.google-analytics.com/collect
unknown
whitelisted
4724
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
556
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
8996
svchost.exe
HEAD
200
2.16.168.112:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1736877595&P2=404&P3=2&P4=kDJ1tvJyHBudY8ycB%2f4ttsMmLdbbvh3IVZM1tpA1ueZCAa0oqxAFlWJJWpEPaQp25lnTmE7a8IPgTIisBkuenA%3d%3d
unknown
whitelisted
6756
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1016
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
1176
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
  • 23.48.23.137
  • 23.48.23.141
  • 23.48.23.145
  • 23.48.23.146
  • 23.48.23.149
  • 23.48.23.139
  • 23.48.23.147
  • 23.48.23.138
  • 23.48.23.140
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 184.30.21.171
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
  • 104.126.37.130
  • 104.126.37.153
  • 104.126.37.137
  • 104.126.37.144
  • 104.126.37.139
  • 104.126.37.154
  • 104.126.37.145
  • 104.126.37.184
  • 104.126.37.185
whitelisted
login.live.com
  • 20.190.160.17
  • 20.190.160.20
  • 40.126.32.138
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.14
  • 40.126.32.134
  • 40.126.32.140
  • 40.126.32.136
  • 20.190.160.22
  • 40.126.32.72
  • 40.126.32.133
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
d37yhbgnthy672.cloudfront.net
  • 18.245.62.184
  • 18.245.62.156
  • 18.245.62.181
  • 18.245.62.87
whitelisted
images.sftcdn.net
  • 151.101.1.91
  • 151.101.65.91
  • 151.101.193.91
  • 151.101.129.91
whitelisted

Threats

No threats detected
Process
Message
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-QM0C8.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003