URL:

fortect.com

Full analysis: https://app.any.run/tasks/3a257da6-77e2-4ef6-a45f-9a5690fe79ad
Verdict: Malicious activity
Analysis date: February 23, 2024, 16:42:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

ACB5C79CE7AFF3E9CAF20C407F29CFEF

SHA1:

54CE00064F108EF9240E05EBE16EB26016591357

SHA256:

BFD64CED9F20BF6DA1FF4BFF46EF202AC3417743CE6D7562EBEBD505CC179D31

SSDEEP:

3:QRt2:Qm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Fortect.exe (PID: 1380)
      • FortectMain.exe (PID: 392)
    • Changes the autorun value in the registry

      • Fortect.exe (PID: 1380)
    • Actions looks like stealing of personal data

      • MainService.exe (PID: 3128)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Fortect.exe (PID: 1380)
      • FortectMain.exe (PID: 392)
    • The process creates files with name similar to system file names

      • Fortect.exe (PID: 1380)
    • Accesses computer name via WMI (SCRIPT)

      • WMIC.exe (PID: 3248)
    • Uses WMIC.EXE to obtain BIOS management information

      • cmd.exe (PID: 2736)
    • Starts CMD.EXE for commands execution

      • Fortect.exe (PID: 1380)
    • Reads the Internet Settings

      • WMIC.exe (PID: 3564)
      • WMIC.exe (PID: 3248)
      • Fortect.exe (PID: 1380)
      • WMIC.exe (PID: 3376)
      • WMIC.exe (PID: 3636)
      • FortectMain.exe (PID: 392)
      • FortectMain.exe (PID: 2836)
    • Uses WMIC.EXE to obtain data on the partitioned areas of a physical disk

      • Fortect.exe (PID: 1380)
    • Uses WMIC.EXE to obtain physical disk drive information

      • Fortect.exe (PID: 1380)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 1192)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 3636)
    • Reads security settings of Internet Explorer

      • Fortect.exe (PID: 1380)
      • MainDaemon.exe (PID: 3616)
    • Process drops legitimate windows executable

      • Fortect.exe (PID: 1380)
    • Reads settings of System Certificates

      • Fortect.exe (PID: 1380)
      • MainDaemon.exe (PID: 3616)
      • FortectMain.exe (PID: 392)
    • Checks Windows Trust Settings

      • Fortect.exe (PID: 1380)
      • MainDaemon.exe (PID: 3616)
      • MainService.exe (PID: 3128)
    • Drops 7-zip archiver for unpacking

      • Fortect.exe (PID: 1380)
    • Executes as Windows Service

      • MainDaemon.exe (PID: 948)
      • MainService.exe (PID: 3128)
    • Creates a software uninstall entry

      • Fortect.exe (PID: 1380)
    • Application launched itself

      • FortectMain.exe (PID: 392)
    • Searches for installed software

      • MainService.exe (PID: 3128)
      • MainDaemon.exe (PID: 948)
    • Reads the date of Windows installation

      • MainService.exe (PID: 3128)
    • Reads Internet Explorer settings

      • MainService.exe (PID: 3128)
    • Read startup parameters

      • MainService.exe (PID: 3128)
    • Reads Microsoft Outlook installation path

      • MainService.exe (PID: 3128)
    • Adds/modifies Windows certificates

      • MainService.exe (PID: 3128)
  • INFO

    • The process uses the downloaded file

      • msedge.exe (PID: 3700)
      • msedge.exe (PID: 2404)
      • Fortect.exe (PID: 1380)
    • Drops the executable file immediately after the start

      • msedge.exe (PID: 3700)
      • msedge.exe (PID: 1040)
    • Application launched itself

      • msedge.exe (PID: 3700)
      • msedge.exe (PID: 3388)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 3700)
      • msedge.exe (PID: 1040)
    • Create files in a temporary directory

      • Fortect.exe (PID: 1380)
      • FortectMain.exe (PID: 392)
    • Reads Environment values

      • Fortect.exe (PID: 1380)
      • MainService.exe (PID: 3312)
      • MainDaemon.exe (PID: 948)
      • MainService.exe (PID: 3128)
      • FortectMain.exe (PID: 392)
      • MainDaemon.exe (PID: 3616)
    • Checks supported languages

      • Fortect.exe (PID: 1380)
      • MainDaemon.exe (PID: 3616)
      • MainDaemon.exe (PID: 948)
      • MainService.exe (PID: 3312)
      • FortectTray.exe (PID: 1264)
      • FortectMain.exe (PID: 392)
      • FortectMain.exe (PID: 1196)
      • FortectMain.exe (PID: 3548)
      • FortectMain.exe (PID: 2836)
      • FortectMain.exe (PID: 1236)
      • wmpnscfg.exe (PID: 992)
      • MainService.exe (PID: 3128)
    • Reads the computer name

      • Fortect.exe (PID: 1380)
      • MainDaemon.exe (PID: 3616)
      • MainDaemon.exe (PID: 948)
      • MainService.exe (PID: 3312)
      • MainService.exe (PID: 3128)
      • FortectMain.exe (PID: 392)
      • FortectMain.exe (PID: 3548)
      • FortectMain.exe (PID: 1196)
      • FortectMain.exe (PID: 1236)
      • wmpnscfg.exe (PID: 992)
      • FortectMain.exe (PID: 2836)
    • Creates files or folders in the user directory

      • Fortect.exe (PID: 1380)
      • FortectMain.exe (PID: 392)
      • FortectMain.exe (PID: 3548)
    • Reads the machine GUID from the registry

      • Fortect.exe (PID: 1380)
      • MainDaemon.exe (PID: 3616)
      • MainDaemon.exe (PID: 948)
      • MainService.exe (PID: 3128)
      • FortectMain.exe (PID: 392)
    • Checks proxy server information

      • Fortect.exe (PID: 1380)
    • Reads the software policy settings

      • Fortect.exe (PID: 1380)
      • MainDaemon.exe (PID: 3616)
      • FortectMain.exe (PID: 392)
      • MainService.exe (PID: 3128)
    • Dropped object may contain TOR URL's

      • Fortect.exe (PID: 1380)
    • Creates files in the program directory

      • Fortect.exe (PID: 1380)
      • MainDaemon.exe (PID: 3616)
      • MainDaemon.exe (PID: 948)
      • MainService.exe (PID: 3312)
      • MainService.exe (PID: 3128)
    • Manual execution by a user

      • FortectMain.exe (PID: 392)
      • wmpnscfg.exe (PID: 992)
    • Reads product name

      • FortectMain.exe (PID: 392)
    • Process checks computer location settings

      • FortectMain.exe (PID: 2836)
      • FortectMain.exe (PID: 392)
      • MainService.exe (PID: 3128)
    • Process checks the number of cached credentials

      • MainService.exe (PID: 3128)
    • Reads mouse settings

      • MainService.exe (PID: 3128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
93
Monitored processes
44
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs fortect.exe no specs fortect.exe cmd.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs msedge.exe no specs msedge.exe no specs maindaemon.exe maindaemon.exe mainservice.exe no specs mainservice.exe fortecttray.exe no specs fortectmain.exe fortectmain.exe no specs fortectmain.exe fortectmain.exe no specs fortectmain.exe no specs wmpnscfg.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2200 --field-trial-handle=1356,i,728643502309601401,8897656117155358800,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
392"C:\Program Files\Fortect\FortectMain.exe" --lang=en --runId=71c779a2-ee46-4d34-adcd-59ed0f2f44a3C:\Program Files\Fortect\FortectMain.exe
explorer.exe
User:
admin
Company:
Fortect LTD®
Integrity Level:
MEDIUM
Description:
Fortect Main
Exit code:
0
Version:
6.1.0.0
Modules
Images
c:\program files\fortect\fortectmain.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\fortect\ffmpeg.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
448"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1564 --field-trial-handle=1356,i,728643502309601401,8897656117155358800,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
680"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3952 --field-trial-handle=1356,i,728643502309601401,8897656117155358800,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
948"C:\Program Files\Fortect\bin\MainDaemon.exe"C:\Program Files\Fortect\bin\MainDaemon.exe
services.exe
User:
SYSTEM
Company:
Fortect Ltd.
Integrity Level:
SYSTEM
Description:
Fortect Daemon
Exit code:
0
Version:
6.1.0.0
Modules
Images
c:\program files\fortect\bin\maindaemon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
992"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1040"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1356,i,728643502309601401,8897656117155358800,131072 /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1192C:\Windows\system32\cmd.exe /Q /C "%SYSTEMROOT%\System32\wbem\wmic.exe" path Win32_ComputerSystemProduct get UUIDC:\Windows\System32\cmd.exeFortect.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1196"C:\Program Files\Fortect\FortectMain.exe" --type=gpu-process --user-data-dir="C:\Users\admin\AppData\Roaming\Fortect" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1096 --field-trial-handle=1132,i,2173179920320366868,12698756958868249665,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2C:\Program Files\Fortect\FortectMain.exeFortectMain.exe
User:
admin
Company:
Fortect LTD®
Integrity Level:
LOW
Description:
Fortect Main
Exit code:
0
Version:
6.1.0.0
Modules
Images
c:\program files\fortect\fortectmain.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\fortect\ffmpeg.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1236"C:\Program Files\Fortect\FortectMain.exe" --type=gpu-process --user-data-dir="C:\Users\admin\AppData\Roaming\Fortect" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1384 --field-trial-handle=1132,i,2173179920320366868,12698756958868249665,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2C:\Program Files\Fortect\FortectMain.exeFortectMain.exe
User:
admin
Company:
Fortect LTD®
Integrity Level:
LOW
Description:
Fortect Main
Exit code:
0
Version:
6.1.0.0
Modules
Images
c:\program files\fortect\fortectmain.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\fortect\ffmpeg.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
Total events
119 005
Read events
118 763
Write events
212
Delete events
30

Modification events

(PID) Process:(3700) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3700) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3700) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3700) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3700) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3700) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(3700) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3700) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
449AA289A5702F00
(PID) Process:(3700) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\FirstNotDefault
Operation:delete valueName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
(PID) Process:(3700) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
Executable files
59
Suspicious files
228
Text files
139
Unknown types
89

Dropped files

PID
Process
Filename
Type
3700msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF17f4c0.TMP
MD5:
SHA256:
3700msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3700msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF17f4ef.TMP
MD5:
SHA256:
3700msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
3700msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF17f4fe.TMP
MD5:
SHA256:
3700msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
3700msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datbinary
MD5:DF0BCCD68449F07F531D76F53C718178
SHA256:12025F4DA9E53A8B91892D4F6E6A9B89513F3488BFE9F1EEEC3C05F7EF96BDD8
3652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics.pmabinary
MD5:886E82F2CA62ECCCE64601B30592078A
SHA256:E5E13D53601100FF3D6BB71514CBCCC4C73FE9B7EF5E930100E644187B42948E
3700msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:0FFCDE9AA0F7BF34DC35C8AEADCA5BA5
SHA256:5A9F6E7DDB2557B2C5921117AE4D6A407BB2504F6728DD1352FF88492E0ECC3D
3700msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Variationsbinary
MD5:961E3604F228B0D10541EBF921500C86
SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
59
TCP/UDP connections
152
DNS requests
81
Threats
57

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1380
Fortect.exe
GET
304
184.24.77.194:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?41950290e2f855be
unknown
unknown
3128
MainService.exe
GET
301
34.225.4.114:80
http://cloud.toppcprotection.com/lib/cloud-scan.php?param1=wx2Z/yprmlGv8NAb93i0A4ghJsXlfgtehOvqt/6FVDuuThAVDz0qn45uaOtV9mNs0f2rm5lXRo2LODte56JHFqGnaMJEDFmeCgGY/jKep0hWyy0FqWzgcV+zwm2cVCmgOeUKL3s0mthCotQIwSL2/iaR2AT+iAPLqsCh29nAAxVjMp8zTKx4inALxluujKVEZhnXbFNS+kWNKWWYX3+UKXm5Cp2ZaJy8b5Vv5i6R9dCfk8M/5CcQw6cEy4/SDGum6CuOMK1Td3EkyLw+2gXxow==
unknown
html
641 b
unknown
3128
MainService.exe
GET
301
34.225.4.114:80
http://cloud.toppcprotection.com/lib/cloud-scan.php?param1=wx2Z/yprmlGv8NAb93i0A5nmpJtuaxEvON+yt46QhY7E9f4bb0JBYKHQwwOUBxCecv7B/6rROXsyRmhj6rFy5XgoAt0rBV1mCAP3s/Mf8oqSVyCeJoSqeZMPWKVM8WJeZo4wYxmjCk+9QByObtv4gtYvQ1aqF3UCcvmZ3qzqvzw2RzUsZ+7u/VbgDxMETXghK1SLu6M7TqNt3gg1QkLqDHO/nEFXWs4cdgkLzwbSTsUbQbeCLaqrQIRQUH3wHi5Md2PwKf6AlS/p611JprheyQ==
unknown
html
641 b
unknown
1380
Fortect.exe
GET
200
142.250.185.163:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
unknown
binary
724 b
unknown
1380
Fortect.exe
GET
200
142.250.185.163:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
3128
MainService.exe
POST
200
34.225.4.114:80
http://cloud.toppcprotection.com/events/scandblatest.php
unknown
xml
32.0 Kb
unknown
3128
MainService.exe
GET
200
34.225.4.114:80
http://cloud.toppcprotection.com/events/cloud-scan.php?param1=wx2Z/yprmlGv8NAb93i0A5nmpJtuaxEvON+yt46QhY7E9f4bb0JBYKHQwwOUBxCecv7B/6rROXsyRmhj6rFy5XgoAt0rBV1mCAP3s/Mf8oqSVyCeJoSqeZMPWKVM8WJeZo4wYxmjCk+9QByObtv4gtYvQ1aqF3UCcvmZ3qzqvzw2RzUsZ+7u/VbgDxMETXghK1SLu6M7TqNt3gg1QkLqDHO/nEFXWs4cdgkLzwbSTsUbQbeCLaqrQIRQUH3wHi5Md2PwKf6AlS/p611JprheyQ==
unknown
text
44 b
unknown
3128
MainService.exe
GET
301
34.225.4.114:80
http://cloud.toppcprotection.com/lib/cloud-scan.php?param1=wx2Z/yprmlGv8NAb93i0AxEeUI+GuH3ovZfbr/OOjXPwYiN+NtM1Ml0/lATkqnYslGZ7jqZMDEo42gH9C/rY+cwWR13mTDb4Y0PeGNPUyz0Vh0NZhmd84+y6uKyXFroAip53VkmRjjNEMnu7baZrBVoHTVP9oh3llOUfXY1YLTupuBZkx38nixJt4FlCGXpVEH/0o1DeMZXWOgHCNPX/f01AKKUzk3BvmhXkcIqT4CZ4JE7rqiqvv7Af93JtAmyTSowEuw76qoR5hc2FrNjmOw==
unknown
html
641 b
unknown
3128
MainService.exe
GET
200
34.225.4.114:80
http://cloud.toppcprotection.com/events/cloud-scan.php?param1=wx2Z/yprmlGv8NAb93i0A4ghJsXlfgtehOvqt/6FVDuuThAVDz0qn45uaOtV9mNs0f2rm5lXRo2LODte56JHFqGnaMJEDFmeCgGY/jKep0hWyy0FqWzgcV+zwm2cVCmgOeUKL3s0mthCotQIwSL2/iaR2AT+iAPLqsCh29nAAxVjMp8zTKx4inALxluujKVEZhnXbFNS+kWNKWWYX3+UKXm5Cp2ZaJy8b5Vv5i6R9dCfk8M/5CcQw6cEy4/SDGum6CuOMK1Td3EkyLw+2gXxow==
unknown
text
44 b
unknown
3128
MainService.exe
GET
301
34.225.4.114:80
http://cloud.toppcprotection.com/lib/cloud-scan.php?param1=wx2Z/yprmlGv8NAb93i0Awc85i9XCMbCSaN+2ldx12ExMm5iXi/IHFBoHtRINUqmQIsTGAy6+JiGIxRArcl3v1VPWQRYEBUouXa7gUQDVtQxEcNKRsPGHTZyXTROb4FHQN4rsWtKi6vk57N19EnPqJO/yRtJF04mj3RnFpi9MNQyETeZn+b+S6AhmA4RxeH4np6rk/5hG1WOr84N/MhKaCMj+wSZVWyiq9FYKLk6H76ExnbVDpLEL+eL9iNu2se+3e7uFRPvckSIur50bnFO0CVG2CyHbM3rFYY0ZgMFL3o=
unknown
html
661 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3700
msedge.exe
239.255.255.250:1900
unknown
1040
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1040
msedge.exe
13.107.21.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
1040
msedge.exe
172.67.75.40:443
fortect.com
CLOUDFLARENET
US
unknown
1040
msedge.exe
142.250.186.104:443
www.googletagmanager.com
unknown
1040
msedge.exe
18.173.205.71:443
widget.freshworks.com
US
unknown
1040
msedge.exe
216.58.212.138:443
fonts.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
config.edge.skype.com
  • 13.107.42.16
whitelisted
fortect.com
  • 172.67.75.40
  • 104.26.2.16
  • 104.26.3.16
unknown
edge.microsoft.com
  • 13.107.21.239
  • 204.79.197.239
whitelisted
www.fortect.com
  • 172.67.75.40
  • 104.26.2.16
  • 104.26.3.16
unknown
www.googletagmanager.com
  • 142.250.186.104
  • 142.250.186.72
whitelisted
widget.freshworks.com
  • 18.173.205.71
  • 18.173.205.76
  • 18.173.205.50
  • 18.173.205.84
whitelisted
fonts.googleapis.com
  • 216.58.212.138
  • 172.217.18.10
whitelisted
region1.google-analytics.com
  • 216.239.34.36
  • 216.239.32.36
whitelisted
fonts.gstatic.com
  • 142.250.185.131
  • 142.250.186.35
  • 142.250.185.163
whitelisted
region1.analytics.google.com
  • 216.239.34.36
  • 216.239.32.36
whitelisted

Threats

PID
Process
Class
Message
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com)
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com)
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com)
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com)
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed PC Optimizer Software Domain (fortect .com in TLS SNI)
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com)
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com)
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com)
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com)
1040
msedge.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Observed DNS Query to PC Optimizer Software Domain (fortect .com)
Process
Message
Fortect.exe
ExecShellAsUser: got desktop
Fortect.exe
ExecShellAsUser: elevated process detected
Fortect.exe
ExecShellAsUser: thread finished
Fortect.exe
ExecShellAsUser: DLL_PROCESS_DETACH
msedge.exe
[0223/164724.438:ERROR:exception_handler_server.cc(527)] ConnectNamedPipe: The pipe is being closed. (0xE8)