File name:

2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop

Full analysis: https://app.any.run/tasks/275f3ae2-d772-4a0d-943d-16f23dfa7503
Verdict: Malicious activity
Threats:

BlackMoon also known as KrBanker is a trojan aimed at stealing payment credentials. It specializes in man-in-the-browser (MitB) attacks, web injection, and credential theft to compromise users' online banking accounts. It was first noticed in early 2014 attacking banks in South Korea and has impressively evolved since by adding a number of new infiltration techniques and information stealing methods.

Analysis date: June 07, 2025, 00:31:14
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
blackmoon
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

2208ACF5E2A0F7E44ADDCFAF9FF4C35F

SHA1:

16C06EF777273E7B44C6CFC24CD42CEFA53B2222

SHA256:

D7544CAF9F0EA4325F62BAF86A9A2B338EB8E6894831EE93BDF042EB04C54FF1

SSDEEP:

49152:XFxUhnky7BM7W88988Nt5KBBDhzsf9hS1Sx5F2b35tZOP3E/4VhH3QLBf8XcHZ86:3Uhnkyi8qDpsVhS1Sx5HPznWnNHqE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • BLACKMOON has been detected (YARA)

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 5776)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 5776)
    • Reads security settings of Internet Explorer

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 5776)
      • srcree.exe (PID: 2236)
      • 773565.exe (PID: 7500)
      • 682508.exe (PID: 7508)
      • 726583.exe (PID: 1244)
      • 837790.exe (PID: 2116)
      • 340236.exe (PID: 7048)
      • 579136.exe (PID: 7364)
      • 977384.exe (PID: 2796)
      • 134372.exe (PID: 6560)
      • 866133.exe (PID: 7204)
      • 775837.exe (PID: 7768)
      • 234616.exe (PID: 6644)
      • 625328.exe (PID: 6488)
      • 771301.exe (PID: 4424)
      • 906283.exe (PID: 7976)
      • 252466.exe (PID: 5020)
      • 408448.exe (PID: 5428)
      • 258316.exe (PID: 8148)
      • 707305.exe (PID: 7048)
      • 139832.exe (PID: 2108)
      • 120183.exe (PID: 6540)
      • 476265.exe (PID: 4424)
    • Starts itself from another location

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 5776)
    • Reads the date of Windows installation

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 2236)
      • srcree.exe (PID: 5776)
      • 773565.exe (PID: 7500)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
    • Application launched itself

      • srcree.exe (PID: 2236)
      • 773565.exe (PID: 7500)
      • 682508.exe (PID: 7508)
      • 837790.exe (PID: 2116)
      • 726583.exe (PID: 1244)
      • 340236.exe (PID: 7048)
      • 579136.exe (PID: 7364)
      • 866133.exe (PID: 7204)
      • 977384.exe (PID: 2796)
      • 134372.exe (PID: 6560)
      • 775837.exe (PID: 7768)
      • 234616.exe (PID: 6644)
      • 625328.exe (PID: 6488)
      • 771301.exe (PID: 4424)
      • 906283.exe (PID: 7976)
      • 252466.exe (PID: 5020)
      • 408448.exe (PID: 5428)
      • 258316.exe (PID: 8148)
      • 707305.exe (PID: 7048)
      • 139832.exe (PID: 2108)
      • 120183.exe (PID: 6540)
      • 166565.exe (PID: 2064)
      • 493097.exe (PID: 6644)
      • 001401.exe (PID: 6228)
      • 476265.exe (PID: 4424)
      • 157684.exe (PID: 4428)
      • 582666.exe (PID: 8108)
      • 619078.exe (PID: 5596)
      • 051507.exe (PID: 4164)
      • 132058.exe (PID: 2560)
      • 275014.exe (PID: 3272)
      • 300623.exe (PID: 2644)
      • 966333.exe (PID: 1180)
      • 312215.exe (PID: 4208)
      • 467498.exe (PID: 7360)
      • 858102.exe (PID: 7460)
      • 042277.exe (PID: 3976)
      • 298250.exe (PID: 7520)
      • 611230.exe (PID: 4284)
      • 588964.exe (PID: 1532)
      • 238358.exe (PID: 6908)
      • 957113.exe (PID: 1168)
      • 182375.exe (PID: 4424)
      • 016750.exe (PID: 7432)
      • 100125.exe (PID: 1180)
      • 725145.exe (PID: 7884)
      • 601739.exe (PID: 4932)
      • 091454.exe (PID: 7892)
      • 480168.exe (PID: 7308)
      • 695640.exe (PID: 6324)
    • Explorer used for Indirect Command Execution

      • explorer.exe (PID: 6620)
    • Searches for installed software

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
    • There is functionality for taking screenshot (YARA)

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 5776)
    • Executing commands from a ".bat" file

      • explorer.exe (PID: 5332)
    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 5332)
  • INFO

    • The sample compiled with chinese language support

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 5776)
    • Create files in a temporary directory

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 5776)
    • Checks proxy server information

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
    • Checks supported languages

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 5776)
      • srcree.exe (PID: 2236)
      • 773565.exe (PID: 1228)
      • 682508.exe (PID: 1760)
      • 773565.exe (PID: 7500)
      • 682508.exe (PID: 7508)
      • 837790.exe (PID: 2116)
      • 837790.exe (PID: 5304)
      • 726583.exe (PID: 1244)
      • 726583.exe (PID: 4976)
      • 579136.exe (PID: 7364)
      • 340236.exe (PID: 1512)
      • 579136.exe (PID: 680)
      • identity_helper.exe (PID: 7528)
      • 340236.exe (PID: 7048)
      • 866133.exe (PID: 1324)
      • 977384.exe (PID: 2796)
      • 977384.exe (PID: 4068)
      • 134372.exe (PID: 6560)
      • 866133.exe (PID: 7204)
      • 134372.exe (PID: 3100)
      • 775837.exe (PID: 7768)
      • 775837.exe (PID: 6892)
      • 234616.exe (PID: 6644)
      • 234616.exe (PID: 5096)
      • 625328.exe (PID: 6488)
      • 771301.exe (PID: 4424)
      • 625328.exe (PID: 6712)
      • 771301.exe (PID: 2796)
      • 906283.exe (PID: 5588)
      • 906283.exe (PID: 7976)
      • 252466.exe (PID: 5020)
      • 252466.exe (PID: 6560)
      • 408448.exe (PID: 5428)
      • 408448.exe (PID: 7020)
      • 707305.exe (PID: 7048)
      • 258316.exe (PID: 6476)
      • 139832.exe (PID: 2108)
      • 707305.exe (PID: 8128)
      • 139832.exe (PID: 6828)
      • 120183.exe (PID: 6540)
      • 258316.exe (PID: 8148)
      • 120183.exe (PID: 1188)
      • 476265.exe (PID: 4424)
      • 476265.exe (PID: 6660)
    • Reads Environment values

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • identity_helper.exe (PID: 7528)
    • Reads the computer name

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 5776)
      • srcree.exe (PID: 2236)
      • 682508.exe (PID: 7508)
      • 773565.exe (PID: 7500)
      • 837790.exe (PID: 2116)
      • 726583.exe (PID: 1244)
      • 340236.exe (PID: 7048)
      • 579136.exe (PID: 7364)
      • identity_helper.exe (PID: 7528)
      • 977384.exe (PID: 2796)
      • 134372.exe (PID: 6560)
      • 866133.exe (PID: 7204)
      • 775837.exe (PID: 7768)
      • 234616.exe (PID: 6644)
      • 625328.exe (PID: 6488)
      • 771301.exe (PID: 4424)
      • 252466.exe (PID: 5020)
      • 408448.exe (PID: 5428)
      • 258316.exe (PID: 8148)
      • 906283.exe (PID: 7976)
      • 707305.exe (PID: 7048)
      • 139832.exe (PID: 2108)
      • 120183.exe (PID: 6540)
      • 476265.exe (PID: 4424)
    • Process checks computer location settings

      • 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe (PID: 4700)
      • srcree.exe (PID: 2236)
      • srcree.exe (PID: 5776)
      • 773565.exe (PID: 7500)
      • 682508.exe (PID: 7508)
      • 837790.exe (PID: 2116)
      • 726583.exe (PID: 1244)
      • 340236.exe (PID: 7048)
      • 579136.exe (PID: 7364)
      • 977384.exe (PID: 2796)
      • 134372.exe (PID: 6560)
      • 866133.exe (PID: 7204)
      • 775837.exe (PID: 7768)
      • 234616.exe (PID: 6644)
      • 625328.exe (PID: 6488)
      • 771301.exe (PID: 4424)
      • 906283.exe (PID: 7976)
      • 252466.exe (PID: 5020)
      • 408448.exe (PID: 5428)
      • 258316.exe (PID: 8148)
      • 139832.exe (PID: 2108)
      • 707305.exe (PID: 7048)
      • 476265.exe (PID: 4424)
      • 120183.exe (PID: 6540)
    • Creates files or folders in the user directory

      • srcree.exe (PID: 5776)
    • Reads the machine GUID from the registry

      • srcree.exe (PID: 5776)
    • Application launched itself

      • msedge.exe (PID: 5452)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 5332)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:08:17 08:34:04+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 368640
InitializedDataSize: 1241088
UninitializedDataSize: -
EntryPoint: 0x4fd00
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.6.1.1
ProductVersionNumber: 5.6.1.1
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileVersion: 5.6.1.1
FileDescription:
ProductName:
ProductVersion: 5.6.1.1
CompanyName:
LegalCopyright:
Comments: 本程序使用易语言编写(http://www.dywt.com.cn)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
274
Monitored processes
150
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #BLACKMOON 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exe srcree.exe no specs #BLACKMOON srcree.exe 773565.exe no specs 773565.exe no specs 682508.exe no specs 682508.exe no specs msedge.exe explorer.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs explorer.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs 837790.exe no specs 837790.exe no specs 726583.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs 726583.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs 340236.exe no specs 340236.exe no specs msedge.exe no specs msedge.exe no specs 579136.exe no specs 579136.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs 866133.exe no specs 866133.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs 977384.exe no specs 977384.exe no specs msedge.exe no specs 134372.exe no specs 134372.exe no specs 775837.exe no specs 775837.exe no specs 234616.exe no specs 234616.exe no specs msedge.exe no specs msedge.exe no specs 625328.exe no specs 625328.exe no specs 771301.exe no specs 771301.exe no specs 906283.exe no specs 906283.exe no specs 252466.exe no specs 252466.exe no specs 408448.exe no specs 408448.exe no specs 258316.exe no specs 258316.exe no specs 707305.exe no specs 707305.exe no specs slui.exe 139832.exe no specs 139832.exe no specs 120183.exe no specs 120183.exe no specs 476265.exe no specs 476265.exe no specs msedge.exe no specs msedge.exe no specs 001401.exe no specs 001401.exe no specs 157684.exe no specs 157684.exe no specs 582666.exe no specs 582666.exe no specs 493097.exe no specs 493097.exe no specs msedge.exe no specs 619078.exe no specs 619078.exe no specs 051507.exe no specs 051507.exe no specs 132058.exe no specs 132058.exe no specs 275014.exe no specs 275014.exe no specs 166565.exe no specs 166565.exe no specs 300623.exe no specs 300623.exe no specs msedge.exe no specs 695640.exe no specs 695640.exe no specs 966333.exe no specs 966333.exe no specs 312215.exe no specs 312215.exe no specs 467498.exe no specs 467498.exe no specs 858102.exe no specs 858102.exe no specs 042277.exe no specs 042277.exe no specs 298250.exe no specs 298250.exe no specs msedge.exe no specs 588964.exe no specs 588964.exe no specs 611230.exe no specs 611230.exe no specs 957113.exe no specs msedge.exe no specs 957113.exe no specs 182375.exe no specs 182375.exe no specs 238358.exe no specs 238358.exe no specs 725145.exe no specs 725145.exe no specs 016750.exe no specs 016750.exe no specs 100125.exe no specs 100125.exe no specs msedge.exe no specs 601739.exe no specs 601739.exe no specs 091454.exe no specs 091454.exe no specs 480168.exe no specs 480168.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
32"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6356 --field-trial-handle=2580,i,18257755421898278301,16526703508904621768,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
208"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=4732 --field-trial-handle=2580,i,18257755421898278301,16526703508904621768,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
240"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=4204 --field-trial-handle=2580,i,18257755421898278301,16526703508904621768,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
240C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
472"C:\Users\admin\AppData\Roaming\Download\619078.exe" C:\Users\admin\AppData\Roaming\Download\619078.exe619078.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\619078.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
512"C:\Users\admin\AppData\Roaming\Download\091454.exe" C:\Users\admin\AppData\Roaming\Download\091454.exe091454.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\091454.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
680"C:\Users\admin\AppData\Roaming\Download\579136.exe" C:\Users\admin\AppData\Roaming\Download\579136.exe579136.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\579136.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
716"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4780 --field-trial-handle=2580,i,18257755421898278301,16526703508904621768,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
732"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2732 --field-trial-handle=2580,i,18257755421898278301,16526703508904621768,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1168"C:\Users\admin\AppData\Roaming\Download\957113.exe" /ShorttailedrestartC:\Users\admin\AppData\Roaming\Download\957113.exesrcree.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
5.6.1.1
Modules
Images
c:\users\admin\appdata\roaming\download\957113.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
Total events
38 908
Read events
38 852
Write events
56
Delete events
0

Modification events

(PID) Process:(4700) 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings
Operation:writeName:JITDebug
Value:
0
(PID) Process:(4700) 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(4700) 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(4700) 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(4700) 2025-06-07_2208acf5e2a0f7e44addcfaf9ff4c35f_elex_icedid_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2236) srcree.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2236) srcree.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2236) srcree.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2236) srcree.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(7500) 773565.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
63
Suspicious files
542
Text files
57
Unknown types
1

Dropped files

PID
Process
Filename
Type
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Local State~RF121d63.TMP
MD5:
SHA256:
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old~RF121d83.TMP
MD5:
SHA256:
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF121d92.TMP
MD5:
SHA256:
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF121d92.TMP
MD5:
SHA256:
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF121d92.TMP
MD5:
SHA256:
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG.old~RF121d92.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
266
TCP/UDP connections
261
DNS requests
183
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
503
13.107.6.158:443
https://business.bing.com/work/api/v2/tenant/my/settingswithflights?&clienttype=edge-omnibox
unknown
html
13.7 Kb
whitelisted
GET
200
13.107.42.16:443
https://config.edge.skype.com/config/v1/Edge/122.0.2365.59?clientId=4489578223053569932&agents=EdgeFirstRun%2CEdgeFirstRunConfig&osname=win&client=edge&channel=stable&scpfre=0&osarch=x86_64&osver=10.0.19045&wu=1&devicefamily=desktop&uma=0&sessionid=47&mngd=0&installdate=1661339457&edu=0&bphint=2&soobedate=1504771245&fg=1
unknown
binary
839 b
whitelisted
7552
RUXIMICS.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
150.171.28.11:443
https://edge.microsoft.com/serviceexperimentation/v3/?osname=win&channel=stable&osver=10.0.19045&devicefamily=desktop&installdate=1661339457&clientversion=122.0.2365.59&experimentationmode=2&scpguard=0&scpfull=0&scpver=0
unknown
binary
446 b
whitelisted
7552
RUXIMICS.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
404
13.107.6.158:443
https://business.bing.com/api/v1/user/token/microsoftgraph?&clienttype=edge-omnibox
unknown
GET
106.63.24.67:443
https://hao.360.cn/?src=lm&ls=n6abbbb598c
unknown
GET
200
13.107.246.45:443
https://edge-mobile-static.azureedge.net/eccp/get?settenant=edge-config&setplatform=win&setmkt=en-US&setchannel=stable
unknown
GET
503
13.107.6.158:443
https://business.bing.com/work/api/v2/tenant/my/settingswithflights?&clienttype=edge-omnibox
unknown
html
13.7 Kb
whitelisted
GET
503
13.107.6.158:443
https://business.bing.com/work/api/v2/tenant/my/settingswithflights?&clienttype=edge-omnibox
unknown
html
13.7 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
7552
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7552
RUXIMICS.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
7552
RUXIMICS.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
5452
msedge.exe
239.255.255.250:1900
whitelisted
732
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
732
msedge.exe
150.171.28.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
732
msedge.exe
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.110
whitelisted
dt.hebchengjiu.com
unknown
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
hao.360.cn
  • 101.198.2.134
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Possible Chrome Plugin install
No debug info