URL:

thepdfbox.com

Full analysis: https://app.any.run/tasks/aaba8762-8a0a-4a46-8885-116b61420f61
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: February 12, 2025, 14:57:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
adware
advancedinstaller
loader
Indicators:
MD5:

0FDF2974DBB4278F810C60ABAA4F365A

SHA1:

EA76C97DD462A1C7738A70D9D0C1C6F7506AEAE4

SHA256:

F04A25EC0D22D5904AD4E4D26CE4323C95AC3767845B8105A8E29C9E3FF2A52C

SSDEEP:

3:Uz:Uz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ADVANCEDINSTALLER has been detected (SURICATA)

      • msiexec.exe (PID: 6880)
    • Changes the autorun value in the registry

      • epibrowser.exe (PID: 6748)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 5740)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 7392)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 7392)
    • Access to an unwanted program domain was detected

      • msiexec.exe (PID: 6880)
    • Process requests binary or script from the Internet

      • msiexec.exe (PID: 6880)
    • Reads security settings of Internet Explorer

      • MSI1397.tmp (PID: 6992)
      • msiexec.exe (PID: 6880)
      • MSI88C8.tmp (PID: 4136)
      • msiexec.exe (PID: 6096)
    • Reads the date of Windows installation

      • MSI1397.tmp (PID: 6992)
    • Potential Corporate Privacy Violation

      • msiexec.exe (PID: 6880)
    • Executable content was dropped or overwritten

      • setup.exe (PID: 3420)
      • installer.exe (PID: 2428)
      • epibrowser.exe (PID: 2144)
    • Searches for installed software

      • setup.exe (PID: 3420)
    • Creates a software uninstall entry

      • setup.exe (PID: 3420)
    • Application launched itself

      • setup.exe (PID: 7528)
      • setup.exe (PID: 3420)
      • epibrowser.exe (PID: 6748)
      • epibrowser.exe (PID: 7020)
      • epibrowser.exe (PID: 7696)
      • epibrowser.exe (PID: 4804)
    • Starts CMD.EXE for commands execution

      • installer.exe (PID: 2428)
      • MSI88C8.tmp (PID: 4136)
      • msiexec.exe (PID: 6096)
      • epibrowser.exe (PID: 6748)
    • The executable file from the user directory is run by the CMD process

      • epibrowser.exe (PID: 6756)
  • INFO

    • Reads Environment values

      • identity_helper.exe (PID: 5252)
      • msiexec.exe (PID: 6096)
      • msiexec.exe (PID: 6880)
    • Checks supported languages

      • identity_helper.exe (PID: 5252)
      • msiexec.exe (PID: 7392)
      • msiexec.exe (PID: 6096)
      • MSI1397.tmp (PID: 6992)
      • installer.exe (PID: 2428)
      • msiexec.exe (PID: 6880)
      • setup.exe (PID: 3420)
      • setup.exe (PID: 1292)
      • notification_helper.exe (PID: 1228)
      • setup.exe (PID: 7528)
      • setup.exe (PID: 6740)
      • epibrowser.exe (PID: 6748)
      • epibrowser.exe (PID: 7020)
      • epibrowser.exe (PID: 4336)
      • MSI88C8.tmp (PID: 4136)
      • epibrowser.exe (PID: 2092)
      • epibrowser.exe (PID: 2512)
      • epibrowser.exe (PID: 6756)
      • epibrowser.exe (PID: 7540)
      • epibrowser.exe (PID: 2844)
      • epibrowser.exe (PID: 1304)
      • epibrowser.exe (PID: 2428)
      • epibrowser.exe (PID: 4136)
      • epibrowser.exe (PID: 2012)
      • epibrowser.exe (PID: 6740)
      • epibrowser.exe (PID: 7376)
      • epibrowser.exe (PID: 7436)
      • epibrowser.exe (PID: 4952)
      • epibrowser.exe (PID: 3144)
      • epibrowser.exe (PID: 8112)
      • epibrowser.exe (PID: 1192)
      • epibrowser.exe (PID: 7840)
      • epibrowser.exe (PID: 2676)
      • epibrowser.exe (PID: 7496)
      • epibrowser.exe (PID: 2144)
      • epibrowser.exe (PID: 7624)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6232)
      • msedge.exe (PID: 4652)
      • msiexec.exe (PID: 7384)
      • msiexec.exe (PID: 7392)
      • msedge.exe (PID: 6504)
    • Reads the computer name

      • identity_helper.exe (PID: 5252)
      • msiexec.exe (PID: 7392)
      • msiexec.exe (PID: 6096)
      • MSI1397.tmp (PID: 6992)
      • msiexec.exe (PID: 6880)
      • setup.exe (PID: 3420)
      • setup.exe (PID: 7528)
      • notification_helper.exe (PID: 1228)
      • epibrowser.exe (PID: 6748)
      • installer.exe (PID: 2428)
      • epibrowser.exe (PID: 7020)
      • MSI88C8.tmp (PID: 4136)
      • epibrowser.exe (PID: 2512)
      • epibrowser.exe (PID: 2092)
      • epibrowser.exe (PID: 6756)
      • epibrowser.exe (PID: 7376)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 7384)
    • The sample compiled with english language support

      • msiexec.exe (PID: 7384)
      • msiexec.exe (PID: 6880)
      • msiexec.exe (PID: 7392)
      • installer.exe (PID: 2428)
      • setup.exe (PID: 3420)
      • msedge.exe (PID: 6504)
      • epibrowser.exe (PID: 2144)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 4652)
    • Manages system restore points

      • SrTasks.exe (PID: 2212)
    • Reads the software policy settings

      • msiexec.exe (PID: 7384)
      • msiexec.exe (PID: 7392)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 7392)
      • epibrowser.exe (PID: 6748)
      • epibrowser.exe (PID: 6496)
    • Application launched itself

      • msedge.exe (PID: 4652)
      • chrome.exe (PID: 6956)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 7392)
    • Process checks computer location settings

      • MSI1397.tmp (PID: 6992)
      • msiexec.exe (PID: 6096)
      • MSI88C8.tmp (PID: 4136)
      • epibrowser.exe (PID: 6748)
      • epibrowser.exe (PID: 1304)
      • epibrowser.exe (PID: 2844)
      • epibrowser.exe (PID: 2428)
      • epibrowser.exe (PID: 4136)
      • epibrowser.exe (PID: 8112)
      • epibrowser.exe (PID: 7840)
      • epibrowser.exe (PID: 7436)
    • Checks proxy server information

      • msiexec.exe (PID: 6880)
      • epibrowser.exe (PID: 6748)
    • Manual execution by a user

      • epibrowser.exe (PID: 7696)
      • epibrowser.exe (PID: 4804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
285
Monitored processes
146
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs msedge.exe no specs msedge.exe no specs srtasks.exe no specs conhost.exe no specs msedge.exe no specs #ADVANCEDINSTALLER msiexec.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msi1397.tmp no specs installer.exe setup.exe setup.exe no specs msedge.exe no specs msedge.exe no specs notification_helper.exe no specs chrome.exe no specs setup.exe no specs setup.exe no specs epibrowser.exe epibrowser.exe no specs epibrowser.exe no specs cmd.exe no specs chrome.exe msedge.exe no specs chrome.exe no specs msi88c8.tmp no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs epibrowser.exe no specs epibrowser.exe epibrowser.exe no specs cmd.exe no specs epibrowser.exe epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe chrome.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe epibrowser.exe no specs msedge.exe no specs epibrowser.exe no specs epibrowser.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs chrome.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
768"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1884 --field-trial-handle=1888,i,13207709021269853960,4325364844258503569,262144 --variations-seed-version /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
836"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6412 --field-trial-handle=2300,i,3140558043386198779,14154411268706254444,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
836"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6580 --field-trial-handle=2300,i,3140558043386198779,14154411268706254444,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
836"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=5928 --field-trial-handle=2300,i,3140558043386198779,14154411268706254444,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1172\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1192"C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6800,i,6999927644949565602,7200345968806767720,262144 --variations-seed-version --mojo-platform-channel-handle=7056 /prefetch:1C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exeepibrowser.exe
User:
admin
Company:
EPI Software
Integrity Level:
LOW
Description:
EpiBrowser
Version:
132.0.6834.121
1228"C:\Program Files\Google\Chrome\Application\122.0.6261.70\notification_helper.exe" -EmbeddingC:\Program Files\Google\Chrome\Application\122.0.6261.70\notification_helper.exesvchost.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\122.0.6261.70\notification_helper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
1292C:\Users\admin\AppData\Local\EPISoftware\CR_BE98C.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=EpiBrowser --annotation=ver=132.0.6834.121 --initial-client-data=0x28c,0x290,0x294,0x268,0x298,0x7ff764e8d2e8,0x7ff764e8d2f4,0x7ff764e8d300C:\Users\admin\AppData\Local\EPISoftware\CR_BE98C.tmp\setup.exesetup.exe
User:
admin
Company:
EPI Software
Integrity Level:
MEDIUM
Description:
EpiBrowser Installer
Exit code:
0
Version:
132.0.6834.121
Modules
Images
c:\users\admin\appdata\local\episoftware\cr_be98c.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
1304"C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=4000,i,6999927644949565602,7200345968806767720,262144 --variations-seed-version --mojo-platform-channel-handle=3972 /prefetch:1C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exeepibrowser.exe
User:
admin
Company:
EPI Software
Integrity Level:
LOW
Description:
EpiBrowser
Version:
132.0.6834.121
Modules
Images
c:\users\admin\appdata\local\episoftware\epibrowser\application\epibrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\episoftware\epibrowser\application\132.0.6834.121\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
1400"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5128 --field-trial-handle=1888,i,13207709021269853960,4325364844258503569,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
42 591
Read events
42 164
Write events
396
Delete events
31

Modification events

(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
Executable files
53
Suspicious files
1 005
Text files
226
Unknown types
0

Dropped files

PID
Process
Filename
Type
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF137dfd.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF137dfd.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF137dfd.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF137e0d.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF137e1c.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
112
TCP/UDP connections
184
DNS requests
214
Threats
67

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.19.198.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
104.79.89.142:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7524
SIHClient.exe
GET
200
104.79.89.142:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7524
SIHClient.exe
GET
200
104.79.89.142:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7108
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7764
svchost.exe
HEAD
200
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/6ca9004c-2afd-40c0-a9b1-4fec460952e5?P1=1739805080&P2=404&P3=2&P4=T6iDfp%2fW5EyEUMYNTgVC8eBSkKYARaGwZ6XRV%2fEGWLnTcejMU1d7Lit5cNT4I98%2f%2fLsjX5F1aPIXvs48%2fJE8Lw%3d%3d
unknown
whitelisted
4652
msedge.exe
GET
200
151.101.194.133:80
http://ocsp.globalsign.com/codesigningrootr45/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQVFZP5vqhCrtRN5SWf40Rn6NM1IAQUHwC%2FRoAK%2FHg5t6W0Q9lWULvOljsCEHe9DgW3WQu2HUdhUx4%2Fde0%3D
unknown
whitelisted
4652
msedge.exe
GET
200
151.101.194.133:80
http://ocsp.globalsign.com/gsgccr45evcodesignca2020/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQaCbVYh07WONuW4e63Ydlu4AlbDAQUJZ3Q%2FFkJhmPF7POxEztXHAOSNhECDHH03tIzxzKRPT7zQg%3D%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
2.19.198.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
104.79.89.142:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6232
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4652
msedge.exe
239.255.255.250:1900
whitelisted
6232
msedge.exe
138.91.169.22:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6232
msedge.exe
13.107.253.45:443
edge-mobile-static.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6232
msedge.exe
108.138.26.122:80
thepdfbox.com
AMAZON-02
US
unknown
6232
msedge.exe
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 2.19.198.194
  • 23.32.238.34
  • 23.32.238.43
whitelisted
www.microsoft.com
  • 104.79.89.142
whitelisted
config.edge.skype.com
  • 138.91.169.22
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.253.45
whitelisted
thepdfbox.com
  • 108.138.26.122
  • 108.138.26.30
  • 108.138.26.82
  • 108.138.26.49
unknown
business.bing.com
  • 13.107.6.158
whitelisted
bzib.nelreports.net
  • 2.19.11.100
  • 2.19.11.120
whitelisted

Threats

PID
Process
Class
Message
6232
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
6232
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
6232
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
6232
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
6880
msiexec.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] AdvancedInstaller User-Agent
6880
msiexec.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
6880
msiexec.exe
Potentially Bad Traffic
ET INFO Executable served from Amazon S3
7428
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
7428
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
7428
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
No debug info