Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4A (2025)

URL:
Full analysis: https://app.any.run/tasks/91d74931-5e00-4ee8-b179-f522c1b6725e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Malware Trends Tracker>>>

Analysis date: February 17, 2025, 17:00:43
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:

zephyr

miner

evasion

loader

github

Indicators:
MD5:

D99FC04195AAFE4CE63FE64C186D97A5

SHA1:

87A5383C823093D5B9FDD85B2B2C642B8552C2F9

SHA256:

0B951ADA8FB3D65886DDE7285E63022C442D9F65838A82C418367349E3F012BE

SSDEEP:

12:2hRUpiFGK7dUP8AUnsU533f+bm/HaXa3poBC:2qiFGKRQ4nzZ/8OuBC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

  • MALICIOUS

    • Adds path to the Windows Defender exclusion list

      • printui.exe (PID: 8040)
      • cmd.exe (PID: 7812)
      • svchost.exe (PID: 7124)
      • cmd.exe (PID: 7304)
      • cmd.exe (PID: 7604)
      • cmd.exe (PID: 2260)
      • cmd.exe (PID: 5460)
      • x383329.exe (PID: 7980)
      • cmd.exe (PID: 6096)
      • cmd.exe (PID: 2416)
      • x383329.exe (PID: 3920)
      • cmd.exe (PID: 7476)
      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 5028)
      • printui.exe (PID: 4012)
    • ZEPHYR has been detected

      • printui.exe (PID: 8040)
      • x383329.exe (PID: 3920)
      • printui.exe (PID: 4012)
    • Creates or modifies Windows services

      • reg.exe (PID: 7500)
      • reg.exe (PID: 3680)
    • Starts CMD.EXE for self-deleting

      • printui.exe (PID: 8040)
      • printui.exe (PID: 5752)
      • x383329.exe (PID: 3920)
      • printui.exe (PID: 4012)
    • Uses Task Scheduler to autorun other applications

      • cmd.exe (PID: 3640)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
      • printui.exe (PID: 8040)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 3172)
      • x383329.exe (PID: 3920)
    • Reads security settings of Internet Explorer

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 3172)
    • Executable content was dropped or overwritten

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
      • printui.exe (PID: 8040)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 3172)
      • svchost.exe (PID: 7124)
      • cmd.exe (PID: 7240)
      • x383329.exe (PID: 3920)
      • printui.exe (PID: 5752)
      • printui.exe (PID: 4012)
    • There is functionality for taking screenshot (YARA)

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 7304)
      • cmd.exe (PID: 5096)
      • cmd.exe (PID: 7752)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 7304)
      • cmd.exe (PID: 5096)
      • cmd.exe (PID: 7812)
      • cmd.exe (PID: 7304)
      • cmd.exe (PID: 5460)
      • cmd.exe (PID: 7604)
      • cmd.exe (PID: 2260)
      • cmd.exe (PID: 7752)
      • cmd.exe (PID: 6096)
      • cmd.exe (PID: 2416)
      • cmd.exe (PID: 7476)
      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 5028)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 2420)
      • powershell.exe (PID: 7704)
      • powershell.exe (PID: 2168)
    • Starts CMD.EXE for commands execution

      • printui.exe (PID: 8040)
      • printui.exe (PID: 7220)
      • console_zero.exe (PID: 2904)
      • svchost.exe (PID: 7124)
      • printui.exe (PID: 5752)
      • x383329.exe (PID: 7980)
      • x383329.exe (PID: 3920)
      • printui.exe (PID: 4012)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 5616)
      • cmd.exe (PID: 7280)
      • cmd.exe (PID: 7596)
      • cmd.exe (PID: 8172)
    • Script adds exclusion path to Windows Defender

      • cmd.exe (PID: 7812)
      • cmd.exe (PID: 7304)
      • cmd.exe (PID: 7604)
      • cmd.exe (PID: 5460)
      • cmd.exe (PID: 2260)
      • cmd.exe (PID: 6096)
      • cmd.exe (PID: 2416)
      • cmd.exe (PID: 7476)
      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 5028)
    • Creates a new Windows service

      • sc.exe (PID: 4128)
      • sc.exe (PID: 7016)
    • Windows service management via SC.EXE

      • sc.exe (PID: 7836)
      • sc.exe (PID: 5992)
      • sc.exe (PID: 5388)
    • The process drops C-runtime libraries

      • printui.exe (PID: 8040)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 5616)
      • cmd.exe (PID: 8172)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 4668)
      • cmd.exe (PID: 7240)
      • cmd.exe (PID: 7644)
      • cmd.exe (PID: 3812)
      • cmd.exe (PID: 8164)
      • cmd.exe (PID: 3828)
    • Checks for external IP

      • svchost.exe (PID: 2192)
      • svchost.exe (PID: 7124)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 7124)
    • Connects to unusual port

      • svchost.exe (PID: 7124)
    • Stops a currently running service

      • sc.exe (PID: 7652)
    • Created directory related to system

      • cmd.exe (PID: 1328)
    • The process deletes folder without confirmation

      • printui.exe (PID: 4012)
  • INFO

    • Manual execution by a user

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
      • Taskmgr.exe (PID: 5092)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 3172)
      • Taskmgr.exe (PID: 2416)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6188)
      • msedge.exe (PID: 6772)
    • Reads the computer name

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • identity_helper.exe (PID: 4968)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 3172)
      • console_zero.exe (PID: 2904)
      • x383329.exe (PID: 3920)
    • Checks supported languages

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • identity_helper.exe (PID: 4968)
      • printui.exe (PID: 8040)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
      • printui.exe (PID: 7220)
      • console_zero.exe (PID: 2904)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 3172)
      • printui.exe (PID: 5752)
      • x383329.exe (PID: 7980)
      • x383329.exe (PID: 3920)
      • printui.exe (PID: 4012)
      • console_zero.exe (PID: 8144)
    • Reads Environment values

      • identity_helper.exe (PID: 4968)
    • Create files in a temporary directory

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 3172)
    • Application launched itself

      • msedge.exe (PID: 6188)
    • The sample compiled with english language support

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
      • printui.exe (PID: 8040)
      • msedge.exe (PID: 6772)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 3172)
      • x383329.exe (PID: 3920)
    • Process checks computer location settings

      • 14031106.Taha.printui.sfx.hide.exe (PID: 7916)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 7256)
      • 14031106.Taha.printui.sfx.hide.exe (PID: 3172)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2420)
      • powershell.exe (PID: 7704)
      • powershell.exe (PID: 1328)
      • powershell.exe (PID: 7492)
      • powershell.exe (PID: 7724)
      • powershell.exe (PID: 7120)
      • powershell.exe (PID: 4544)
      • powershell.exe (PID: 1520)
      • powershell.exe (PID: 2168)
      • powershell.exe (PID: 6952)
      • powershell.exe (PID: 512)
      • powershell.exe (PID: 5208)
      • powershell.exe (PID: 6028)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 2420)
      • powershell.exe (PID: 7704)
      • powershell.exe (PID: 1328)
      • powershell.exe (PID: 7492)
      • powershell.exe (PID: 4544)
      • powershell.exe (PID: 7120)
      • powershell.exe (PID: 7724)
      • powershell.exe (PID: 2168)
      • powershell.exe (PID: 1520)
      • powershell.exe (PID: 6952)
      • powershell.exe (PID: 512)
      • powershell.exe (PID: 5208)
      • powershell.exe (PID: 6028)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 2416)
    • Creates a new folder

      • cmd.exe (PID: 1328)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the

full report

No Malware configuration.

No data.

Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (1)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (2)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (3)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (4)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (5)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (6)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (7)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (8)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (9)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (10)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (11)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (12)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (13)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (14)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (15)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (16)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (17)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (18)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (19)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (20)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (21)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (22)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (23)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (24)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (25)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (26)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (27)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (28)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (29)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (30)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (31)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (32)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (33)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (34)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (35)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (36)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (37)Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1 Malicious activity | ANY.RUN - Malware Sandbox Online (38)

All screenshots are available in the full report

All screenshots are available in the

full report

Total processes

292

Monitored processes

157

Malicious processes

11

Suspicious processes

15

Behavior graph

Click at the process to see the details

Process information

PID

CMD

Path

Indicators

Parent process

6188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4Ad6Zhk9BQ/file?_download_id=70944360161683334045893962059579770700465542134648149762750238834&_log_download_success=1&_notify_domain=www.dropbox.com&dl=1"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeexplorer.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

MEDIUM

Description:

Microsoft Edge

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

6328"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x300,0x304,0x308,0x2f8,0x310,0x7ff8175e5fd8,0x7ff8175e5fe4,0x7ff8175e5ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

MEDIUM

Description:

Microsoft Edge

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

6520"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2308 --field-trial-handle=2320,i,17970776847083867909,10402957184852275615,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

LOW

Description:

Microsoft Edge

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

6528"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2484 --field-trial-handle=2320,i,17970776847083867909,10402957184852275615,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

MEDIUM

Description:

Microsoft Edge

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

6552"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2700 --field-trial-handle=2320,i,17970776847083867909,10402957184852275615,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

LOW

Description:

Microsoft Edge

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

6796"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3464 --field-trial-handle=2320,i,17970776847083867909,10402957184852275615,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

LOW

Description:

Microsoft Edge

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

6824"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3576 --field-trial-handle=2320,i,17970776847083867909,10402957184852275615,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

LOW

Description:

Microsoft Edge

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

6948"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4072 --field-trial-handle=2320,i,17970776847083867909,10402957184852275615,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

LOW

Description:

Microsoft Edge

Exit code:

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

6956"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4252 --field-trial-handle=2320,i,17970776847083867909,10402957184852275615,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

LOW

Description:

Microsoft Edge

Exit code:

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

7068"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5256 --field-trial-handle=2320,i,17970776847083867909,10402957184852275615,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe

User:

admin

Company:

Microsoft Corporation

Integrity Level:

LOW

Description:

Microsoft Edge

Exit code:

Version:

122.0.2365.59

Modules

Images

c:\program files (x86)\microsoft\edge\application\msedge.exe

c:\windows\system32\ntdll.dll

c:\windows\system32\kernel32.dll

c:\windows\system32\kernelbase.dll

c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll

c:\windows\system32\oleaut32.dll

c:\windows\system32\msvcp_win.dll

c:\windows\system32\ucrtbase.dll

c:\windows\system32\combase.dll

c:\windows\system32\rpcrt4.dll

Total events

79696

Read events

79664

Write events

29

Delete events

3

Modification events

(PID) Process:(6188)msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count

Value:

(PID) Process:(6188)msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state

Value:

2

(PID) Process:(6188)msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state

Value:

1

(PID) Process:(6188)msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly

Value:

(PID) Process:(6188)msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001

Value:

9074F5BFEF8C2F00

(PID) Process:(6188)msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001

Value:

CA6306C0EF8C2F00

(PID) Process:(6188)msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\393900
Operation:writeName:WindowTabManagerFileMappingId

Value:

{FF052CFD-C7F0-46D7-AFA7-E4F4FCC0084E}

(PID) Process:(6188)msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\393900
Operation:writeName:WindowTabManagerFileMappingId

Value:

{EF0B3DAE-6F92-4E53-9079-3B8624927371}

(PID) Process:(6188)msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\393900
Operation:writeName:WindowTabManagerFileMappingId

Value:

{A7128E5C-1FAB-440B-B79C-A8DF1AC8A1CB}

(PID) Process:(6188)msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001

Value:

2FC332C0EF8C2F00

Executable files

40

Suspicious files

534

Text files

135

Unknown types

Dropped files

PID

Process

Filename

Type

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF139a11.TMP

MD5:

SHA256:

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF139a11.TMP

MD5:

SHA256:

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old

MD5:

SHA256:

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old

MD5:

SHA256:

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF139a11.TMP

MD5:

SHA256:

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF139a11.TMP

MD5:

SHA256:

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old

MD5:

SHA256:

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old

MD5:

SHA256:

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF139a11.TMP

MD5:

SHA256:

6188msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old

MD5:

SHA256:

Download PCAP, analyze network streams, HTTP content and a lot more at the

full report

HTTP(S) requests

63

TCP/UDP connections

84

DNS requests

86

Threats

7

HTTP requests

PID

Process

Method

HTTP Code

IP

URL

CN

Type

Size

Reputation

6068

svchost.exe

GET

200

23.35.229.160:80

http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl

unknown

whitelisted

4712

MoUsoCoreWorker.exe

GET

200

23.48.23.143:80

http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl

unknown

whitelisted

1176

svchost.exe

GET

200

2.17.190.73:80

http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D

unknown

whitelisted

GET

200

2.17.190.73:80

http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D

unknown

whitelisted

8132

svchost.exe

HEAD

200

2.19.11.120:80

http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/6ca9004c-2afd-40c0-a9b1-4fec460952e5?P1=1739887956&P2=404&P3=2&P4=ZgxecRhMPshp3%2fub%2b2wgR8t1kg5AitVErFWlXTJmmSaiHqi3Vf2YQPLL563fXQrJkdtedam5VP7RzcDsUaI%2fiw%3d%3d

unknown

whitelisted

4712

MoUsoCoreWorker.exe

GET

200

23.35.229.160:80

http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl

unknown

whitelisted

8132

svchost.exe

GET

206

2.19.11.120:80

http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/6ca9004c-2afd-40c0-a9b1-4fec460952e5?P1=1739887956&P2=404&P3=2&P4=ZgxecRhMPshp3%2fub%2b2wgR8t1kg5AitVErFWlXTJmmSaiHqi3Vf2YQPLL563fXQrJkdtedam5VP7RzcDsUaI%2fiw%3d%3d

unknown

whitelisted

6068

svchost.exe

GET

200

23.48.23.143:80

http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl

unknown

whitelisted

8132

svchost.exe

GET

206

2.19.11.120:80

http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/6ca9004c-2afd-40c0-a9b1-4fec460952e5?P1=1739887956&P2=404&P3=2&P4=ZgxecRhMPshp3%2fub%2b2wgR8t1kg5AitVErFWlXTJmmSaiHqi3Vf2YQPLL563fXQrJkdtedam5VP7RzcDsUaI%2fiw%3d%3d

unknown

whitelisted

7456

SIHClient.exe

GET

200

95.101.149.131:80

http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl

unknown

whitelisted

Download PCAP, analyze network streams, HTTP content and a lot more at the

full report

Connections

PID

Process

IP

Domain

ASN

CN

Reputation

51.104.136.2:443

settings-win.data.microsoft.com

MICROSOFT-CORP-MSN-AS-BLOCK

IE

whitelisted

4

System

192.168.100.255:137

whitelisted

4712

MoUsoCoreWorker.exe

23.48.23.143:80

crl.microsoft.com

Akamai International B.V.

DE

whitelisted

6068

svchost.exe

23.48.23.143:80

crl.microsoft.com

Akamai International B.V.

DE

whitelisted

6068

svchost.exe

23.35.229.160:80

www.microsoft.com

AKAMAI-AS

DE

whitelisted

4712

MoUsoCoreWorker.exe

23.35.229.160:80

www.microsoft.com

AKAMAI-AS

DE

whitelisted

5064

SearchApp.exe

92.123.104.32:443

www.bing.com

Akamai International B.V.

DE

whitelisted

2.17.190.73:80

ocsp.digicert.com

AKAMAI-AS

DE

whitelisted

1176

svchost.exe

20.190.159.75:443

login.live.com

MICROSOFT-CORP-MSN-AS-BLOCK

IE

whitelisted

1176

svchost.exe

2.17.190.73:80

ocsp.digicert.com

AKAMAI-AS

DE

whitelisted

DNS requests

Domain

IP

Reputation

settings-win.data.microsoft.com

  • 51.104.136.2
  • 4.231.128.59

whitelisted

crl.microsoft.com

  • 23.48.23.143
  • 23.48.23.173
  • 23.48.23.166

whitelisted

www.microsoft.com

  • 23.35.229.160
  • 95.101.149.131

whitelisted

google.com

  • 142.250.185.110

whitelisted

www.bing.com

  • 92.123.104.32
  • 92.123.104.38
  • 92.123.104.33
  • 92.123.104.67
  • 92.123.104.52
  • 92.123.104.59
  • 92.123.104.44
  • 92.123.104.31
  • 92.123.104.28
  • 92.123.104.19
  • 92.123.104.47
  • 92.123.104.62
  • 92.123.104.34
  • 95.101.79.107
  • 95.101.79.113
  • 95.101.79.105
  • 95.101.79.99
  • 95.101.79.96
  • 95.101.79.104
  • 95.101.79.91
  • 95.101.79.90
  • 95.101.79.114

whitelisted

ocsp.digicert.com

  • 2.17.190.73

whitelisted

login.live.com

  • 20.190.159.75
  • 20.190.159.64
  • 40.126.31.2
  • 40.126.31.0
  • 20.190.159.129
  • 40.126.31.69
  • 40.126.31.130
  • 20.190.159.23

whitelisted

go.microsoft.com

  • 23.35.238.131
  • 2.18.97.227

whitelisted

config.edge.skype.com

  • 13.107.42.16

whitelisted

edge.microsoft.com

  • 13.107.21.239
  • 204.79.197.239

whitelisted

Threats

PID

Process

Class

Message

Potential Corporate Privacy Violation

ET INFO PE EXE or DLL Windows file download HTTP

Device Retrieving External IP Address Detected

ET INFO Possible External IP Lookup Domain Observed in SNI (ipinfo. io)

Device Retrieving External IP Address Detected

ET INFO External IP Lookup SSL Cert Observed (ipinfo .io)

Device Retrieving External IP Address Detected

ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io)

A suspicious string was detected

SUSPICIOUS [ANY.RUN] VBS is used to run Shell

A suspicious string was detected

SUSPICIOUS [ANY.RUN] VBS is used to run Shell

Not Suspicious Traffic

INFO [ANY.RUN] Attempting to access raw user content on GitHub

No debug info

Malware analysis https://uc22f1ca5d44f4171d6f2d576b30.dl.dropboxusercontent.com/cd/0/get/CkSg2POFZ1BRtl90Sqy4TBdVf8P-3St5kBjXyNFxX4YUDFmJEwQjBjJmdVQUJPN5oG92D3FAi8g6aLwkqvOW4MC6hU71UBoR2cS8tUX8dk0LY2XpVYbu77M1yVoJZ66bFhkVZirKNwSA6crRn5DmC_nVqReL_59-tBfy4A (2025)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Greg Kuvalis

Last Updated:

Views: 5549

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Greg Kuvalis

Birthday: 1996-12-20

Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267

Phone: +68218650356656

Job: IT Representative

Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics

Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.