Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-03-2023 22:52
Static task
static1
Behavioral task
behavioral1
Sample
9982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0.msi
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0.msi
Resource
win10v2004-20230220-en
General
-
Target
9982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0.msi
-
Size
6.4MB
-
MD5
6f7e07b84897cccab30594305416d36f
-
SHA1
6d1d531c921a17b36e792e2843311e27b9aa77a4
-
SHA256
9982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0
-
SHA512
689ba6b48065a9098ef62bc8ed0650fa0b66f403af9dc315a456d514ea61afda7cf67c3786760e4ac49adc8a60f489199e6aae08a59aa4ef8e57e064bce9e892
-
SSDEEP
196608:+kyJofCBPu0rDMQFVOiNRUm0TcrdJgRueb3IR6s8:DymfCBPoYOiPTacBeue7xs8
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 1568 msiexec.exe 4 1568 msiexec.exe 6 1568 msiexec.exe -
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Executes dropped EXE 12 IoCs
pid Process 960 MSIF926.tmp 528 MicrosoftEdgeUpdate.exe 1484 MicrosoftEdgeUpdate.exe 1568 MicrosoftEdgeUpdate.exe 1628 MicrosoftEdgeUpdateComRegisterShell64.exe 308 MicrosoftEdgeUpdateComRegisterShell64.exe 1824 MicrosoftEdgeUpdateComRegisterShell64.exe 928 MicrosoftEdgeUpdate.exe 1496 MicrosoftEdgeUpdate.exe 1588 MicrosoftEdgeUpdate.exe 2044 MicrosoftEdgeUpdate.exe 2916 MicrosoftEdge_X64_109.0.1518.78.exe -
Loads dropped DLL 31 IoCs
pid Process 1068 MsiExec.exe 1732 msiexec.exe 1732 msiexec.exe 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 960 MSIF926.tmp 528 MicrosoftEdgeUpdate.exe 528 MicrosoftEdgeUpdate.exe 528 MicrosoftEdgeUpdate.exe 528 MicrosoftEdgeUpdate.exe 528 MicrosoftEdgeUpdate.exe 1568 MicrosoftEdgeUpdate.exe 1568 MicrosoftEdgeUpdate.exe 1628 MicrosoftEdgeUpdateComRegisterShell64.exe 1568 MicrosoftEdgeUpdate.exe 1568 MicrosoftEdgeUpdate.exe 308 MicrosoftEdgeUpdateComRegisterShell64.exe 1568 MicrosoftEdgeUpdate.exe 1568 MicrosoftEdgeUpdate.exe 1824 MicrosoftEdgeUpdateComRegisterShell64.exe 1568 MicrosoftEdgeUpdate.exe 528 MicrosoftEdgeUpdate.exe 528 MicrosoftEdgeUpdate.exe 528 MicrosoftEdgeUpdate.exe 528 MicrosoftEdgeUpdate.exe 1588 MicrosoftEdgeUpdate.exe 1496 MicrosoftEdgeUpdate.exe 1588 MicrosoftEdgeUpdate.exe 1588 MicrosoftEdgeUpdate.exe -
Registers COM server for autorun 1 TTPs 31 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
Checks system information in the registry 2 TTPs 8 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_am.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_hu.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_zh-CN.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_zh-TW.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_quz.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\MicrosoftEdgeComRegisterShellARM64.exe MSIF926.tmp File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\psmachine.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_hr.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_as.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_nn.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_ug.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdate.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_eu.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_ka.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_km.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_kok.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_ta.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_gu.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_ja.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_th.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_ur.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_lo.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_es-419.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_lv.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\MicrosoftEdgeUpdateBroker.exe MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_fr-CA.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\EdgeUpdate.dat MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_is.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\MicrosoftEdgeUpdate.exe MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_uk.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_sr-Latn-RS.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9B1F70EC-37C9-4453-98FD-8E530239170F}\EDGEMITMP_4731E.tmp\SETUP.EX_ MicrosoftEdge_X64_109.0.1518.78.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\psuser.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_en.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_fa.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_tt.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\MicrosoftEdgeUpdateOnDemand.exe MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_fi.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_bn-IN.dll MSIF926.tmp File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9B1F70EC-37C9-4453-98FD-8E530239170F}\EDGEMITMP_4731E.tmp\SETUP.EX_ MicrosoftEdge_X64_109.0.1518.78.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\psmachine_64.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\MicrosoftEdgeUpdateCore.exe MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_fr.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_da.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_nb.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_vi.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_ar.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_ro.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_bn.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_lt.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_pt-PT.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_sr.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_bs.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\psuser_arm64.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_es.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_et.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_iw.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_az.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_el.dll MSIF926.tmp File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_pl.dll MSIF926.tmp File created C:\Program Files\ChatGPT\Uninstall ChatGPT.lnk msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\msedgeupdateres_mt.dll MSIF926.tmp -
Drops file in Windows directory 15 IoCs
description ioc Process File created C:\Windows\Installer\6c6897.msi msiexec.exe File opened for modification C:\Windows\Installer\6c6897.msi msiexec.exe File created C:\Windows\Installer\{2A0ABAEF-4058-4BE6-BAAA-00E855A11F4F}\ProductIcon msiexec.exe File opened for modification C:\Windows\Installer\MSIF926.tmp msiexec.exe File opened for modification C:\Windows\Installer\6c6894.ipi msiexec.exe File opened for modification C:\Windows\Installer\{2A0ABAEF-4058-4BE6-BAAA-00E855A11F4F}\ProductIcon msiexec.exe File created C:\Windows\Installer\6c689a.msi msiexec.exe File opened for modification C:\Windows\Installer\6c6893.msi msiexec.exe File created C:\Windows\Installer\6c6894.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\6c6896.msi msiexec.exe File created C:\Windows\Installer\6c6893.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI6B82.tmp msiexec.exe File created C:\Windows\Installer\6c6898.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIE91D.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-16-1b-d8-ee-f7 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-16-1b-d8-ee-f7\WpadDecisionTime = 50b2f022be5ad901 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E4D07C46-2113-440B-A93B-0DBE2481EF15}\WpadDecision = "0" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-16-1b-d8-ee-f7\WpadDecisionReason = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ = "IPackage" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebMachine.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FEABA0A285046EB4ABAA008E551AF1F4\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32\ = "{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\FEABA0A285046EB4ABAA008E551AF1F4\MainProgram msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback.1.0\CLSID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebMachineFallback.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ = "ICredentialDialog" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32\ = "{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.CoreMachineClass" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods\ = "13" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc.1.0\CLSID\ = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BE43CF28-943E-4BA2-9B74-00CC57E7B1FC}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.173.45\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods\ = "6" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1732 msiexec.exe 1732 msiexec.exe 1140 powershell.exe 1140 powershell.exe 1732 msiexec.exe 1732 msiexec.exe 528 MicrosoftEdgeUpdate.exe 528 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1568 msiexec.exe Token: SeIncreaseQuotaPrivilege 1568 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeSecurityPrivilege 1732 msiexec.exe Token: SeCreateTokenPrivilege 1568 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1568 msiexec.exe Token: SeLockMemoryPrivilege 1568 msiexec.exe Token: SeIncreaseQuotaPrivilege 1568 msiexec.exe Token: SeMachineAccountPrivilege 1568 msiexec.exe Token: SeTcbPrivilege 1568 msiexec.exe Token: SeSecurityPrivilege 1568 msiexec.exe Token: SeTakeOwnershipPrivilege 1568 msiexec.exe Token: SeLoadDriverPrivilege 1568 msiexec.exe Token: SeSystemProfilePrivilege 1568 msiexec.exe Token: SeSystemtimePrivilege 1568 msiexec.exe Token: SeProfSingleProcessPrivilege 1568 msiexec.exe Token: SeIncBasePriorityPrivilege 1568 msiexec.exe Token: SeCreatePagefilePrivilege 1568 msiexec.exe Token: SeCreatePermanentPrivilege 1568 msiexec.exe Token: SeBackupPrivilege 1568 msiexec.exe Token: SeRestorePrivilege 1568 msiexec.exe Token: SeShutdownPrivilege 1568 msiexec.exe Token: SeDebugPrivilege 1568 msiexec.exe Token: SeAuditPrivilege 1568 msiexec.exe Token: SeSystemEnvironmentPrivilege 1568 msiexec.exe Token: SeChangeNotifyPrivilege 1568 msiexec.exe Token: SeRemoteShutdownPrivilege 1568 msiexec.exe Token: SeUndockPrivilege 1568 msiexec.exe Token: SeSyncAgentPrivilege 1568 msiexec.exe Token: SeEnableDelegationPrivilege 1568 msiexec.exe Token: SeManageVolumePrivilege 1568 msiexec.exe Token: SeImpersonatePrivilege 1568 msiexec.exe Token: SeCreateGlobalPrivilege 1568 msiexec.exe Token: SeBackupPrivilege 1320 vssvc.exe Token: SeRestorePrivilege 1320 vssvc.exe Token: SeAuditPrivilege 1320 vssvc.exe Token: SeBackupPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe Token: SeTakeOwnershipPrivilege 1732 msiexec.exe Token: SeRestorePrivilege 1732 msiexec.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1568 msiexec.exe 1568 msiexec.exe 1076 msiexec.exe 1568 msiexec.exe 1076 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1076 1732 msiexec.exe 33 PID 1732 wrote to memory of 1076 1732 msiexec.exe 33 PID 1732 wrote to memory of 1076 1732 msiexec.exe 33 PID 1732 wrote to memory of 1076 1732 msiexec.exe 33 PID 1732 wrote to memory of 1076 1732 msiexec.exe 33 PID 1732 wrote to memory of 1140 1732 msiexec.exe 32 PID 1732 wrote to memory of 1140 1732 msiexec.exe 32 PID 1732 wrote to memory of 1140 1732 msiexec.exe 32 PID 1140 wrote to memory of 1584 1140 powershell.exe 35 PID 1140 wrote to memory of 1584 1140 powershell.exe 35 PID 1140 wrote to memory of 1584 1140 powershell.exe 35 PID 1584 wrote to memory of 1512 1584 csc.exe 36 PID 1584 wrote to memory of 1512 1584 csc.exe 36 PID 1584 wrote to memory of 1512 1584 csc.exe 36 PID 1732 wrote to memory of 1068 1732 msiexec.exe 37 PID 1732 wrote to memory of 1068 1732 msiexec.exe 37 PID 1732 wrote to memory of 1068 1732 msiexec.exe 37 PID 1732 wrote to memory of 1068 1732 msiexec.exe 37 PID 1732 wrote to memory of 1068 1732 msiexec.exe 37 PID 1732 wrote to memory of 1068 1732 msiexec.exe 37 PID 1732 wrote to memory of 1068 1732 msiexec.exe 37 PID 1732 wrote to memory of 960 1732 msiexec.exe 39 PID 1732 wrote to memory of 960 1732 msiexec.exe 39 PID 1732 wrote to memory of 960 1732 msiexec.exe 39 PID 1732 wrote to memory of 960 1732 msiexec.exe 39 PID 1732 wrote to memory of 960 1732 msiexec.exe 39 PID 1732 wrote to memory of 960 1732 msiexec.exe 39 PID 1732 wrote to memory of 960 1732 msiexec.exe 39 PID 960 wrote to memory of 528 960 MSIF926.tmp 40 PID 960 wrote to memory of 528 960 MSIF926.tmp 40 PID 960 wrote to memory of 528 960 MSIF926.tmp 40 PID 960 wrote to memory of 528 960 MSIF926.tmp 40 PID 960 wrote to memory of 528 960 MSIF926.tmp 40 PID 960 wrote to memory of 528 960 MSIF926.tmp 40 PID 960 wrote to memory of 528 960 MSIF926.tmp 40 PID 528 wrote to memory of 1484 528 MicrosoftEdgeUpdate.exe 41 PID 528 wrote to memory of 1484 528 MicrosoftEdgeUpdate.exe 41 PID 528 wrote to memory of 1484 528 MicrosoftEdgeUpdate.exe 41 PID 528 wrote to memory of 1484 528 MicrosoftEdgeUpdate.exe 41 PID 528 wrote to memory of 1484 528 MicrosoftEdgeUpdate.exe 41 PID 528 wrote to memory of 1484 528 MicrosoftEdgeUpdate.exe 41 PID 528 wrote to memory of 1484 528 MicrosoftEdgeUpdate.exe 41 PID 528 wrote to memory of 1568 528 MicrosoftEdgeUpdate.exe 42 PID 528 wrote to memory of 1568 528 MicrosoftEdgeUpdate.exe 42 PID 528 wrote to memory of 1568 528 MicrosoftEdgeUpdate.exe 42 PID 528 wrote to memory of 1568 528 MicrosoftEdgeUpdate.exe 42 PID 528 wrote to memory of 1568 528 MicrosoftEdgeUpdate.exe 42 PID 528 wrote to memory of 1568 528 MicrosoftEdgeUpdate.exe 42 PID 528 wrote to memory of 1568 528 MicrosoftEdgeUpdate.exe 42 PID 1568 wrote to memory of 1628 1568 MicrosoftEdgeUpdate.exe 43 PID 1568 wrote to memory of 1628 1568 MicrosoftEdgeUpdate.exe 43 PID 1568 wrote to memory of 1628 1568 MicrosoftEdgeUpdate.exe 43 PID 1568 wrote to memory of 1628 1568 MicrosoftEdgeUpdate.exe 43 PID 1568 wrote to memory of 308 1568 MicrosoftEdgeUpdate.exe 44 PID 1568 wrote to memory of 308 1568 MicrosoftEdgeUpdate.exe 44 PID 1568 wrote to memory of 308 1568 MicrosoftEdgeUpdate.exe 44 PID 1568 wrote to memory of 308 1568 MicrosoftEdgeUpdate.exe 44 PID 1568 wrote to memory of 1824 1568 MicrosoftEdgeUpdate.exe 45 PID 1568 wrote to memory of 1824 1568 MicrosoftEdgeUpdate.exe 45 PID 1568 wrote to memory of 1824 1568 MicrosoftEdgeUpdate.exe 45 PID 1568 wrote to memory of 1824 1568 MicrosoftEdgeUpdate.exe 45 PID 528 wrote to memory of 928 528 MicrosoftEdgeUpdate.exe 46 PID 528 wrote to memory of 928 528 MicrosoftEdgeUpdate.exe 46 PID 528 wrote to memory of 928 528 MicrosoftEdgeUpdate.exe 46 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\9982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1568
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\chch.ps1"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ytafvvoz.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7698.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7688.tmp"4⤵PID:1512
-
-
-
-
C:\Windows\system32\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ChatGPT.msi"2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:1076
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8C8533D4A456C0DFDDC9DBF54DB7B215 C2⤵
- Loads dropped DLL
PID:1068
-
-
C:\Windows\Installer\MSIF926.tmp"C:\Windows\Installer\MSIF926.tmp" /silent /install2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUF99C.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Modifies registry class
PID:1484
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1628
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:308
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1824
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzMuNDUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzMuNDUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MkY4QUI4OTktMDVGNC00NkY0LTk5QTItQjgwRUEwN0QyQUM3fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins4RjQ2OTVFNC02ODBGLTRCODItQkVBNS1GRjQzMDhBMjc3REJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iNCIgcGh5c21lbW9yeT0iMiIgZGlza190eXBlPSIwIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSI2LjEuNzYwMS4wIiBzcD0iU2VydmljZSBQYWNrIDEiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxIiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSJEQURZIiBwcm9kdWN0X25hbWU9IlN0YW5kYXJkIFBDIChRMzUgKyBJQ0g5LCAyMDA5KSIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuMy4xNzMuNDUiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjY2ODIyNjgwMDAiIGluc3RhbGxfdGltZV9tcz0iMzg1MyIvPjwvYXBwPjwvcmVxdWVzdD44⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies system certificate store
PID:928
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{2F8AB899-05F4-46F4-99A2-B80EA07D2AC7}" /silent4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1496
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004CC" "00000000000003E4"1⤵
- Modifies data under HKEY_USERS
PID:1964
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
PID:1588 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzMuNDUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzMuNDUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MkY4QUI4OTktMDVGNC00NkY0LTk5QTItQjgwRUEwN0QyQUM3fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InswMTRDOTExMi1GQjVCLTRGQzYtOEMxMS1FQ0ZDQTRGQzVCQUR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iNCIgcGh5c21lbW9yeT0iMiIgZGlza190eXBlPSIwIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSI2LjEuNzYwMS4wIiBzcD0iU2VydmljZSBQYWNrIDEiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxIiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSJEQURZIiBwcm9kdWN0X25hbWU9IlN0YW5kYXJkIFBDIChRMzUgKyBJQ0g5LCAyMDA5KSIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBuZXh0dmVyc2lvbj0iMTA2LjAuNTI0OS4xMTkiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIzIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2NjkwNjkyMDAwIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2044
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9B1F70EC-37C9-4453-98FD-8E530239170F}\MicrosoftEdge_X64_109.0.1518.78.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9B1F70EC-37C9-4453-98FD-8E530239170F}\MicrosoftEdge_X64_109.0.1518.78.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD55cc3f9086309782768a9249d356b9b59
SHA171d37663270656dfb1a83dd53a49b2e27b8464ea
SHA2569006b9fe60112fbfa639ae580b018193d1ae3aedb33360fccdef7c249aed900e
SHA512d73b22de410164cea3b865956528d7dba9ae624ae6245a23820f72f4c7628a7f831aad392914a076bbb1177c4b2f4985c59a501c07685b079ab59aeac490d0ea
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\109.0.1518.78\MicrosoftEdge_X64_109.0.1518.78.exe
Filesize134.3MB
MD5fc72df3dea6a4512d0ea8f8f3a37fe75
SHA111a97b51b31e9ef156ae79a38b231f89072f1641
SHA2567953bf897a82eb1a9e97a2dea2f2cc8f9815d81285ad60ed946353d5de249a79
SHA512062ea81a0bc7632ef14080901829341dffef5009f4806893054021b6f930bcb4defe597db1cfb2527260c5e67c2cd5fc6ea344c6a6d1218ed80e29d2ef7b0498
-
Filesize
201KB
MD5ae0bd70d0d7e467457b9e39b29f78410
SHA1b4a549508cbc9f975a191434d4d20ad3c28d5028
SHA2564d9f16b00bda1db65b68cb486f7ae1bf5b32aedf7fd335e4a8ef2fa087870986
SHA512cbe2b5ffe647f5318edd9825ea6536d6d14dab66920def0323fb5b4dc03a4f8b6781b9209e5a557ab4d270b3f2b170797e6bd807195c93869367c0a245a3168e
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD566fcafc9f2f49c19563d76f5337788f1
SHA19544b0b23129dccaa43eaa5da4b5b4aa5eedf88d
SHA25606cfede5f76e1f17f971fa265e318e22fa6d743f0ee5879dfa9b09f5f471f207
SHA512ae1b4435e866ea4795e370940a8524a1b0bf04941612017831363b735d97184f1a125af9f7aef1e755b1b242419adbe4e5db7473ff090ca87d6669c25b76f14d
-
Filesize
201KB
MD5ae0bd70d0d7e467457b9e39b29f78410
SHA1b4a549508cbc9f975a191434d4d20ad3c28d5028
SHA2564d9f16b00bda1db65b68cb486f7ae1bf5b32aedf7fd335e4a8ef2fa087870986
SHA512cbe2b5ffe647f5318edd9825ea6536d6d14dab66920def0323fb5b4dc03a4f8b6781b9209e5a557ab4d270b3f2b170797e6bd807195c93869367c0a245a3168e
-
Filesize
201KB
MD5ae0bd70d0d7e467457b9e39b29f78410
SHA1b4a549508cbc9f975a191434d4d20ad3c28d5028
SHA2564d9f16b00bda1db65b68cb486f7ae1bf5b32aedf7fd335e4a8ef2fa087870986
SHA512cbe2b5ffe647f5318edd9825ea6536d6d14dab66920def0323fb5b4dc03a4f8b6781b9209e5a557ab4d270b3f2b170797e6bd807195c93869367c0a245a3168e
-
Filesize
212KB
MD5a0a6fe642213826a1613a5208a008055
SHA1e9059ce64a1ee047d299c88a9c64edf61cdc0504
SHA256f87c42f298612bb4cdaba4d56cbc1fde4856648bb1b771651b985b5d0f163cba
SHA512bfa27c53eda95fea35e2b732fae85760f4c260999a646d951a7c2c0ad34f1c7af0a8d90916f4f99ba1cb1951801dfee01d0f7f2775e4491519187fa8b9718d5b
-
Filesize
257KB
MD5465c5a2eae01ad9cc32ed0c5348fc2dc
SHA1aaccb9ae7aa82c8ed62a43571596c3a965b658b6
SHA256ff9b8963958042a650acf2f13a3697e5bb1c5ff2cab55d06166f5527de626021
SHA512605d9f9d12b981f218d0636912e048d4a76f01c960793ae9f6e1dd59f49c1fc2e615b51d919605d433467bb2fe9b9fa5fdb979432085a88f568b3b4cf876af44
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD56545c51ed0d062d63c7dd5a6f00a32c6
SHA1b6b7e5f44cb3c11f76a46e18fa7d80be9f6fdbd3
SHA256f9431d85c0869faf740220f88b2d8db61b53d9fb324da995d938412caaed0f3e
SHA512c99b0333b4e598fd9cad556a2fd60c725ae4c4ae45d53a45a7e051d106e3e24c401fd8686eb707d8357f01d899734889271ea3fda28bb55b7d35dcd338db7fb2
-
Filesize
28KB
MD5fa5578b2efc78389b459ab88b58c9abd
SHA1980ed1ceab5063849eef96deb26825d66aaec16d
SHA25679dca4ee4b15d9e599ccd7e12529a8b4d453d51c2b9ecd54d50bb280f0f5be7b
SHA512a4146ef506737eba5a7c373a51059abe4569d41b7030f75a9fa1228c729fa8465e22f0c2739af2690e9408d76f43c343e4ccdb92e6110505d2655bed5844ab67
-
Filesize
24KB
MD5e59264b8cdedc5590fb6d3abb52569c9
SHA12fa3c37ac3c81bbce1d1e2c6b9861b36715eb14f
SHA2565426cd930a651e304aed15fc8d693dd809f994cb195ca023608317efa7ef69f9
SHA5123d16943726526929678d7b4d9ab30b291643bf28c93fc010371a68af24f3a169d5da8b3e75413dae8279681092a558eba36ccc6fad177bd9b39a13728d3f3737
-
Filesize
26KB
MD5bcfb450a64ce92040d69e4fb5930762c
SHA1944a72d0072ea260e8927e6309de6ae4a4796ff6
SHA256a09fe2478e1662bcab92b41c8ecbe73d6bdeff386f0789c59236588ae2f887b7
SHA512210a39a25db954636e8da1ed6b1a9e3608f19ac3b154ec9f274694d3fb8617af69abf7516ea00d62a5b100b5121bd7de32ff5afec7632f697dece7d8a201e5ad
-
Filesize
28KB
MD5ff972d54852866ec3a43f11d7eeebd3e
SHA1d3aaa7122de308be3fdfe27eaf7e22e0c0a02852
SHA256b7862bb1d69e0e720db9fc1c498ed30f309dcaba73b304d239c1847441c5fd3d
SHA512a4141404d4873bbef1a522e63644fdf37c6118a6314624541e367855e7d7bebf4bdf736295857a6e5c28db79ac6f51ff94123fb7119e05a48fbe3ac77505624a
-
Filesize
29KB
MD575188196b6f7149d5ee776b95ff56ee4
SHA1ad80c3fbb83d67c96fc4c3276747678d78d71359
SHA256fddd8aba9fee226a935ace41d0f6707f1fae84d88f703bfa50ae9a13cd22610b
SHA51208ee04a6a95b5b7c2396dc60dad24f2dcd46259a6318a15596581cf86ca66a47cd7a6685c94a746e88ccacf3f5ae051894dd2eaf2d09f04fde94524fcf63d952
-
Filesize
29KB
MD51820cfa69f244a787a0af9a4935e94a3
SHA165dbdda6e072b7f7b60e5740468be3374d5783a9
SHA2569fbc74077908ad444da57cabe2f070dfb1c4f902b6917ce539cb2728612324b8
SHA512c7f3d33c0b0a8b0a68ebf7a2e79936b07ba7fd43bacd67dacc549a5856f7fd0495dd8922d0c12e5bcb774d67267c5ee8bad63ca12012c95311cae42d878b42d0
-
Filesize
29KB
MD5aba517fc0076e621244645abfdf2d60f
SHA13c1226b3fd9ae38967f8f3fc81d5c8014eab8ff3
SHA25617e4f7edf396f0b4d8f64b46c5530260558ab0637cafba8c93c8e928c2b6de43
SHA5125e3e48c8a97d10eac726b964716aa3524388474a7271c03657868fe8f1575ff0bde8911b91f6e874011e0c93581bd7a8d0d2920a140fdb47f37bb0d831befe45
-
Filesize
29KB
MD5933d66b54eaf05bc5aaab7c681da0b36
SHA1a86effdbcc468df187d74f5b5e9d42d88e3197d1
SHA2560e472bcc13ccfa83096e11217fefcb0e5aed3fa7ed8f1bfca7f2b7c151691b06
SHA512628ca72071bd072bab9f81a10c6ba79a3b9d48c60dda1b58d4245d24841ca1288fb253e9212ff2cf721e366ea0aff0a068b08372a0cdf9279b298825ec8d2086
-
Filesize
28KB
MD50961601651370bc0ad92ae34c745455e
SHA125b29bd74f6c5b5d16fb178cd6a53ea981309457
SHA2565443ff8250092985e0ea1ab213eebff92bf0a40d908051915ead8d1ae0e97a5d
SHA512d81053a2bb8ebdcbcc8d55671371a71af68c5d2cc309cb92d79dbd20203285846887da7c59453f38cb721fc164768a0b92bfaf62f78eb264acd37142df5f4e5e
-
Filesize
29KB
MD51a1ddb1f95ecca9d13139ad436c3fe48
SHA1bee6baf32a15188f5d64df3df3bacc12dcc56845
SHA256515a028bfc6dbd7d1aa1819f1ef70dc6382337318f907656f3768d1c66cdd53b
SHA5126e1bcb85d15a43757e6f3f75fb78cfedc4a8dd099c334415996cac7ea29f7e1577b8152c709192820d2b78b48b6cab7bf4015f741d4f1a2d845c6ec2376e5c54
-
Filesize
30KB
MD5140f6d23813e344ab06afe865699c0c0
SHA1527abdec73c8add2f9baf9d8de5c7d454512710d
SHA256390c60bbf529ffe7174f6e1f7cde2af1455d618f5eb16f6bc3a48cf2bdf51d27
SHA512b51988055a11eeff7a07b9b97a5055c0e0b8ce60f5a7aca94adcaa62472f63a9620d4f34eae75a772674eaa9e9461d716ba39989c1d6708e3846b92807f6c4f5
-
Filesize
28KB
MD590d8f09d6e68940399ebb1215c521511
SHA106d2a1a3a08cc2bf519ba83dbe08e4f240b60a4a
SHA2562c27a8c3653aae163bebe05f010a5d73aa47f0b58aad14bd1811b2300fe564dc
SHA51234cf592dbebf2055451b967d27cae5849896b26ef161bfc07aada6cf7757d39ac8b8fc9c003d3770f72aa046c132280be0646f9ae101e0ec36e3b6d95aa6a89d
-
Filesize
28KB
MD5cd2d40775ef0773519afcaa17509324e
SHA10ccc30932a50991937af5a16bd7ef92787eeb57b
SHA256a20e03e1c56dd2438c85b52e94f54839596e5352ba4b3a406b2daeab5fd24c0d
SHA5125d8aab4054c17720f9ea9dc28754efd440c06bf22b31c00c9020418a1ddea7bc9f5db285b2916af2e659c33649549a363af281563dff296275c4c8e2a7faf8d3
-
Filesize
28KB
MD5dd517584ac41b7c185c1258a13143062
SHA160da459099559e30908938b742d6f5c1d0f99a4b
SHA256904481a7bc079a6734dbce692d756952e7ffecebecb2f743568defc19f9f9e1b
SHA512f96a73ad75e8d9adc01841a3f7a552c3115ff643d1cba669511e17012f892cb352cd77963044029ff7a7243b941e9f29e53a4ec51ba52977d05af20ab6d44779
-
Filesize
30KB
MD5c4ec05491b1585b7a3aa50375f5e4368
SHA1cb37296d111b4c6d0456e88b94b482de4582161a
SHA256a1d616c002ae667321cb3d78958877dfa47bdaa83a43d374d8e3628ec6ae18d5
SHA5126392f6b349804243965b2ab83e80ee9a80627f9acaf5803aade67ab49c78647e3c8983b38fe7d1f55fefa0c90d2ca3b0cedf3d820c32a700eacd747fc4c72401
-
Filesize
30KB
MD57ed8de68978a390eeda6b9f4145f8fec
SHA1d4553ca5efd8801608196c81649dcd045e8beacf
SHA2566ddf0517c8e51150048ee6ac66d5659559ecd4e6c3343245068ea1b8a3350878
SHA51261806df41a9f2df86c71880be3e5e338ac35dad2a4964856e42a6d821b3d432b4412daa7a849cbbb3cb05228be777948387d90f6a4ed2276c537656098636e71
-
Filesize
27KB
MD5f0a758482ae88ee848215489129ec7bc
SHA1d1298f7e6e60f4a2c11a61c137200665aabdb3ad
SHA2562d76f0bf2669c672d1fa6c46417e65ac9a160a01d11990804ca40d3a3d9dbe76
SHA5120ec2be7863d2a7f187e831529ab959ffb9c90b4d90d45ad86a9e3522d77af86c12eef4bf9a5cdfadb7957e3e8fd8fd3841f4c301865b823bfaf99e1b55182bfd
-
Filesize
27KB
MD5dde9aacccb335e8a14bc4c0f2ac28eab
SHA18dfd19ecafda06c7e760e8fc17cc1dc43b9f3508
SHA256c701a69236db5927f925a7d2d9845ca22cd59e03e83bfaabe5c4db35d373c056
SHA51237de0760864b0e25277664ef8d8c4ac0df1f90ec6caa37f6e527be3b6af7a977b58453d26095fdede13ea9383166a9e60e9e0fdb9d8856eb54632a2943c1fada
-
Filesize
29KB
MD57e8d44be65ac66ce05fb0bae2ba06f59
SHA1f7341452313b2e38c0212b1ed499912d210fd315
SHA256564c505c5f3617b2ccbffafff9f81771055b6edccce22917fa0bf553386a3749
SHA51259417deaed339aa61f19336f307f2a5f5057f7ee18a13f1c8b4055e0bf0b8ee15bba6b15233aff239a7dc9b1fedc4a993fa8f4fbf9d76393f930c6ab2f52da85
-
Filesize
28KB
MD54c3382b9bb276730ac626a30904420f6
SHA1622af5199231a82a88fc70af89474f55af5fc2ed
SHA256430a568d7d001f4dbd4c3473838146542f06e8b7a0e8a8f41dec5de94feb9f84
SHA5121248bf0a772a7ad2264dfc3ddc6d0ffd278c83c335c8a4a1468ddee742fb6a0fa033ffd40bdd135c2604ce35c12f882951cdfd6ea728709ed287294e5fc149ec
-
Filesize
28KB
MD58b51e86ace114d92a5fd2f53269a0785
SHA1c175ead12ddc50d1df4b9b1687364aabee035a65
SHA2567b5b4c7eb487f5411c6dda6e7a91501f9473e2fa66dedcce28a12f356b984840
SHA51296de82a64d420120cc6eaf16d4ca77fd5aef1e848d6b006c2ec0ce5bbbc1ce6fae9fe57de552f3df9dcc59c49f5cdb024097a33c24c10de12c4adb6a5fecee4f
-
Filesize
28KB
MD58a3bd0c8f91564d3be5696756e05969d
SHA15388d1afb06786bfd4907b7580f763810d07d4dc
SHA256a8d60b8d17da26931755bdca16c486f03a5423d368f64eb164b22a7839bb17bd
SHA5124ec41f8e7c945f583d35ce61e58cb84d97fd8fddd31619c9ded8da7b90a4bfd5bc41c350d15bee2d7ca430ac69f04df980d67a5b931e5e1adc4fcf5ea2afe8b9
-
Filesize
27KB
MD533639788ab5d596a09d2fdf7688ee4cc
SHA1c6697fdd982c0ebe1559084f81d4e22304cd7184
SHA256f2763c899c134238e169d0fd09eb8bfdb8fd42b25d0724dbb6a1adf329a7845e
SHA5127a2998a7f7301671c7dcad8723ff5cd694710848ee1c43c9f06e525489b91a344d369aae45dc1d259c10c1ae083f88de8cdf1b8ce07b5a0d1a99fdfc87cfc21f
-
Filesize
28KB
MD5a3ae249b4498363bfc94043e725c5e2f
SHA1fd1baf19de13def5c9e8dc3d91e57f2ad1a7aca7
SHA2567c6c0a0ebc9e48da16f54f559f48af5ccdb375dcd914a36cc4662db0b7fe82b1
SHA512e8d6cd5981e96f7c4897355fe3283c8b3a0da20cead2e1a6bc2dff9f00a6fa7493fe129607c24d9dded9ab86cfb09e090af3038d4f16268d473d417b4dc2dfd6
-
Filesize
29KB
MD5635e9a59fb087047b6521a8c622dc31c
SHA19a6b5f14738fe1d11b0bdc52ac86962145a4c852
SHA256698d85a10bed433032d04d8221b2fec183ee7d944dbcb685ee90d28483084c64
SHA512cb368f6bcdc85c41adfaf77f4705109a74794b7b99d2ffa2c4af4a7457ebab3777164bcd42c4de2d7c4944460342c8efd8102de6b9e51ee7c193b43205ff5eac
-
Filesize
9.1MB
MD5b7618931340383b66b28ed859c805a43
SHA15d9dec5ef5b657ef9880d93829f8ea8959ba4b67
SHA256f7d8c1d800e64ecdf2a4aba4f9a0ac7782019f63d2b2ee81495bc4869554c2fb
SHA51253241d24d36453cd86926c6f38fea1e90f620d50f0a51393060af5a93929a4727251fbf7c7af2f1d594732b86073271e211a81ab0fea0a6e0b3ca2e6013751b8
-
Filesize
14KB
MD5f8784347359863ad01500355490ffcde
SHA14177803a032f5cc29a9e7367d0eef01c36cb8431
SHA2567a2551ffbe4ab57a4b93b0241bbedf6bb1fef2c765dc41b939a503d6ab51f910
SHA5123ae717a650c262649991e5490a7c52666e53427d15ac053c1ceec19e7569828ee5c5e94e3c970d0d8ccb7a5d049cdf218d7cbae72b93f18d5c974ff712cf7aee
-
Filesize
1KB
MD5c404102e3657daaaa7bea2662e892d07
SHA1d17e31e6f935259aafc7cfb228aadf54a49836e2
SHA256a26e1b6984478f719bd9fd1614742e1cbc3b19cb08815e16250612fe0a1ab13f
SHA51295ebe29b77444921b9977fec5e135b1363322e246e7cf8ef5222f0fa3ea5ff365dd073de8eb4980bf3a7352dbc9bf8412a049138b88b4457e8e99f2260c1b44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize765B
MD5cc1dfcf33cec09cf4b02162f29a2c9ea
SHA1a2d9977e00e49dac782209a10e16893a87c5f8a3
SHA25657831e2f282ae5cf0af7250482eb273f084d2f9eded56adbb5ccdb201b8df8e3
SHA512c241bde31bff14294e460769043108f526999891163dba0498b835f3fa63dc35034fc37b35ab8c43bb7b39816b1ca69fd5abd7469735d038da13f4bea1876a89
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_378BA46A07A0483C428E7FC44C59C2CB
Filesize638B
MD54d7c73f266c1f45f6a84afb7af11bfa6
SHA1d34ba5d7b0a333f1d3d7cefe9809cf099a8d09e3
SHA2565cec6e286168eb5270282378babddf54d115a35044c43398197416002554baf6
SHA51215f93b139e7e9387672b67e3328623e8146ca52d9ac0886539636523aca9a3c2bb0f3b8687b79484293bfea34546489e4a96f6752391f1d5e1226a39f9d329ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize1KB
MD5e2b38e80a0b051bf6a94370a1be65b43
SHA19b6203ec15376f74fe0e73bd81f1cd2c86341163
SHA256cc3abffacfa492e6de85519380a95050e139794ae09b05e45f3c116199e7375d
SHA512f5ac4fd53a4ee6bc7b934e632fc11899b0bf9cc791d307067969a2a1a342d80fc90f90caea5863fdeb3c562e7cf220e10e1c70c92cf9bf27cb6ab0bbccf53ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize484B
MD5ef9be72f18d7ecebd3f2368bf2fb555b
SHA14f322976d7aaf9583e95eb87490d09aa092a4f35
SHA2565ff9a99c468f048976d116fadbc71cb9543069ecf3c158e6c4ec6790b94b0148
SHA512a00995b59812c6c9e88e767d9a51f1c25943adc9a7bda7cf7630ab6a722592b2329af86495525703127964a46f37edd195f9eeed498b8055504dbb99a78e3c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD580c4cc0ef3592bf25db72aed56a5eae9
SHA196c704c60722f58b3bbd723039e274cf5cee4235
SHA256dc2f3b24e2957edb0c55730842e1592198da82124b9cca5ae321cf32d803599c
SHA512d55ce6f4133d6f208ac02d3f94b41e403c2561db886d71e8f7f7b4672531ddd57a6ca59f1da06a3004668affd26e5dd707edd4d67fd5f8442a2e81529c3eb4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_378BA46A07A0483C428E7FC44C59C2CB
Filesize484B
MD53d16fce2d688ba49017da7d6c90e61ec
SHA1bcfac27f56da6c230a1b4acb7785624e3c672387
SHA256222bf9701a49564502f37fc910086ca899331798ef4c686b1c03c5ec253323b9
SHA512068beed449e5d3fe9ce981745a45f8bb6cd932b5fad2f15d3097fb9499dbedb9db171b439931409d3401846cffb77d542f5560ab5a4a6f19eb18b6781d6ca19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize482B
MD57f52beed0f200f3f92a92afcafa4680f
SHA14b30cc054580a0b0d657ceb41fbc385078eea3cb
SHA256a8397605dccb4474fbcf6b65686b860367b0177b3042475700372e8032eddf2d
SHA5124b70d8b8a79393f93f137834b79d0757c588d9f93592c29bbd4df7fe2ccfbbdab9a8bd45251a8c58c70ee4aa23320875756a05284242f127fb6b0f769e44979e
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
5.7MB
MD541c305f5555c83b876ad9055d8f6d6a8
SHA1e3d2af686f2b4b1a03bf3853790697640c94ba22
SHA25629eef3d0b07ebf231546fdd0719b0102008310916ceda253fadb4037f484e753
SHA512956d2004ab0a69f4bf3fea667ba64a72d70a9ac4d699b5b9cda38417f3db1fe8f8e066b46dc2bf0fbb5afc4eb08ed004c0dbd1805b71f805253ab227be26dfa5
-
Filesize
2.3MB
MD5b4153c305f599325177fc402c696c4f9
SHA12832c07119d99a03cff018a56088f1e4861cd42a
SHA2566271fd1865bed9afbc9e92f36714e97495f5b327f8cda1e02b569e9e1b9daef5
SHA51286068967708635fc21a7702fa2ce8a32cc80b687ba80e217908e81fa5bdd3aca00400759948ed67c93f6807aa156943fc876817ccfb963a0890c1f2fa3d116b2
-
Filesize
1KB
MD5c5638dae40e73c5e49b3ce1f7d2a2f3f
SHA13bb2aad30f79dfb809f69c12e4d1f26d6fea3286
SHA25699c37193644a1c350369b292c3d84e0ac2410f30d7a85faae812690f8f27191d
SHA5125b63b2580c15c666c0313895c860eeed8f43dc54c24c3c6b8fdb9d788a51c6232aaeb8087f98d1d100e3d506276de627535ea9638d2e769047a662d99dbb7cbc
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
3KB
MD52d993cf03098e34447e44220eed5b96a
SHA1183fe01a60a6645cf5402a5f40fe667670ba0fe7
SHA25655ae9f92c705508e229d47c69c069c2c7c68fc03f186886c015dc69bd0841de2
SHA512165e735ab9d3a772e4105c904e60516452ac76d6cbbf617d805dc378dc3fcebb2f5f9ce125f990db2e2761024d7407ce0f1aead29ffad3e7f1b69d67a48a58e1
-
Filesize
7KB
MD5c5ffcb9a2bd2b30c47ef87e14c8ad402
SHA133434232e0716b466354e93834540f61744e9da3
SHA256c348030a190ab20b53d506bd6589c2f20efca50c71d51e2222b8007bcb0feea1
SHA512100e5de18a691d7f9c6bf9abb727b2d996bae903f9b0b49a1f0edd409e30061a4ed14d9257e2d35bcee16fb3a63746388f13092c61e69685fc96da99ec6c3c11
-
Filesize
6.4MB
MD56f7e07b84897cccab30594305416d36f
SHA16d1d531c921a17b36e792e2843311e27b9aa77a4
SHA2569982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0
SHA512689ba6b48065a9098ef62bc8ed0650fa0b66f403af9dc315a456d514ea61afda7cf67c3786760e4ac49adc8a60f489199e6aae08a59aa4ef8e57e064bce9e892
-
Filesize
5.7MB
MD541c305f5555c83b876ad9055d8f6d6a8
SHA1e3d2af686f2b4b1a03bf3853790697640c94ba22
SHA25629eef3d0b07ebf231546fdd0719b0102008310916ceda253fadb4037f484e753
SHA512956d2004ab0a69f4bf3fea667ba64a72d70a9ac4d699b5b9cda38417f3db1fe8f8e066b46dc2bf0fbb5afc4eb08ed004c0dbd1805b71f805253ab227be26dfa5
-
Filesize
1.5MB
MD5b32d72daeee036e2b8f1c57e4a40e87a
SHA1564caa330d077a3d26691338b3e38ee4879a929d
SHA25665f6efdf6df4095971a95f4bf387590ae63109388344632a22458265ab7dd289
SHA512b5d62ce1462d786c01d38e13d030ad6236ce63321819cf860cc6169f50f6309e627bc7709b305422851779e37dbae9fb358008aad8d6c124cd33cdec730288d5
-
Filesize
1.5MB
MD5b32d72daeee036e2b8f1c57e4a40e87a
SHA1564caa330d077a3d26691338b3e38ee4879a929d
SHA25665f6efdf6df4095971a95f4bf387590ae63109388344632a22458265ab7dd289
SHA512b5d62ce1462d786c01d38e13d030ad6236ce63321819cf860cc6169f50f6309e627bc7709b305422851779e37dbae9fb358008aad8d6c124cd33cdec730288d5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58673e93bb3d28e9692bb4486080e8839
SHA108124ea088a89f11cf5503523b5e0dfa6ce99877
SHA256829bdb4f0af54a9acbb3a7acd59556e66ddf35c8b017f7309f32f78b740951c9
SHA512c5b5f6569279948d65dc285502133b3506beb8d0cf50074f93159a3ad9b6402dc3e732ac0f6bfaede447097123e5c8cee64815ab73035f63251aceb649be333b
-
Filesize
652B
MD568cbf6cd0ffae2b8826f3305c8879357
SHA1f9acdaf030a88c55568193c66bc664a11db977e9
SHA256b9ba400a96124dc33c7c5c88a61beb5f9a0436ecbf45eb8bcd1fbfd7824ba992
SHA51204375842cd7d9cf0bf4521afbd905c6fe8e40422fd44ba7a7ac18d48953ddf620064c9bcf7f4e2a5116a1154143365c36496879212cf46740326181112bee42f
-
Filesize
203B
MD5b611be9282deb44eed731f72bcbb2b82
SHA1cc1d606d853bbabd5fef87255356a0d54381c289
SHA256ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6
SHA51263b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4
-
Filesize
309B
MD5538b7dca42e4e472f6143b98fd8808a3
SHA1ba06edec04ede115c2a5c9f7c69d7812860111e0
SHA2562a849558771f160e89d1b8e385a7415d6b391d5628e9f8daa0d5fc41eb351e44
SHA51219ad6349f9ff722f6b5429acc52b12f18f3d521faa677baf50ec53dad1a42f31f955808dc535f03fb673806cc04542425417d4fd2271b04908d3307dcfea5a9f
-
Filesize
201KB
MD5ae0bd70d0d7e467457b9e39b29f78410
SHA1b4a549508cbc9f975a191434d4d20ad3c28d5028
SHA2564d9f16b00bda1db65b68cb486f7ae1bf5b32aedf7fd335e4a8ef2fa087870986
SHA512cbe2b5ffe647f5318edd9825ea6536d6d14dab66920def0323fb5b4dc03a4f8b6781b9209e5a557ab4d270b3f2b170797e6bd807195c93869367c0a245a3168e
-
Filesize
2.1MB
MD56545c51ed0d062d63c7dd5a6f00a32c6
SHA1b6b7e5f44cb3c11f76a46e18fa7d80be9f6fdbd3
SHA256f9431d85c0869faf740220f88b2d8db61b53d9fb324da995d938412caaed0f3e
SHA512c99b0333b4e598fd9cad556a2fd60c725ae4c4ae45d53a45a7e051d106e3e24c401fd8686eb707d8357f01d899734889271ea3fda28bb55b7d35dcd338db7fb2
-
Filesize
27KB
MD5dde9aacccb335e8a14bc4c0f2ac28eab
SHA18dfd19ecafda06c7e760e8fc17cc1dc43b9f3508
SHA256c701a69236db5927f925a7d2d9845ca22cd59e03e83bfaabe5c4db35d373c056
SHA51237de0760864b0e25277664ef8d8c4ac0df1f90ec6caa37f6e527be3b6af7a977b58453d26095fdede13ea9383166a9e60e9e0fdb9d8856eb54632a2943c1fada
-
Filesize
27KB
MD5dde9aacccb335e8a14bc4c0f2ac28eab
SHA18dfd19ecafda06c7e760e8fc17cc1dc43b9f3508
SHA256c701a69236db5927f925a7d2d9845ca22cd59e03e83bfaabe5c4db35d373c056
SHA51237de0760864b0e25277664ef8d8c4ac0df1f90ec6caa37f6e527be3b6af7a977b58453d26095fdede13ea9383166a9e60e9e0fdb9d8856eb54632a2943c1fada
-
Filesize
9.1MB
MD5b7618931340383b66b28ed859c805a43
SHA15d9dec5ef5b657ef9880d93829f8ea8959ba4b67
SHA256f7d8c1d800e64ecdf2a4aba4f9a0ac7782019f63d2b2ee81495bc4869554c2fb
SHA51253241d24d36453cd86926c6f38fea1e90f620d50f0a51393060af5a93929a4727251fbf7c7af2f1d594732b86073271e211a81ab0fea0a6e0b3ca2e6013751b8
-
Filesize
9.1MB
MD5b7618931340383b66b28ed859c805a43
SHA15d9dec5ef5b657ef9880d93829f8ea8959ba4b67
SHA256f7d8c1d800e64ecdf2a4aba4f9a0ac7782019f63d2b2ee81495bc4869554c2fb
SHA51253241d24d36453cd86926c6f38fea1e90f620d50f0a51393060af5a93929a4727251fbf7c7af2f1d594732b86073271e211a81ab0fea0a6e0b3ca2e6013751b8
-
Filesize
9.1MB
MD5b7618931340383b66b28ed859c805a43
SHA15d9dec5ef5b657ef9880d93829f8ea8959ba4b67
SHA256f7d8c1d800e64ecdf2a4aba4f9a0ac7782019f63d2b2ee81495bc4869554c2fb
SHA51253241d24d36453cd86926c6f38fea1e90f620d50f0a51393060af5a93929a4727251fbf7c7af2f1d594732b86073271e211a81ab0fea0a6e0b3ca2e6013751b8
-
Filesize
9.1MB
MD5b7618931340383b66b28ed859c805a43
SHA15d9dec5ef5b657ef9880d93829f8ea8959ba4b67
SHA256f7d8c1d800e64ecdf2a4aba4f9a0ac7782019f63d2b2ee81495bc4869554c2fb
SHA51253241d24d36453cd86926c6f38fea1e90f620d50f0a51393060af5a93929a4727251fbf7c7af2f1d594732b86073271e211a81ab0fea0a6e0b3ca2e6013751b8
-
Filesize
9.1MB
MD5b7618931340383b66b28ed859c805a43
SHA15d9dec5ef5b657ef9880d93829f8ea8959ba4b67
SHA256f7d8c1d800e64ecdf2a4aba4f9a0ac7782019f63d2b2ee81495bc4869554c2fb
SHA51253241d24d36453cd86926c6f38fea1e90f620d50f0a51393060af5a93929a4727251fbf7c7af2f1d594732b86073271e211a81ab0fea0a6e0b3ca2e6013751b8
-
Filesize
9.1MB
MD5b7618931340383b66b28ed859c805a43
SHA15d9dec5ef5b657ef9880d93829f8ea8959ba4b67
SHA256f7d8c1d800e64ecdf2a4aba4f9a0ac7782019f63d2b2ee81495bc4869554c2fb
SHA51253241d24d36453cd86926c6f38fea1e90f620d50f0a51393060af5a93929a4727251fbf7c7af2f1d594732b86073271e211a81ab0fea0a6e0b3ca2e6013751b8
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600