Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 12:14
Behavioral task
behavioral1
Sample
Roshade.Setup.3.3.1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Roshade.Setup.3.3.1.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
out.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
out.exe
Resource
win10v2004-20230220-en
General
-
Target
Roshade.Setup.3.3.1.exe
-
Size
5.7MB
-
MD5
fe51cdac1d70cc17a57cae25c164bf47
-
SHA1
814144cb9df1c25942321ff04bb9b64ba55fc5fc
-
SHA256
83fd3eb8248b4a41ab7bcbbe193d93e57bc0034d20259c6e21dc6a427cfe0dcd
-
SHA512
87c02c489ecc68a186df7e5d2c5dda3d7ff594fd4fb19a2dacd8556ff91b9a7494889a466a28e930cbe02a57247f8042c1d6e84c91c064c4acb40f8afbcc8075
-
SSDEEP
98304:wSUoEyUQRr+SLX5fuK5QBEcMXiqvC7CjpLgMFX7e1V0fZAICcB5E3d66cIKwZ/0e:wn1QVFX5fZqBEcqvC2jTx76V0BACY3db
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
resource yara_rule behavioral2/memory/2184-133-0x00007FF768770000-0x00007FF7693E3000-memory.dmp upx behavioral2/memory/2184-245-0x00007FF768770000-0x00007FF7693E3000-memory.dmp upx behavioral2/memory/2184-565-0x00007FF768770000-0x00007FF7693E3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce setup.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Roshade.Setup.3.3.1.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 10 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\identity_proxy\win10\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\msedgeupdateres_cy.dll wv.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\sq.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\resources.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\te.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\pwahelper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\identity_proxy\win10\identity_helper.Sparse.Stable.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Trust Protection Lists\Mu\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Locales\sv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Locales\et.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Locales\zh-TW.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\msedgeupdateres_mt.dll wv.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0112779-9868-4DDB-8FED-90D44FAAD59A}\EDGEMITMP_44BA2.tmp\SETUP.EX_ MicrosoftEdge_X64_113.0.1774.50.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\edge_feedback\mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\MEIPreload\manifest.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Trust Protection Lists\Sigma\Cryptomining setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0112779-9868-4DDB-8FED-90D44FAAD59A}\EDGEMITMP_44BA2.tmp\setup.exe MicrosoftEdge_X64_113.0.1774.50.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Trust Protection Lists\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Locales\sl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Locales\uk.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\msedgeupdateres_eu.dll wv.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\qu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\or.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\sr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Locales\es.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\sk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\identity_proxy\beta.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Trust Protection Lists\Mu\Other setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\msedgeupdateres_en.dll wv.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\EdgeWebView.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\wns_push_client.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Notifications\SoftLandingAssetDark.gif setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\lb.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\msedgeupdateres_ug.dll wv.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0112779-9868-4DDB-8FED-90D44FAAD59A}\EDGEMITMP_44BA2.tmp\SETUP.EX_ MicrosoftEdge_X64_113.0.1774.50.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Locales\hi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Locales\ms.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe wv.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\fi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\pa.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\bn-IN.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\msedgeupdateres_ar.dll wv.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\msedgeupdateres_fi.dll wv.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\msedgeupdateres_hu.dll wv.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\msedgeupdateres_ja.dll wv.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\ml.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\identity_proxy\win10\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\EdgeUpdate.dat wv.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\vccorlib140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source2440_1686842206\msedge_7z.data setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Extensions\external_extensions.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\mojo_core.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\msedge_proxy.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\lo.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\lt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Locales\ug.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\Trust Protection Lists\Sigma\Staging setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\113.0.1774.50\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\Locales\mi.pak setup.exe -
Executes dropped EXE 21 IoCs
pid Process 4052 wv.exe 1700 MicrosoftEdgeUpdate.exe 4224 MicrosoftEdgeUpdate.exe 3168 MicrosoftEdgeUpdate.exe 2032 MicrosoftEdgeUpdateComRegisterShell64.exe 1188 MicrosoftEdgeUpdateComRegisterShell64.exe 2356 MicrosoftEdgeUpdateComRegisterShell64.exe 3172 MicrosoftEdgeUpdate.exe 1920 MicrosoftEdgeUpdate.exe 3196 MicrosoftEdgeUpdate.exe 1312 MicrosoftEdgeUpdate.exe 3436 MicrosoftEdge_X64_113.0.1774.50.exe 2440 setup.exe 1144 MicrosoftEdgeUpdate.exe 4444 msedgewebview2.exe 644 msedgewebview2.exe 4584 msedgewebview2.exe 428 msedgewebview2.exe 1888 msedgewebview2.exe 4908 msedgewebview2.exe 2788 7zr.exe -
Loads dropped DLL 42 IoCs
pid Process 1700 MicrosoftEdgeUpdate.exe 4224 MicrosoftEdgeUpdate.exe 3168 MicrosoftEdgeUpdate.exe 2032 MicrosoftEdgeUpdateComRegisterShell64.exe 3168 MicrosoftEdgeUpdate.exe 1188 MicrosoftEdgeUpdateComRegisterShell64.exe 3168 MicrosoftEdgeUpdate.exe 2356 MicrosoftEdgeUpdateComRegisterShell64.exe 3168 MicrosoftEdgeUpdate.exe 3172 MicrosoftEdgeUpdate.exe 1920 MicrosoftEdgeUpdate.exe 3196 MicrosoftEdgeUpdate.exe 3196 MicrosoftEdgeUpdate.exe 1920 MicrosoftEdgeUpdate.exe 1312 MicrosoftEdgeUpdate.exe 1144 MicrosoftEdgeUpdate.exe 2184 Roshade.Setup.3.3.1.exe 4444 msedgewebview2.exe 644 msedgewebview2.exe 4444 msedgewebview2.exe 4444 msedgewebview2.exe 4444 msedgewebview2.exe 4584 msedgewebview2.exe 428 msedgewebview2.exe 1888 msedgewebview2.exe 4444 msedgewebview2.exe 4584 msedgewebview2.exe 4584 msedgewebview2.exe 1888 msedgewebview2.exe 1888 msedgewebview2.exe 428 msedgewebview2.exe 428 msedgewebview2.exe 4584 msedgewebview2.exe 4584 msedgewebview2.exe 4584 msedgewebview2.exe 4584 msedgewebview2.exe 4584 msedgewebview2.exe 4584 msedgewebview2.exe 4908 msedgewebview2.exe 4908 msedgewebview2.exe 4908 msedgewebview2.exe 4444 msedgewebview2.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\Elevation MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LocalServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{79D15DEF-E2AC-47E8-87F1-1AFD6FC3CFB4}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\PROGID MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\CLSID\ = "{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{79D15DEF-E2AC-47E8-87F1-1AFD6FC3CFB4}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{79D15DEF-E2AC-47E8-87F1-1AFD6FC3CFB4}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods\ = "5" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ = "IAppCommand2" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods\ = "6" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ = "IApp2" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\ELEVATION MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\ProgID\ = "MicrosoftEdgeUpdate.CredentialDialogMachine.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79D15DEF-E2AC-47E8-87F1-1AFD6FC3CFB4}\InprocHandler32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ = "IAppCommandWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ServiceParameters = "/comsvc" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1700 MicrosoftEdgeUpdate.exe 1700 MicrosoftEdgeUpdate.exe 1700 MicrosoftEdgeUpdate.exe 1700 MicrosoftEdgeUpdate.exe 1700 MicrosoftEdgeUpdate.exe 1700 MicrosoftEdgeUpdate.exe 2184 Roshade.Setup.3.3.1.exe 2184 Roshade.Setup.3.3.1.exe 2184 Roshade.Setup.3.3.1.exe 2184 Roshade.Setup.3.3.1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 4444 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1700 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1700 MicrosoftEdgeUpdate.exe Token: SeRestorePrivilege 2788 7zr.exe Token: 35 2788 7zr.exe Token: SeSecurityPrivilege 2788 7zr.exe Token: SeSecurityPrivilege 2788 7zr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2184 Roshade.Setup.3.3.1.exe 4444 msedgewebview2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 4052 2184 Roshade.Setup.3.3.1.exe 84 PID 2184 wrote to memory of 4052 2184 Roshade.Setup.3.3.1.exe 84 PID 2184 wrote to memory of 4052 2184 Roshade.Setup.3.3.1.exe 84 PID 4052 wrote to memory of 1700 4052 wv.exe 85 PID 4052 wrote to memory of 1700 4052 wv.exe 85 PID 4052 wrote to memory of 1700 4052 wv.exe 85 PID 1700 wrote to memory of 4224 1700 MicrosoftEdgeUpdate.exe 86 PID 1700 wrote to memory of 4224 1700 MicrosoftEdgeUpdate.exe 86 PID 1700 wrote to memory of 4224 1700 MicrosoftEdgeUpdate.exe 86 PID 1700 wrote to memory of 3168 1700 MicrosoftEdgeUpdate.exe 87 PID 1700 wrote to memory of 3168 1700 MicrosoftEdgeUpdate.exe 87 PID 1700 wrote to memory of 3168 1700 MicrosoftEdgeUpdate.exe 87 PID 3168 wrote to memory of 2032 3168 MicrosoftEdgeUpdate.exe 88 PID 3168 wrote to memory of 2032 3168 MicrosoftEdgeUpdate.exe 88 PID 3168 wrote to memory of 1188 3168 MicrosoftEdgeUpdate.exe 89 PID 3168 wrote to memory of 1188 3168 MicrosoftEdgeUpdate.exe 89 PID 3168 wrote to memory of 2356 3168 MicrosoftEdgeUpdate.exe 90 PID 3168 wrote to memory of 2356 3168 MicrosoftEdgeUpdate.exe 90 PID 1700 wrote to memory of 3172 1700 MicrosoftEdgeUpdate.exe 91 PID 1700 wrote to memory of 3172 1700 MicrosoftEdgeUpdate.exe 91 PID 1700 wrote to memory of 3172 1700 MicrosoftEdgeUpdate.exe 91 PID 1700 wrote to memory of 1920 1700 MicrosoftEdgeUpdate.exe 94 PID 1700 wrote to memory of 1920 1700 MicrosoftEdgeUpdate.exe 94 PID 1700 wrote to memory of 1920 1700 MicrosoftEdgeUpdate.exe 94 PID 3196 wrote to memory of 1312 3196 MicrosoftEdgeUpdate.exe 96 PID 3196 wrote to memory of 1312 3196 MicrosoftEdgeUpdate.exe 96 PID 3196 wrote to memory of 1312 3196 MicrosoftEdgeUpdate.exe 96 PID 3196 wrote to memory of 3436 3196 MicrosoftEdgeUpdate.exe 104 PID 3196 wrote to memory of 3436 3196 MicrosoftEdgeUpdate.exe 104 PID 3436 wrote to memory of 2440 3436 MicrosoftEdge_X64_113.0.1774.50.exe 105 PID 3436 wrote to memory of 2440 3436 MicrosoftEdge_X64_113.0.1774.50.exe 105 PID 3196 wrote to memory of 1144 3196 MicrosoftEdgeUpdate.exe 106 PID 3196 wrote to memory of 1144 3196 MicrosoftEdgeUpdate.exe 106 PID 3196 wrote to memory of 1144 3196 MicrosoftEdgeUpdate.exe 106 PID 2184 wrote to memory of 4444 2184 Roshade.Setup.3.3.1.exe 107 PID 2184 wrote to memory of 4444 2184 Roshade.Setup.3.3.1.exe 107 PID 4444 wrote to memory of 644 4444 msedgewebview2.exe 108 PID 4444 wrote to memory of 644 4444 msedgewebview2.exe 108 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 PID 4444 wrote to memory of 4584 4444 msedgewebview2.exe 109 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roshade.Setup.3.3.1.exe"C:\Users\Admin\AppData\Local\Temp\Roshade.Setup.3.3.1.exe"1⤵
- Checks whether UAC is enabled
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\wv.exe"C:\Users\Admin\AppData\Local\Temp\wv.exe"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUCB73.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Sets file execution options in registry
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4224
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2032
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1188
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2356
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:3172
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{65117C88-FB9D-43DD-9337-6003021ABB46}"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1920
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Roshade.Setup.3.3.1.exe --webview-exe-version=3.3.1 --user-data-dir="C:\Users\Admin\AppData\Local\Roshade\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=MojoIpcz,msWebOOUI,msPdfOOUI --mojo-named-platform-channel-pipe=2184.2452.88457033145654939722⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4444 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Roshade\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Roshade\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=113.0.5672.127 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=113.0.1774.50 --initial-client-data=0x104,0x108,0x10c,0xe0,0x114,0x7ffc03349de0,0x7ffc03349df0,0x7ffc03349e003⤵
- Executes dropped EXE
- Loads dropped DLL
PID:644
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roshade\EBWebView" --webview-exe-name=Roshade.Setup.3.3.1.exe --webview-exe-version=3.3.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1848 --field-trial-handle=1852,i,5522856403448074252,9644012659563069296,262144 --disable-features=MojoIpcz,msPdfOOUI,msWebOOUI /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4584
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roshade\EBWebView" --webview-exe-name=Roshade.Setup.3.3.1.exe --webview-exe-version=3.3.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2568 --field-trial-handle=1852,i,5522856403448074252,9644012659563069296,262144 --disable-features=MojoIpcz,msPdfOOUI,msWebOOUI /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1888
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roshade\EBWebView" --webview-exe-name=Roshade.Setup.3.3.1.exe --webview-exe-version=3.3.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=1900 --field-trial-handle=1852,i,5522856403448074252,9644012659563069296,262144 --disable-features=MojoIpcz,msPdfOOUI,msWebOOUI /prefetch:33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:428
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\113.0.1774.50\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roshade\EBWebView" --webview-exe-name=Roshade.Setup.3.3.1.exe --webview-exe-version=3.3.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=3384 --field-trial-handle=1852,i,5522856403448074252,9644012659563069296,262144 --disable-features=MojoIpcz,msPdfOOUI,msWebOOUI /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Roshade\7zr.exe"C:\Users\Admin\AppData\Local\Temp\Roshade\7zr.exe" x -y files.7z2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjMiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQzMjIwMDU4ODUiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:1312
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0112779-9868-4DDB-8FED-90D44FAAD59A}\MicrosoftEdge_X64_113.0.1774.50.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0112779-9868-4DDB-8FED-90D44FAAD59A}\MicrosoftEdge_X64_113.0.1774.50.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0112779-9868-4DDB-8FED-90D44FAAD59A}\EDGEMITMP_44BA2.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0112779-9868-4DDB-8FED-90D44FAAD59A}\EDGEMITMP_44BA2.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0112779-9868-4DDB-8FED-90D44FAAD59A}\MicrosoftEdge_X64_113.0.1774.50.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Executes dropped EXE
PID:2440
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-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_UDE9MTY4NTEwMzI5OCZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1BZ0lNa1lkM3ZRRUVEaFR5ZjQwYzNPdGpybEY1NjV3cEx0bW5xSEZwaFh1YzJNRTNDYWhuJTJiQm4wNUZIYTNGNjZNeXhManZUY1hYc1JLVFRxMGtqd2JRJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMTQ2ODQ5NzEyIiB0b3RhbD0iMTQ2ODQ5NzEyIiBkb3dubG9hZF90aW1lX21zPSIxMDQ2OCIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ1MjQxOTI5NzMiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI2IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0NTQ4NDE0NDMzIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzA5MDM3MzM0IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMjY2IiBkb3dubG9hZF90aW1lX21zPSIxOTUwMCIgZG93bmxvYWRlZD0iMTQ2ODQ5NzEyIiB0b3RhbD0iMTQ2ODQ5NzEyIiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSI3NjA2MiIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:1144
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD514c611d0379f5a07abf7ad6f3361e9c4
SHA1ee076da25b368186a54f18c0faaa9ff604cf1856
SHA256780853d02488fe1a63986db63dcc0bdbc6d8e0bb612d6af0aaa32eba82168e16
SHA512cd6bc7a67f15f733ea9805550327865272ecd5ee3a737cbcf38f97202a4f9735fad7f54d30e7d9f84ec60bf0fd7e1788fd4d2626949768043222daf6764f6b2f
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\113.0.1774.50\MicrosoftEdge_X64_113.0.1774.50.exe
Filesize140.0MB
MD5b502e8e5ee192f9cfab4f1765301379b
SHA1725c9097982e3b571aa1a5d43c9f64b2592caf9e
SHA256e8835928967703c0ef1d59c476ed7509d468ea6c7e8472dabb56207966e2216d
SHA512bf7739241aeba917a91cdfe8203091aaa58695dd2a49ea657ca6fee55d43492a4fe55b0aaa3af2fecb085d93b5c194d04c45d3fbcff709d616d1de82226b368a
-
Filesize
201KB
MD54cb326ff5bdb251b9f92b35e4a4d7741
SHA126442b959c62db6604f6d0bffaab38ca39050b62
SHA25638a44760c4b6fd553531d7f99f6f78110f488e57ee00d2fc498635ec7ab4a478
SHA5129d62f48be43de8e6a60ee40f9e982c1906273b65c96299ae68e1f72e31b8f78dd01199b36f62e61836a2c0d84fc106ae550cf94ffe2cb9b6a082774cb8eedea4
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD5cde0b043689701612c34a2207d6f19bc
SHA18136c9272876c5f47bd2e15ac8f18f46d2a7ffd7
SHA256521ec740311e90716250d61bf1e7c5b4aee3fa7b8a0ac7156457512aa4bd161d
SHA512f1e530d8f727dfd66cf4513303c29ea5f902f39ed5b435a1d21401405d159ddd268b7609d8467de3a1aaf9baef827b82792a2f75b2393250b4f2208a9a402fc9
-
Filesize
201KB
MD54cb326ff5bdb251b9f92b35e4a4d7741
SHA126442b959c62db6604f6d0bffaab38ca39050b62
SHA25638a44760c4b6fd553531d7f99f6f78110f488e57ee00d2fc498635ec7ab4a478
SHA5129d62f48be43de8e6a60ee40f9e982c1906273b65c96299ae68e1f72e31b8f78dd01199b36f62e61836a2c0d84fc106ae550cf94ffe2cb9b6a082774cb8eedea4
-
Filesize
201KB
MD54cb326ff5bdb251b9f92b35e4a4d7741
SHA126442b959c62db6604f6d0bffaab38ca39050b62
SHA25638a44760c4b6fd553531d7f99f6f78110f488e57ee00d2fc498635ec7ab4a478
SHA5129d62f48be43de8e6a60ee40f9e982c1906273b65c96299ae68e1f72e31b8f78dd01199b36f62e61836a2c0d84fc106ae550cf94ffe2cb9b6a082774cb8eedea4
-
Filesize
212KB
MD55b66418885b6e16363a52f3929e1106b
SHA1532245beddb1f2686f105a3ab5cab3bed18f6647
SHA2567d1c6c4c8f7ee030c318a86af954c97b914990a89da1f28ad02df84d569b8a90
SHA512ffba026cf991c6c86d5e22ede5df0139b85bd33255f8b890f39b4a7d9bb55eb42d88a7ca8199fb56ef395faae5fe24fd4d527042e3b18668839bee9d2e2bf4c8
-
Filesize
257KB
MD5ff4ec7cfa567f13b3d39f4421e51a9be
SHA1fb8e32097b408d9c48c866ed52a852904209b315
SHA256cbb0cc650fed59965de18beff97303b5e70d4602a5272029ce7935080e150b43
SHA512b28bc8b5cd500ea14321c32308b600432e0b43146dfcbbfe1d44551eef37d01f1bfe33eb5aeae497776a640efb1e6bc4d6842b61c73441cc4c024c5dcb46ec34
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD5dc025358d0e6146597a8381d38412fc1
SHA14ea48d01ab8a3d0156f56e62aed18e1effa76ac6
SHA25660177c766e9f32fad5158dd7f4e006835db66a418e6f0e6ae29a3b517c811892
SHA512bb7c4b19e7d81d839e5ff3d860e6a6d82e460ce790ff8277ad2887529a3a56822863772b608ca69d9d93c13386d23b883ec432055909c3b144271aee7dd6f187
-
Filesize
2.1MB
MD5dc025358d0e6146597a8381d38412fc1
SHA14ea48d01ab8a3d0156f56e62aed18e1effa76ac6
SHA25660177c766e9f32fad5158dd7f4e006835db66a418e6f0e6ae29a3b517c811892
SHA512bb7c4b19e7d81d839e5ff3d860e6a6d82e460ce790ff8277ad2887529a3a56822863772b608ca69d9d93c13386d23b883ec432055909c3b144271aee7dd6f187
-
Filesize
28KB
MD5a4b8f24d201402785f2ca163a4af2d27
SHA18c046a284bbf445f67098fa76ddb1a150bd4ddc0
SHA256992614574ee31aa50e038a35d5f501045d0febd80278dce0f2874facf2938cca
SHA512a728761d3470585ac4a642295383ee064a3e83c4aa3cf132f1f710d6e0e0edc35d3d8af0d24b208103ff305ef40ca6fd9847c7b9a9284fc4cb52dc0b80180682
-
Filesize
24KB
MD597ded7a9f936f7e6019c7625413debb7
SHA11fc734c9f940fc07170090c16a587dac65623261
SHA256df357cb62f57b95f57a52d665c92da6674b6cfbffb8c6ef33e58ce65742379a1
SHA5122b3175140d9f4bbf78a006ffe7c59bfdb315b1c51f765a1d2c5e71ecd16e3c95cd7b8cc671443a61a51dcd02df6d875235efc2f3b635ab68cf13757875a9a25a
-
Filesize
26KB
MD527668ea5d2ffb894b91ac78a38f010dd
SHA1b3ddc1db958cdf24aea6ba1273651815c6df9cab
SHA2563ca0191953302ac0f9d079b0610172ba1433a7ea2be8c87ebee098b131ec6fff
SHA5121b53983e24b06179fe4a5942cb58423f6e2315cb550b81e574460936b11bee26c35d1c08463047285b0ca4be4cb5f9f7d72b9f9c2448639f65ceaa81fc4edff0
-
Filesize
28KB
MD52f5d2e565d54543051a6ad62fa840947
SHA157c486e7377c0b06048cf43a791a330df68694f3
SHA25612d9210151de9c820eae139495ad438ca9010df27e43077b8e96c8b9f4a30c4a
SHA512d072101b5714a3a0ec5f0df4030b37d8e791364d370f592bb0a739a295c7755578a7bc9de6375ecd45882a6ab45f33e8d2c4c84bac1304f34e37c04e339dc959
-
Filesize
29KB
MD5c245242d173d0caeb11d281eb7db5673
SHA16a1e82b5505f231c5390815af18babe44668aa4f
SHA25625086eea02a58d0c0cee8e41a95861ca139fa5ef6e76a9e5a8b377b05942b2ff
SHA51221c6bcd58a283f6b0fce68aa46277d592cf4e2091d342bc68d0751036fbcf80d5cb1e135f83ef8cb0ee7f67cf3e7c48b95e36d3dcbefe63e8e71e687868fdc7d
-
Filesize
29KB
MD547c1b34fe823f224d21820a0d578b6ff
SHA11b289cec1b473127d3c076897f8c0e986b20b2c1
SHA25617a709938f9b8c3881e01a9d96d90fc5941f30f74b9e4465602593e99703f4d2
SHA512e7d129db5333a1d4604183a79f6053a1f9968d2e04511e580ac0c77446ac8a9a028ce75a87abda2c8e6e5bbed6b29634794087ac3b49acc93e2215e253384ee3
-
Filesize
29KB
MD5a1f77030addb6910d8aa0cf40cbbb9e9
SHA16abfe99973648f2923d7eaeac0b1d62548b81c1e
SHA256031e2895e7f691bf01b248b2b44f07dd3363801b5db547be2f0d8a2750bd49e7
SHA5128d84060e277835fa7f7b16e2c8b44bda0895b4281714f448451ae00b4a25bd45740e251c4f91cbafd07a0492eb1c283f0c9d0f279876e21db3226074a761fa38
-
Filesize
29KB
MD56ffa3f421d240d7fdc81a22c3a038081
SHA18ab2f56177102149c3303f3d4fefd750b7ff9d3c
SHA256b4c3e95222ab7c53e8d620f3e3774db2a7c418abea941fc193fe89aa1fd67f6f
SHA51297bdb6972cb8c209e71e36171011a387571fa26142fd9c8f9668857d93278125d57ab9f7c650baafaa3641191ed5d462ba66d03aa3d42370532f8711b739870b
-
Filesize
28KB
MD5935de4cd1430856f2ff7e159a58cadf2
SHA11e795b830eacb25b3c1fe65ef0049e33aedf5c01
SHA25675b59524b1cb010429df91a08bfe794f77d80504722bd2ba8cdba96ca0ce1820
SHA512ff12c59fd87797803c8936a9d6687e1f015f80d136cb83a9ede6681f892f59f2b28e86c77c499837f8326f43576aacc81b8b677453a0ce6a18a18e134edec52b
-
Filesize
29KB
MD59ebd49f46afd5b3084230d3bf2058850
SHA19b5533e8e385964c6415fd062f6185d4481e30b3
SHA25631f10f7dbd583c5b8c2df0cc10944dec2eaff0e0dfe21a96d198ad2dc446bde7
SHA512b335b7167a126eb7c6a4c145dbbe77075f130c1fa710e87d67731713632178973c3038a941349ab36e699ee22e2eed80170af4a1b1a5f3b358670fb768d29cd6
-
Filesize
30KB
MD54829f9d2f6b1dd8440b616984c409da9
SHA1035bcd9adec5eb744b0f38e34cf9f53a2892d71f
SHA256c8868a0635caf43e21d2d14c2a81039a5fc38d901adacc1b94a2d520537dd0d2
SHA5126b74daaaa90e2d3bbf27015b9747ec61a6e778278d055c4cdc95ae33eb34311a6071becdcd33d17270a7da8d1ee00806c902b12077c2d01cc79660c11aa4b245
-
Filesize
28KB
MD50d47d81663205d6846a9e6eeaa89d4df
SHA112fe024f51438239d0931daaa5bd8c27b1a56f01
SHA256a42322c4ab67989f27689895a24df0438cbc3ffb5b26ae1a832b30efdac6c5a8
SHA51221822e52b64aa32b2a1a86d9301bda8f2e9eed6ad2ff7e3c15e64f9791691fa02570c265135f77a87e5921f9e01ffff5d276635edaba212da27c0da2aea69da9
-
Filesize
28KB
MD53425e71f55cdc6051835beed4199745d
SHA199da19acda63467fc02498f87536986552340203
SHA256b1913cd16df93c185d087e37c01c9540655ccaec2c18ad06d79e474d6337f155
SHA5129367746a709f5624ecc41680b223159899d8c45703cbb90feac156e53394cf9bf56b965f12a87246386039f497b9ca4558622ad1fce8a42c72fb039f4a7c7f6d
-
Filesize
28KB
MD5c3ff030387d71c2035ee1ffd11783547
SHA178696063b1abcf28dad9416c97071e36697b1d60
SHA256af71a2b3acabf64e9513b85285ce0b10dfc2667b1df5a1b37a75b4fa4c9f940e
SHA512d924aa70fef83ae3be9a64b949f38d531b045f9b2f6c11516dd31761128f5ba145a0b74dedcd724298d4a0d469de8afacd41ac53cc6cd87571a569b1e8beae5e
-
Filesize
30KB
MD5f9c7a6c69d713670ac1e0e8f8d8064af
SHA1e560a37eace5b2fa8083ab42e37198c5697455bb
SHA256c5566148acf21deea8cc1bcca82946b00595fbf28ecb061a7a67c317acf85cde
SHA512a099d2738c7c03a194eb0f9bb7fac9732a8b678ea839f483ab7df93c8b36eafa0b5b50f05cf87feaf311ed3416b0c700d3d66d8f42bb4b61e4e7e51f2acd06f3
-
Filesize
30KB
MD5a37e2a4336f19e70670dc82953be6827
SHA1ab762209f11c5d44b741248526cb28f0d9919591
SHA256af0d99b12ad9a0c20e5057453c355c0a76d1cbff361cac11a060b1c0bd78c317
SHA5123bad1f05ed880b16e6972cb780b4b069bc5738b500f368fb46d565ee268b71c0f868bb69b17b1db811479c4ac7f3a07fa65be73c4372fa879029110b26d36b01
-
Filesize
27KB
MD5eadaf5bb7b175d757baf7ca015ac488e
SHA14a45f50d3833df9ee56bfbce60d6bbb3dea8ada7
SHA256ace499d750e6d2b7c8b88a4293d15337b3c4ca9b964df2b616cf7e0dcbf36f5a
SHA51214481a34811cd684a61e2fac6c882079922ec21bdd73989dd97a9ee8d302f235a600305e8f4e5521e40ac6712c2e73fc4eb29be10c0b226c91fcddf7b51cfe98
-
Filesize
27KB
MD5e8d05cc055f3bac201d94cfcfdf5bd0a
SHA17d0cc4e99dbfa0fdb1e562e145e10a0713d13adc
SHA256bd95ee3a9f10e36e027d2f642f39549ca3447f3049c8a95fa9b30aee4a9deacb
SHA512039b111cb02bfe0185403cbdde7dad38c7dc02b8d61fe65f76b21fffac94cc9b8c18310021f4e3c6449bc57faaef7bea8c980dbcd7084979e9b2ff3137a6d143
-
Filesize
29KB
MD51a7af59a8ad7bb644405f77b626e310e
SHA193b43a684ca88ad9f807b9940990a65bcc3b35d4
SHA256e8239f31b8d768f3eac28444b52bbf2bf6bfdfb386f356ab88df587a6348bf5e
SHA5129ff94b4707ca6dd80c89975a2c97db3592eb9cbb7921ae6adb4ddfbaaffe09261cc0516674c68ad428d3b7b13b979f8b01b4c6eecaa1481bb6ba6924fdc274a5
-
Filesize
28KB
MD518b6c5194cd2505fa3193b31c6c5e8a3
SHA11510bca0291ad6e682cf32c4540b3a66cb795e7d
SHA256fb32aebe44092217a6d112243c8ddec79d2d3aa9c283f25f9204f0ef76d647b8
SHA512b840d6cb8e47efe33510f58f51036be978e7a4339a0e5b91df1ec17494f809950e0f0f1b80b590fdaa2e8687f55ae337a0b0cb404ddb4df96a2ac8eae5e64e86
-
Filesize
28KB
MD5742d8f6ee54ccc9912e82b45034a290c
SHA11baec0e1450b4c00e5e4cabde53b560962942084
SHA256a7528be9560876cecb65b5fc561de818bf9255efa439c62b3db852c1a7aeb3df
SHA512f27fd6ea859bfa0aee971e1c8cb52dec58e5c78411642292166f7cbc84fe8ed77006d37699cf03c87394747dfea988b470f72920bc74a9593387d4740e9f1411
-
Filesize
28KB
MD535c5fbcc9f4b44609ad66bab8efd351c
SHA180c5315837deebcaca4bf2a67678b2943d7f7c56
SHA256b79d422d0cab1e5c24f09cec0dbda5954367e8158a2211e0535a0df822dc7f0d
SHA5120ec8e06622efa48d28da1a142db2af5c7075f92c8576a03023be5ab874b53e5022fa2f7d04f5f34ffc7f0a8e633a4f255a1285f6200c75e30a53ee6dbb2852bc
-
Filesize
27KB
MD5d4e4bbe139b9abf65e43a45a12ef0c11
SHA162dc16792f5fad24c9ea54758df1d9756faad0f3
SHA25684da26b420547eb828eaa8bfac57a9ade2a9c5bb827f3aae81db5ff4a1d20e9b
SHA512d9d3d185b2b531a3d981a3b5aa1df87588c335a736b7c720797d87b6876e39fc4c39e6e3f7ebc132960ace3e8b94e67a73f6cae04395494e958a0bce2133d458
-
Filesize
28KB
MD5528e5396b078d0a05962295d48629bbd
SHA122604fac1d9f1938a3104a9bab248b61d023dc26
SHA2564fe489f3ba58f608901117191b516b2f1f7ed5e144a72dc76a2ea4b99dc0f899
SHA512fda90b7255e071dfc0bc403faa72616870c19cf49454240cd5859e03ae0430a732a19451b095c5837589433de3927bcb7d79bd45645f4717c276eb9d217bbefa
-
Filesize
29KB
MD53849c32a7e24439972dc3b6b53fbd270
SHA138258d9aa8d9b7427181f50eeeed7345ed0e8b7b
SHA2568b3c4809ae4676ab7c6c5c5ab2107ed04d464fa9beeb10379915e5c6349540d6
SHA51249c513373390a9c421e996983a9bb73c841899299f4bb4515c7540b1bca2fd83da2cbe6cc787f6ed23e5d533aff03b54a04c44f6d22c6ac9085a94f6c9637378
-
Filesize
30KB
MD57ca8b6931bf364c298e205876f6c4790
SHA1994a675f1f72cacda38b8c5f66eef89e17708c7b
SHA25664f65b536a28267a9a60e14ea35c86726b81db0854b7043f478332d3393781d9
SHA512f55282a3fde07e8949e3fe095eb87c84840b410db3bf4430883685f2c48df3892de01843fa5070839b7e490f3e77a0cd7483666101c36e237f1428338ab9414e
-
Filesize
30KB
MD54b4729724bd113a8db246786513ce46d
SHA1476549b2f3e8abf85c18affd62344452dd50067c
SHA2563e4552ac2a546fd7e7017db43b2e5e753da9d8c3228e3881f6b9231dda85d8ee
SHA5126d4ecb0670b0282e552b793efa0306787a21da3794f9f1d2b72865265e1539693305377d85edb56e469aca44cd5550386386ae08612c8d7b94d39315192337fe
-
Filesize
28KB
MD5e2fdb53c6f65640b502778ee388a559d
SHA1a36ca1c03afe3b37bb494d980bd27dc1c599d0af
SHA25625a19560ade9e611255539ae3205c93bdcbe51e113b8c13ddd8cadfd0faf12de
SHA512a93be51d5b184b3ab4a78715bfa19549cfe8342e85866454d729d715ed0a8fa0b97e7ed72a68585a15c5245d4a468968b2a3325eeb121e7eb8f854866359bb23
-
Filesize
30KB
MD5f9506e84e4ec576bfc75fd10833f1c9e
SHA14c2ad674cabdb1b1cfa7266640ad2cde78005b31
SHA2565f13a77b07a2d377a00c562a597541257cc32c3962fc635665130147ec572c62
SHA512f716cc6216d313570ddd07fa5b068d331da64a8321885c6017749e0e119fa31b096b2106f2d3551f88d8271346a362e6b601e21c6d562f887047d94354f7f2fa
-
Filesize
28KB
MD57083fc568e6de8a8a2e167d050a6fbd5
SHA19875bf4725e81c7814f612534edf26aaba2e1817
SHA25634491d9535e96801e0acaef234f8a6eb7f300a7be7ec9a9c6f894e0189001cfe
SHA51283e028ae13d844b4f5d622bdfac19b059e705f3930a2f4b51536b85b151268bda8299f7e1f49429079d2be05b9d64ae40a89211c2760ed9515e72d31e353f18b
-
Filesize
28KB
MD5420f8e07623e3d066e6cac05c5549764
SHA1244e6ba39a4b2234edccb871c5c996e78948bc5f
SHA256cf547ccf34de9d510564f5cf2ce6975992016bad2543856da9526497c44d432b
SHA5128914817159d52659089de3e3454997eca591b72795d7a63f2edbdf2f72c6409853a7320b7d7e95df171394522ebd8727f23a5670b54427c38359a11c5bcc5b07
-
Filesize
28KB
MD5786fcb2f1d42f797b4fbb48996a2dc65
SHA143b073caed92275f81f3226c180385efd9249bb8
SHA256ffe90d060d1fe1c208be49cf208b0ffcad101964f1e022e2afc873fd15cd4ae9
SHA5128539e4ecffc64ce0d6fa44c4cacfb9457ed3a20b5174be4b1978fff6b7457e45a1b36cdf582c3e39a9181aa32037638d2011c4888ea91dbded59b52da4f03e2a
-
Filesize
29KB
MD5559ce98f3f7c19150d9b2b8eca1d8fdc
SHA11abf4b27d56b6755c5fa2e114f57ecbc35a264be
SHA256de8e29726663c94194bc63379891ef1fd52ae37da09dc5e3415fe3a3513ed669
SHA512c1312a35d496c4993f0a4e33f7d7a012ab6368ec2d00f86f05bbe28d5abf70092ecf96f41b8806bb0e793d8c55a4bf6a4c82c79320ee5685cfceb46ed31188a3
-
Filesize
29KB
MD5d540f4b97c793349c3a388b1bdc94bf8
SHA192cede16e098f3ee00e03241d4e098e83d6dd961
SHA256852964ea502b119e616cfa6e1739b2c308d2311c38f33f5761b4eb6d0dec9547
SHA512ee075614ac47b41232cbb694462a50bad653c0371effcf3d19977da85b696e7f2615cbefff4c949710e11c4e43db8def2a7d03bed5fb81446546e9ba0407323d
-
Filesize
27KB
MD5f2d14a220b1c5dfb0d2976eaadeac123
SHA19c45e3ac8d22d3f3b8bfcf73cc1d2ff92d13e806
SHA25691e8678616b6bc11a1bbb3b3b8906f4b69a707af88e4d97170295beb3e211790
SHA5126d5e9834f7e3e04fada045a848fb20c7afde2d8ae6c7ae2a48bb1c1db6a79e4f0cc6dab9a7fd7dc7880fc5e13210051222dafa53cfd5e5f9dfcc498197836c20
-
Filesize
28KB
MD577bbbdf2a7f69b230bc8cd4bb7f6ea20
SHA17ac98ece6e4c1d8f258e9737f9607276bb1136eb
SHA256a2ae1838e35a87b8ca604766c0166b84c7633845f2b45c936b3b0d1f6168acb9
SHA5120588efd3923f8443b99d2747121b4228edbcf4b6b5167b2d470702ecf7bf903ab01e001847cc706ffaab21086c51a59ced1d3bf7008a3fd15e1c1eeb49b715fc
-
Filesize
30KB
MD5ca2af40e8a967cab969659bd4bddc867
SHA18149bb92561fc3458f2c0fc7021fed50acc97efc
SHA2569138cc8e546198ce161dc1e78f7d28312636532d9117043c0daad580c0b69c9d
SHA512cb555265ec53d255e55c090b63bb7ab8504f2f71f0bccd7ccb42d5b8f24e4701e38b847785eaaeccc342ffa9c5aa9c7a13575b6b2ea9995a9335207f8720e103
-
Filesize
25KB
MD55da8a2bcc699f6d4abb1176d598df062
SHA1277368b217dbd9e3b76cf43e3783a99a5bc8933a
SHA2562a1c13cf54b574659a0459810b4ae97dc1e491c17f0b77c6de73fa47ce9995bd
SHA512b00ad2d15338f356e909dbd417f931bba5c3386382d682c341be91da14e7406d9f0b03063341f191f1ad00c167cac8e9409e2eed4dfdfe41e7aedef7f6a583d3
-
Filesize
24KB
MD56f787917be1b34c49961d8ae3c6e353f
SHA1657640c2c5365d9a2b768d71364a62c22783f012
SHA2568e991a90787569b3473d4c20e8dfda8afb62a346a6046b554b3a1b4fd8c292b8
SHA51219568d8092d617903d77629aa52ab0de1d33e3aeafa74e4c3e777811ec775d0df87074f59cc841abdf5927463e3b1f125dbcda2fd28c4292b5c36aff85c5a56f
-
Filesize
29KB
MD5c3df8d9b2d4cf15238672e327a79a36f
SHA1854a2bfd664c5ede2879b61db2ea9d7282da9481
SHA256e18f1628e80b8339b3e67fae68ad3505fdfed0fdbd52290f349c4c003eded39d
SHA5126a92f5ffcaa8142a2e5e6a143bcea8a41793644422033e391d9dfd9f823874a4812577bfc029c916b824c46ba381edada8ba208c7c128d5157f4830466aa31ae
-
Filesize
28KB
MD542ef71ad4298f3be9e1f0d3259014023
SHA1fedc8b64a2c7922631f33a3d693ccc06d7396409
SHA256835788c93c43e60c1c2ffe6ed65a7e6c2f4d07ede0276d00e8e0a24120cc8801
SHA512dbc855a67da485dd8e6d66a6cad607dd8c3f72103a4d7fe18d0e8fe0360ddf1639f08d8ed274fc26aee3fa462d90617ab16fd7c9f4b5e310275e740ed1c3510e
-
Filesize
27KB
MD5a4e4356dee5a8ab30f2b0e2691fcbaa2
SHA171e41d6d994cc2472a8727b6994b533c58567452
SHA25608cea072fa6424b340ef8e9042409b60b286ef0aeedbcad91b42745e1cf80e68
SHA51214974c1677e0d7e1125a1ddc29d5fa60df7f8d5e0290d81ba51e27431998ecb0e294be34ed8d6afacaf0021b4e59704c7008bd9863707b58a044062544d859ab
-
Filesize
29KB
MD59367c7b9191edee32cc8fb9949b66b13
SHA1bdb04b87de3ebba1f88debb1ddeaaf6505eda984
SHA25644780dfc2c08b6fe1911356e901ebf68f126e846c430c9d915d1f8f81b59c6c8
SHA51232ead64a8735d72a71005034700963a56d9d7acaaecad3838543cfaddf792486813858683ee004050473cce534b99f07a2c35705af15d3269c3424dfbb304571
-
Filesize
23KB
MD55b2cc862f5a3439d481451b3fb6faac5
SHA148eff8ea0f259fdb1d392bfe0347941896470562
SHA256d80dc235ef1558f3560d102d7fe66504b4c87ff5c757926e6b9f8ecf0413f509
SHA5121d16d84019f7d1859f2d7e352ed5080ff559041313fd8043fbd95dc18cfb9a59cacafaf88c66f471327427f97cecc7f22972ef4b9f4dbf57ce1d99c99f9cca0f
-
Filesize
28KB
MD5bdead45c46947785dca933563cdfee60
SHA116720f3d784cc6be03988a6d1b76f72992f93ba7
SHA2564098382bead86758fddc9a6e4cfac86350ebbbc6dcabaacc2eac79e9e78cc0de
SHA5126d600b559b95435ec318a906cd8b81bbd5bbdde9faea65ef73785872204ea1d7afc3447cf80fca21ef6ebf15d0a7eb32503fe455e6f27cbbf2dd03310961655b
-
Filesize
30KB
MD55ecb78b21e15323019eaf2257929d8ab
SHA1bdf4186d977cb5b7dea4cdabfd6211ac7387dc17
SHA2561de639e0e9ed005fbfc84a9818b36d9e98d467f7bb9920ba84f7b2f832723881
SHA512d3beb402a94c6c3770b420ee27bebc969924e6385210dd4ba4ab5e23e4da0f8ca463068612bc13f2e2bace09431aa93f36d05f9f9b27a7e6aad2b26955adb168
-
Filesize
27KB
MD5cc1d0b8cff87a7c9edbd48a78b2f4895
SHA17716d9ea696bf26da10a383383d1504d77c956ba
SHA25699a7f5804d320333149f8cf2ae9bd17e3a09cb4e1dc6f81a1fd6de5974b022b6
SHA512efee51839410f418a5937dbf7d84468651510794394e6bde454d37ea3627b86ec9614a9bb0f585cce0b5fa249251ee06693443497c0dcd87a203231ce6fa2682
-
Filesize
27KB
MD58e36ba5b9ffc5bac31589b6fbe1cdf84
SHA1921df491dac23b9ad62acc73454f09e591beb210
SHA2563f4b509349bf0504e4a124243a3ab552318fe162d38578573689fc04a01eaad4
SHA51263a8e82be2547dc9270dcb61b47b7fdc698de9a414b4a3c02c8c2298c1e11370f0035dbedfdd307c073302239132a8aaf878dd6f855076902064ac926c3d8e59
-
Filesize
28KB
MD5c331849b99482598fed3fde474304862
SHA146a2a227beb91804877b4fd92a732fb8a1a0d4de
SHA256dd8e4f957b46f9b3263658a2b566c7fc382a0f24f224caf6e69bdc2dfc242e74
SHA5127816cc72e1ab31531600ee05574627c68fd34ef7703e04062ab8f6f89f74f8bb6eaac8f25723b757fc56a6e5b090cae3357cbe603924aae72dd6966afdd2d534
-
Filesize
28KB
MD58ef343fdf3b0038c31b01e2318d27cfa
SHA1b5545115c7de5da05e5673c1efd748d3e1fd8da8
SHA25673f1a24bff2f9840250e81bc47f3b57cda6b77026dcc8c6691de1378d17e0849
SHA512e9fc41cafd53e28a62ddc37e7fba7df2d2c0c38a5c9906c16debd0096e47ff08821214f96c18d61c6009943e9aa1fd8d32461db6b7f98d0bc88d2bd8bc7138cc
-
Filesize
29KB
MD5409484fc70b72f4529f3d35ff7d8481d
SHA1e10b496c7e3df665bc0eb60b5ed7b086ba9ff885
SHA2566f1a1d74d525ddbf01bfafa9a053ed05b52f08e9823b58fa92d5bf55c481760f
SHA5123b7b6ea96115275bb709f98399e8964ee429dded55ea567db38b0e7db4efa3e4c18d946921861112a45b71ae2ba389cc50c9006265c8b00018e3476324c91fef
-
Filesize
30KB
MD523537b5898952262ea48c771deca85ec
SHA13c7dbc6b6277a8e454a9354d2a13c1d9792930b2
SHA256bf19c65fc980858028b8b7b76cd0c424b7db5ecc29f1e2dfa4da7ed17520d117
SHA512ca9f4a91306eb7119a8c19bdbbf3076b38b16ff6c74d10aa79f577d7beda35c9b13b4a6867fcef57fae6487ba3b3fbf402fe93674bb417ff355d7caf51aa5224
-
Filesize
28KB
MD53d831444fa226ae457ad81ebb49d4b00
SHA106f77e92bab271b3902edfaba715c83496510a41
SHA2562d00938fe16785c1a29f2feab4f6b95ea1cb3f6e00f17737b277a13ddf9114b3
SHA5126341d48b7588f030a2d80fcd4e4b4a6debcd42c730e2ffa24aee5b2e167d41e08a43a81f108c76416f5875810acfb746f2f14c3f993a1f543208c44b2ca60b21
-
Filesize
115KB
MD51dcb608a951a2ef97e4c951684d8b4f1
SHA15f3db8994ea1590fe9e81ab77389963253139c90
SHA2564eb21c7fdb5f5d3db9be05d66d9bbae043b612cda7d8e3c0c7e34f6f13934d12
SHA512085daed95855669018dcffbcfb56ca285b54527e5acd2542a8e5c4a51d11abfb61176620813a49e19063308a38667a3dec8c545b0db41e2ff4cf3d5df75a534d
-
Filesize
280B
MD5c29f00baebaa85d0c7228e7abd112373
SHA1ab44a6111cc7001512bfe26e01f7b84127fc2b2a
SHA256cba4c0e142fad5d0c2ad0fe8215135be1db9f528db406f3f44c0b9fe7adb492e
SHA512237e1bac7ed0e868fbd5f77e799a150a637bb2b2d73944de6f2378e3fcecd6b84538644465718952a8574a4a6cea8bd7474130189b7c8d0f2268cb0064fed3b4
-
Filesize
280B
MD5186bdacb7e06206eb90e0404374243ab
SHA1ba8073623c2b711aba2b1b87a0fb7f742023d7f9
SHA2562495b9a783d4447403970c73878f64a11ab2b9223fc4babb57b4aac1edf4f638
SHA512b07b960e6a28d47f14e80db9855c8cdec2cfea3db7e883241cef27b62b0e3847cfc6972e92986641e32d1f5b1c258e7dcbdc3c732f78e9456302ac67c9e0db77
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
48B
MD5fe20fc5977670015b097a3d4e8837b80
SHA17c8d03edfe63778fabf322b2a6dc8a13ec549569
SHA25602d6c493873f868411823424cc32731574e31f702e91da2d7c0dc5fb6d78c776
SHA512bf04920d8ef7b9b52fbb3357cb1d922dfa3b83b157e0a8ebad01f2f1e9ec33b7289719d065a2b9a53f001322d7e829623c5aa2d7010785ce95a99c1028ad50ee
-
Filesize
96B
MD5589e4e36a499e0c2349dc21ab6344b18
SHA1c474742c4dd157292f6aac0df6179beda3c26ac6
SHA256ad1f70091d8fa443086042da9b0a514b90d43fb7c98dc6fcc622ee21cb127dd8
SHA51226745fe6b3f2bac63385a4fe582b57ab69a36233ba7e565ab848dc0fa32f9f352b5bf1fd669389061b724a8e21c7477ba0848dfbed20b703c81dcef7867b77a2
-
C:\Users\Admin\AppData\Local\Roshade\EBWebView\Default\Network\1c3b03dc-66a9-4f3e-b580-d29ccd36d68d.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5538c42c58a627e0a5babe5d2f24a0897
SHA11a43bb0ec34eb99343a5414a39e1b34eea92d2a4
SHA25632f4e56a269efd88367118e6f7d53ee90e41c5e7bba217a29d4cfc797cd38d5b
SHA512a62979a3d4faa38702dc4f6259ec73cf1fdbe0b162be6959161a4d4f7720d3807e8efb5d314b17a3fe8ef7f49a504926b0c8bcc467a3f5ae2c73cf4c81e8e177
-
Filesize
15KB
MD5c1d2d5a95bcee1df082f5dc4d557f173
SHA1a03175001a6d35477fd1c208ba883af61bf270ae
SHA256048126501a7b49f813d5d0a04c064c230808f9f37ebef1cd9b4e4b12aad4263b
SHA5126796cad897c07d597136b8de21c28a9e3381ad0754c034617422725413380699d04ebae3d69168f4cff3b9edd8f96d6d2f0fab707d5c5604ae895a1c7d4280d4
-
Filesize
929B
MD573a5d67f9ce3b69474b573c26f0e4461
SHA13c492d50713401fef8bfecfda065a59b151aa315
SHA256c5831c15df9825624f9adcaec6257965558c63fc0a0732209dad51a0d1196ff9
SHA5127ef7a0e20a916ca37c159973085e1ae8887d7f031338807a0a18ea843df363e7b28e7b5f3984c998eb8ce972d25f13428b66a6874d3008c5906b03f3c83ebe0a
-
Filesize
1.5MB
MD5a743586a8a03b7ee728c772af030c19d
SHA1407f997430a635dda6ee92086b41acbf96144be9
SHA256d358fe2f4a382fee70198a7a2c5afa4fa98dc5b96296ab0e68d8a5854b0117f6
SHA51282d2408214ae7fb5dc037d741a0e8083c968b8d8cb5b1e04b397ad710bf33cb4fad98895ab6914a6d88a1f65dd4ebd7f06d21b08e62af634809a2e57ef81de77
-
Filesize
1.5MB
MD5a743586a8a03b7ee728c772af030c19d
SHA1407f997430a635dda6ee92086b41acbf96144be9
SHA256d358fe2f4a382fee70198a7a2c5afa4fa98dc5b96296ab0e68d8a5854b0117f6
SHA51282d2408214ae7fb5dc037d741a0e8083c968b8d8cb5b1e04b397ad710bf33cb4fad98895ab6914a6d88a1f65dd4ebd7f06d21b08e62af634809a2e57ef81de77