Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
EZFN_Launcher_1.0.6_x64_en-US.msi
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
EZFN_Launcher_1.0.6_x64_en-US.msi
Resource
win10v2004-20231215-en
General
-
Target
EZFN_Launcher_1.0.6_x64_en-US.msi
-
Size
10.4MB
-
MD5
153ef3729227cdb158363a16c5da9d0f
-
SHA1
1acd6282d1c3fb6df914c3062a0f3d6f3853d7c3
-
SHA256
f1b09b47e725f385e9942817ce06aac48bace898655ad15e2133239f3555c3c5
-
SHA512
3499a15e3cda1685fe719ab7f959feb4c0b21ab0b16e74f4354b0659514b912f935a41441bcfdd72131b7ddfee26118ad1c19c6a76bbf25fc50601a8618fbb95
-
SSDEEP
196608:0Xtzwv7YnFtgTuiZmaaONJZqVjvSU1Q0/9TGdP5FgsOBZAOTV:0XtMv7YvgTRaOhqhvSykdP5FgsoZAO
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 51 3400 powershell.exe 53 3400 powershell.exe -
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 8 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\msedgeupdateres_is.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\fr-CA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\mr.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\d3dcompiler_47.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\ffmpeg.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\tr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\Locales\sr-Latn-RS.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\onnxruntime.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\vk_swiftshader_icd.json setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\MicrosoftEdgeUpdateCore.exe MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\121.0.2277.128\MicrosoftEdge_X64_121.0.2277.128.exe MicrosoftEdgeUpdate.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\identity_proxy\win11\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\fr.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\prefs_enclave_x64.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\mspdf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\VisualElements\SmallLogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\pt-PT.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\Locales\cs.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\identity_proxy\stable.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\sk.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Trust Protection Lists\Mu\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\pa.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\Trust Protection Lists\Sigma\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\edge_feedback\mf_trace.wprp setup.exe File created C:\Program Files\EZFN Launcher\_up_\public\season_images\Season7.webp msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\msedgeupdateres_fa.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\msedgeupdateres_hu.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\Locales\bg.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\Locales\en-GB.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\EBWebView\x64\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\cy.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\kn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\identity_proxy\canary.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\Locales\ka.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\msedgeupdateres_nl.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\es-419.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\ms.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\ar.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\msedgeupdateres_lb.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\hu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\ru.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\mojo_core.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Locales\az.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\MicrosoftEdgeComRegisterShellARM64.exe MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\msedgeupdateres_fi.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\msedgeupdateres_ru.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\identity_proxy\win10\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Trust Protection Lists\Mu\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\dxil.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\121.0.2277.128\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\Locales\ja.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\Locales\ur.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CC48D8CF-F33E-4019-AAD8-6C92097ED136}\EDGEMITMP_D7B54.tmp\setup.exe MicrosoftEdge_X64_121.0.2277.128.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\121.0.2277.128\delegatedWebFeatures.sccd setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\MicrosoftEdgeUpdateOnDemand.exe MicrosoftEdgeWebview2Setup.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\{BB810243-77BA-4FA3-BD35-C1FA04A2F94A}\ProductIcon msiexec.exe File opened for modification C:\Windows\Installer\{BB810243-77BA-4FA3-BD35-C1FA04A2F94A}\ProductIcon msiexec.exe File created C:\Windows\Installer\e581642.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI1807.tmp msiexec.exe File opened for modification C:\Windows\Installer\e581642.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{BB810243-77BA-4FA3-BD35-C1FA04A2F94A} msiexec.exe File created C:\Windows\Installer\e581644.msi msiexec.exe -
Executes dropped EXE 14 IoCs
pid Process 4840 MicrosoftEdgeWebview2Setup.exe 1468 MicrosoftEdgeUpdate.exe 228 MicrosoftEdgeUpdate.exe 4024 MicrosoftEdgeUpdate.exe 4440 MicrosoftEdgeUpdateComRegisterShell64.exe 1156 MicrosoftEdgeUpdateComRegisterShell64.exe 4876 MicrosoftEdgeUpdateComRegisterShell64.exe 3360 MicrosoftEdgeUpdate.exe 1428 MicrosoftEdgeUpdate.exe 3128 MicrosoftEdgeUpdate.exe 4252 MicrosoftEdgeUpdate.exe 2328 MicrosoftEdge_X64_121.0.2277.128.exe 4112 setup.exe 628 setup.exe -
Loads dropped DLL 16 IoCs
pid Process 916 MsiExec.exe 1468 MicrosoftEdgeUpdate.exe 228 MicrosoftEdgeUpdate.exe 4024 MicrosoftEdgeUpdate.exe 4440 MicrosoftEdgeUpdateComRegisterShell64.exe 4024 MicrosoftEdgeUpdate.exe 1156 MicrosoftEdgeUpdateComRegisterShell64.exe 4024 MicrosoftEdgeUpdate.exe 4876 MicrosoftEdgeUpdateComRegisterShell64.exe 4024 MicrosoftEdgeUpdate.exe 3360 MicrosoftEdgeUpdate.exe 1428 MicrosoftEdgeUpdate.exe 3128 MicrosoftEdgeUpdate.exe 3128 MicrosoftEdgeUpdate.exe 1428 MicrosoftEdgeUpdate.exe 4252 MicrosoftEdgeUpdate.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ProxyStubClsid32\ = "{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BA747D4-0E17-4C7B-A5DD-6B81BB4A26D1}\InprocHandler32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\148EDAE345EAC3E54B1170CBD502D298\342018BBAB773AF4DB531CAF402A9FA4 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8BA747D4-0E17-4C7B-A5DD-6B81BB4A26D1}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass.1\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.Update3COMClassService" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ = "ServiceModule" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BA747D4-0E17-4C7B-A5DD-6B81BB4A26D1} MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8BA747D4-0E17-4C7B-A5DD-6B81BB4A26D1} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ = "ICoCreateAsync" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\Elevation MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ = "IAppCommandWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8BA747D4-0E17-4C7B-A5DD-6B81BB4A26D1}\InprocHandler32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.181.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ = "IGoogleUpdateCore" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8BA747D4-0E17-4C7B-A5DD-6B81BB4A26D1} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32\ = "{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{2B473453-BCFD-454A-AB98-B0DE7FDF2A6E}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\ProgID MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4644 msiexec.exe 4644 msiexec.exe 3400 powershell.exe 3400 powershell.exe 3400 powershell.exe 1468 MicrosoftEdgeUpdate.exe 1468 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2976 msiexec.exe Token: SeIncreaseQuotaPrivilege 2976 msiexec.exe Token: SeSecurityPrivilege 4644 msiexec.exe Token: SeCreateTokenPrivilege 2976 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2976 msiexec.exe Token: SeLockMemoryPrivilege 2976 msiexec.exe Token: SeIncreaseQuotaPrivilege 2976 msiexec.exe Token: SeMachineAccountPrivilege 2976 msiexec.exe Token: SeTcbPrivilege 2976 msiexec.exe Token: SeSecurityPrivilege 2976 msiexec.exe Token: SeTakeOwnershipPrivilege 2976 msiexec.exe Token: SeLoadDriverPrivilege 2976 msiexec.exe Token: SeSystemProfilePrivilege 2976 msiexec.exe Token: SeSystemtimePrivilege 2976 msiexec.exe Token: SeProfSingleProcessPrivilege 2976 msiexec.exe Token: SeIncBasePriorityPrivilege 2976 msiexec.exe Token: SeCreatePagefilePrivilege 2976 msiexec.exe Token: SeCreatePermanentPrivilege 2976 msiexec.exe Token: SeBackupPrivilege 2976 msiexec.exe Token: SeRestorePrivilege 2976 msiexec.exe Token: SeShutdownPrivilege 2976 msiexec.exe Token: SeDebugPrivilege 2976 msiexec.exe Token: SeAuditPrivilege 2976 msiexec.exe Token: SeSystemEnvironmentPrivilege 2976 msiexec.exe Token: SeChangeNotifyPrivilege 2976 msiexec.exe Token: SeRemoteShutdownPrivilege 2976 msiexec.exe Token: SeUndockPrivilege 2976 msiexec.exe Token: SeSyncAgentPrivilege 2976 msiexec.exe Token: SeEnableDelegationPrivilege 2976 msiexec.exe Token: SeManageVolumePrivilege 2976 msiexec.exe Token: SeImpersonatePrivilege 2976 msiexec.exe Token: SeCreateGlobalPrivilege 2976 msiexec.exe Token: SeCreateTokenPrivilege 2976 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2976 msiexec.exe Token: SeLockMemoryPrivilege 2976 msiexec.exe Token: SeIncreaseQuotaPrivilege 2976 msiexec.exe Token: SeMachineAccountPrivilege 2976 msiexec.exe Token: SeTcbPrivilege 2976 msiexec.exe Token: SeSecurityPrivilege 2976 msiexec.exe Token: SeTakeOwnershipPrivilege 2976 msiexec.exe Token: SeLoadDriverPrivilege 2976 msiexec.exe Token: SeSystemProfilePrivilege 2976 msiexec.exe Token: SeSystemtimePrivilege 2976 msiexec.exe Token: SeProfSingleProcessPrivilege 2976 msiexec.exe Token: SeIncBasePriorityPrivilege 2976 msiexec.exe Token: SeCreatePagefilePrivilege 2976 msiexec.exe Token: SeCreatePermanentPrivilege 2976 msiexec.exe Token: SeBackupPrivilege 2976 msiexec.exe Token: SeRestorePrivilege 2976 msiexec.exe Token: SeShutdownPrivilege 2976 msiexec.exe Token: SeDebugPrivilege 2976 msiexec.exe Token: SeAuditPrivilege 2976 msiexec.exe Token: SeSystemEnvironmentPrivilege 2976 msiexec.exe Token: SeChangeNotifyPrivilege 2976 msiexec.exe Token: SeRemoteShutdownPrivilege 2976 msiexec.exe Token: SeUndockPrivilege 2976 msiexec.exe Token: SeSyncAgentPrivilege 2976 msiexec.exe Token: SeEnableDelegationPrivilege 2976 msiexec.exe Token: SeManageVolumePrivilege 2976 msiexec.exe Token: SeImpersonatePrivilege 2976 msiexec.exe Token: SeCreateGlobalPrivilege 2976 msiexec.exe Token: SeCreateTokenPrivilege 2976 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2976 msiexec.exe Token: SeLockMemoryPrivilege 2976 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 msiexec.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4644 wrote to memory of 916 4644 msiexec.exe 88 PID 4644 wrote to memory of 916 4644 msiexec.exe 88 PID 4644 wrote to memory of 916 4644 msiexec.exe 88 PID 4644 wrote to memory of 3696 4644 msiexec.exe 99 PID 4644 wrote to memory of 3696 4644 msiexec.exe 99 PID 4644 wrote to memory of 3400 4644 msiexec.exe 101 PID 4644 wrote to memory of 3400 4644 msiexec.exe 101 PID 3400 wrote to memory of 4840 3400 powershell.exe 104 PID 3400 wrote to memory of 4840 3400 powershell.exe 104 PID 3400 wrote to memory of 4840 3400 powershell.exe 104 PID 4840 wrote to memory of 1468 4840 MicrosoftEdgeWebview2Setup.exe 105 PID 4840 wrote to memory of 1468 4840 MicrosoftEdgeWebview2Setup.exe 105 PID 4840 wrote to memory of 1468 4840 MicrosoftEdgeWebview2Setup.exe 105 PID 1468 wrote to memory of 228 1468 MicrosoftEdgeUpdate.exe 106 PID 1468 wrote to memory of 228 1468 MicrosoftEdgeUpdate.exe 106 PID 1468 wrote to memory of 228 1468 MicrosoftEdgeUpdate.exe 106 PID 1468 wrote to memory of 4024 1468 MicrosoftEdgeUpdate.exe 107 PID 1468 wrote to memory of 4024 1468 MicrosoftEdgeUpdate.exe 107 PID 1468 wrote to memory of 4024 1468 MicrosoftEdgeUpdate.exe 107 PID 4024 wrote to memory of 4440 4024 MicrosoftEdgeUpdate.exe 108 PID 4024 wrote to memory of 4440 4024 MicrosoftEdgeUpdate.exe 108 PID 4024 wrote to memory of 1156 4024 MicrosoftEdgeUpdate.exe 109 PID 4024 wrote to memory of 1156 4024 MicrosoftEdgeUpdate.exe 109 PID 4024 wrote to memory of 4876 4024 MicrosoftEdgeUpdate.exe 110 PID 4024 wrote to memory of 4876 4024 MicrosoftEdgeUpdate.exe 110 PID 1468 wrote to memory of 3360 1468 MicrosoftEdgeUpdate.exe 111 PID 1468 wrote to memory of 3360 1468 MicrosoftEdgeUpdate.exe 111 PID 1468 wrote to memory of 3360 1468 MicrosoftEdgeUpdate.exe 111 PID 1468 wrote to memory of 1428 1468 MicrosoftEdgeUpdate.exe 112 PID 1468 wrote to memory of 1428 1468 MicrosoftEdgeUpdate.exe 112 PID 1468 wrote to memory of 1428 1468 MicrosoftEdgeUpdate.exe 112 PID 3128 wrote to memory of 4252 3128 MicrosoftEdgeUpdate.exe 114 PID 3128 wrote to memory of 4252 3128 MicrosoftEdgeUpdate.exe 114 PID 3128 wrote to memory of 4252 3128 MicrosoftEdgeUpdate.exe 114 PID 3128 wrote to memory of 2328 3128 MicrosoftEdgeUpdate.exe 117 PID 3128 wrote to memory of 2328 3128 MicrosoftEdgeUpdate.exe 117 PID 2328 wrote to memory of 4112 2328 MicrosoftEdge_X64_121.0.2277.128.exe 118 PID 2328 wrote to memory of 4112 2328 MicrosoftEdge_X64_121.0.2277.128.exe 118 PID 4112 wrote to memory of 628 4112 setup.exe 119 PID 4112 wrote to memory of 628 4112 setup.exe 119 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\EZFN_Launcher_1.0.6_x64_en-US.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2976
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DA7A48AA7BDC9E9BE5D718C853242D42 C2⤵
- Loads dropped DLL
PID:916
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ('/silent', '/install') -Wait2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe" /silent /install3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU3573.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Sets file execution options in registry
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:228
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.181.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.181.5\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4440
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.181.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.181.5\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1156
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.181.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.181.5\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4876
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODEuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE4MS41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezA2MzE1MDU4LTBCODctNDM3Mi1BOUI2LTE4ODlBMkYyODg2OX0iIHVzZXJpZD0ie0YxRTc4RkQwLTFDNDItNDEzOS05M0Y3LTU5QTJDOUY5QTdCQ30iIGluc3RhbGxzb3VyY2U9Im90aGVyaW5zdGFsbGNtZCIgcmVxdWVzdGlkPSJ7RUIyOTk4NDgtM0Y1Ny00OTI5LUE5OTctMEE2MDUxQkQxNTBEfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIG9zX3JlZ2lvbl9uYW1lPSJVUyIgb3NfcmVnaW9uX25hdGlvbj0iMjQ0IiBvc19yZWdpb25fZG1hPSIwIiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSJEQURZIiBwcm9kdWN0X25hbWU9IlN0YW5kYXJkIFBDIChRMzUgKyBJQ0g5LCAyMDA5KSIvPjxleHAgZXRhZz0iJnF1b3Q7cVdKU3pXd1BmZGNMUitYR0l2NnhyWmZpWU94aFBVMnMxTldtaldjYUZQZz0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4MS41IiBuZXh0dmVyc2lvbj0iMS4zLjE4MS41IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjI1Mjg1MDEyIiBpbnN0YWxsX3RpbWVfbXM9IjE4NzMiLz48L2FwcD48L3JlcXVlc3Q-5⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:3360
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{06315058-0B87-4372-A9B6-1889A2F28869}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3204
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUyMzQzNDc0MzYiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:4252
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CC48D8CF-F33E-4019-AAD8-6C92097ED136}\MicrosoftEdge_X64_121.0.2277.128.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CC48D8CF-F33E-4019-AAD8-6C92097ED136}\MicrosoftEdge_X64_121.0.2277.128.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CC48D8CF-F33E-4019-AAD8-6C92097ED136}\EDGEMITMP_D7B54.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CC48D8CF-F33E-4019-AAD8-6C92097ED136}\EDGEMITMP_D7B54.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CC48D8CF-F33E-4019-AAD8-6C92097ED136}\MicrosoftEdge_X64_121.0.2277.128.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CC48D8CF-F33E-4019-AAD8-6C92097ED136}\EDGEMITMP_D7B54.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CC48D8CF-F33E-4019-AAD8-6C92097ED136}\EDGEMITMP_D7B54.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=121.0.6167.184 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CC48D8CF-F33E-4019-AAD8-6C92097ED136}\EDGEMITMP_D7B54.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=121.0.2277.128 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff74ad91d88,0x7ff74ad91d94,0x7ff74ad91da04⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD57d5c9bd09cd36ebb983fc1f7c35860e8
SHA11703f14a49df6c8ae66fb337c6b9f8cfc2c8f608
SHA2567c8163a64f3dd9d516cf7b776251ce614184aea36bb3baae228a122921c119d0
SHA512693ce2c96c2cd9963cc2ffbde850490b0ced4e4322d4fd0eed53d811b4c1d442931953fbb50cc59da78417c3438f38411fac8bb994b50afc471da3e7ea7dd04a
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\121.0.2277.128\MicrosoftEdge_X64_121.0.2277.128.exe
Filesize10.8MB
MD5bb7a097b302353a54f45a45b7db412b4
SHA1b013f4b4c1e8dc538eeccc4c7f1e01e31abb6481
SHA256cdc13033a9392cd4280bb2e28c66af6dfec3ef643969cb1f6fa2f608cfed5ffe
SHA512cf6ced9b498c02892430248fbd943086026efdb878b070fc49e9afa5231803d565d85e9c474511261e565a2387893fd5105edf9bd989031c4b31c574f9e8a158
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD59540ad83a08605ba1f52196424ce3067
SHA1a533eb61319bce1720b55d8921691323a4178c3d
SHA256b0b5d9eb6f4b176bdfbe4da0a060ad1b76c813186fae3d9a6e1b1dd9ee0d01d1
SHA512bb00ee12c353c9deeb8105399b2a956343e4a1c13dd1198d0f481c4f699099a34ede80f15bb4efa9a1f68c2c12ff75da163b48bfdf30353d5ef5d4bb7c174493
-
Filesize
201KB
MD511fe091ace9d03b9ada6d5a22d12c0d0
SHA15379ebe84500d425586904e7f9ac0393ab2a9d24
SHA25650f4ed60a507ce9dd1f3f4e7d53053d923cb71594374a25251746a9b2271e4ee
SHA5120f39af99697332c697ca62e2708e0a9200552a55f2d3057b64e9b18df2fe2828be750b14b5336ac9518b4c1282e82cd170b64587cf56b45b840ca231108b7fdf
-
Filesize
212KB
MD57750d94e4719ba69f5f83213444c0015
SHA1f2d49b2d5c3bb372a5c74513de0744f2a5f3fe5e
SHA2561ab31694ff0b6283fbb6ec062d6eab9ffb26df9d6d1ba140cf60a8e7a4cb9fe5
SHA5124aba2ff17870e6e20fbcfe8d31036d52d9b2ae9df1013e1140cdf321bb4da0a8f5cdbbabfbee758cd2f2bbe2a3b10f25351f9e29cc5f5d91baea6dce2c83e714
-
Filesize
258KB
MD53fa9ae698a600ff3422995504cd088c4
SHA1bb0b798291c7e37c514d8fce11b8c777d13a6b2e
SHA256a8e1533f87ac5273f908fbb67edb786f231fcae44b49dd5e6ceb3c777c1f01a9
SHA5123dea12c2f30fdd5cc4125de40ad26c9f1a69abe8505c863b1469f47349d79f2b51ab037009e500291085366abf0ee2b24d16a3eb419b715894b924af656d2b04
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
640KB
MD556f5a70bb2bd3c55b7a7c96f0bff0329
SHA124c0cba2d16d696f1b6aab522de62581b25ed8e2
SHA2566d14a1bc57a8217e0f54a441d913175395a962fe26dc519eb999e944873a01b8
SHA51231e2407830e19eed93f49b33850bd66f116779036d9085493153e8573bf2f786e47e23dbe5270485b1e6049c7a4f885bcd8c065c5ad74c36890e7fa6231fd5a1
-
Filesize
29KB
MD5ca3b6944f47fb398e4656d7076e3d247
SHA1592c966af88cb9fd39250d917fe4876bb213d36b
SHA256d1d58d338db2f0f885d7e945613c2e6b98ce02534a2635c392cec04e8c8b5f71
SHA5125be93716c178401e809aba922b05abfe4c6585ac8544ba6fde1ae16af87e571ef28d51f8d71946d5acde96370d39bef8d85349677de16b3e8009ba3f57802b46
-
Filesize
24KB
MD527b4625745b0d9036faeef288dcdc71f
SHA179e2e6590a0f4b6af97796058595e8df77bc4b8a
SHA25674fefc1ad1bca85ae3cdcb197396568e9ccdc3de9095cc3e787e6e28f9a04487
SHA5122f4e0c4478a244c3b1632f282c7522efbe9b2f03d6a8bb600f0d833c61fd74d7bab32683b1c0e40e58b2d30640cbf6e9b28c03b179e168a6cb7bd3512bae3f2e
-
Filesize
26KB
MD507b160c1fabcf30a0e3e907f1b12177a
SHA1c5435df1d9bc93ac87870c5d8894de8481456de9
SHA256a78619b34f4566ff3fa834111d6f02fdeb5e82ceae2167f51a85aa902f4ad2dd
SHA512cbf2df29701b0dda648f2e208596c691e1caf97d2e3314749b6a3ad899cc057f66cedbbed4d6362b987173a925e73ea266d238c9d985d03b7ffd5c32b0d0b3c8
-
Filesize
29KB
MD50e38b9e9fde2583f8dbb61f2522c1996
SHA19e6a952387380bcf54dcc9d040a2d9051a63a1f1
SHA256ea9786491db2b6548e3c935cc4f8382fb1534b3b67dde1ed6b9aa003c9a7152f
SHA512f17d95eff5b23d2d11f161a66ef67c61c34c0190ca7d11d8e30f4504f5ecfec87a02fd474a08061433e8a431d78ed92fa9cc087863f3f4caeb2b5616949bc11a
-
Filesize
29KB
MD5ea96f65e817ac6899d6732cd880f744e
SHA10fde259d82e3c300ef2461e660208fdccc339e64
SHA25606bfc34d181852321498c49fad36701a5f854ad6e5588af9e141a5cef838165f
SHA512f79099fae7d98b9208aa5be96f28d9855c5e81cd9dcc5874ed2e41c8b720f32e54fcfdedd44e075892967768f42833f9fd99657096ee10af38d3b663d48bd603
-
Filesize
29KB
MD54328bf6228c408cae033fb4acca65640
SHA1011fd7ddb7c4551abe683cb005920d85cf3eb10b
SHA25673a10a15a4be54f85e4103a994c8a628c34034d085c40627fb4f18b499379de8
SHA512a50a74fd675ed3b791bfa5a93ca9f910c5a9052e9990de0132606779a333007d305f4fae1ac9f193335cd8207a17b00e2848a87aaa09e7900df189103fa0cd92
-
Filesize
29KB
MD5c4457c581afbf9e1903fb309d8d08bf7
SHA1fc52fd6cc2de7405ac69674f74cbef43c92c5295
SHA256f409b1cce73799d3ed0fbaab72c3331cc597787680e2fc9dcd9e2803f62e006e
SHA512b8bc722dc801a9c50a972dc9ef5ebb31b43bcbc7d12cb84d0b3e64749781818963573f0bafe646160ed9edac5db5b72d7968d3e5ff908da256079e8dff4ec2d0
-
Filesize
29KB
MD54ab2b866301da9ffd1a2d9e1d2828698
SHA1bf49d684e192f14f96ab03dd0f8d9e5817a0f1b8
SHA256cfffd594b203016e13fa74c5382c1c6b46f7d3f0817eb4d649feaf3350a401f0
SHA51260874a1c999e646a11217b3d0c68af03b7b2e1210f65e8e922a2cd8741bcf1e687bf74b97ffa0082962df2f534fc4c2ca9c28c4822a7e2c50474810e42de9d24
-
Filesize
29KB
MD5139d647896af07432b0c810977139fdb
SHA127b2f2915acfb3a740c958282deb2f418df83d49
SHA2560f3d5ea311f13f94b8c0f9bd6c8fe8351ca85a9e92d96b3ac3a54e87a2167833
SHA512cda3135620409f12fc7ee77c53233af4e64ea4a7e3a7b2af3534b015b410221e500a1820cd5852236236ca8820521072eba4128efd6316e1bc7863360c07baf7
-
Filesize
30KB
MD55801a2b7df808227d967d2e0d147fa4b
SHA1dbe2844fa8bcbebc227b9817bc0ea8dcd1634b13
SHA256cc02b8e56ebe97d640eb3241d6dfdd76c36d8ad9dc6fd70c11ed6a165f87dbf0
SHA512b6f77f1284a05aa4d9e69b2f459691f8bb79466242c13d1bf011d4edd6a43e742b4541ecfdd4d7aaf7b6e72b3540d41ebfd6074086ed1a4b56ef6b852d91ba0e
-
Filesize
30KB
MD59cd4f750ad9c689151ca0a278c3774bf
SHA1cbe0a7601db4ce0aded6e18c9647750a4e03a8c5
SHA2563569e7eafe649d9b4e0fbea1db33d4a7e6c350e4031f9ac40506df4828892b0b
SHA51238e723fbcc1ae59e50d8f8ffd53cf77fd32a64686f24a0670287c25dad7fbe4852ba968f223cc5936b2a1af453e5d2d5f3cc190e07ee0a78c55f88a0c3ecb940
-
Filesize
28KB
MD514fcd6216e82727e0a757f0f6a04701a
SHA1ceb886836ad9dc04b2758271d55cab0f6c6146aa
SHA256777b0583744a3ee8e32586262d34a3d231482504f37d1b0679e1dbd1e10bb854
SHA512e963ba587017d3e579f3839a0fa0fe5be659cb749629a5b98e7b02184e811a943ac18d66c927ab45c54869650289ec6e3a9661ec40532fc2ae578a5fb15606f9
-
Filesize
28KB
MD5d082255c15ca45655f999c60c7e44653
SHA1337bb7b65c8db5305814fa8046da0d790c5cab59
SHA25631c054f8b4c974d6ac436ee21828121f600a1dde0eb5bb8c7fb41c47ffa9563e
SHA512662db73cfe28995149aa4a3d2f877fd7b9a027a4f322be9ee6ffb19b8aa4d97ce3ea1fcc13c85c28a9ab815aecca1b0baa69109f20cfa73a46cf8c1be586dfb1
-
Filesize
29KB
MD58355353da56dd6ba036eeedbb10ffa68
SHA13e20c8f35cabebd04e7162b9567fd3905174127d
SHA256678888dd82f5cb04b5727c56699c70d442b35ac65338bbe9ac45ed8d2a32acb9
SHA512000d0a8648ca4e8433568efc422f3caeed7c53e764878aca11f8b7405850863f8a7bea4a97fbb0076db961d3f09646a00bb3eaa0e4e3b81d949ac2aa033b0827
-
Filesize
31KB
MD59e0645c2970492f18a9c16d053ae47cb
SHA1c91f0ee7dc0dc0213776728b152a5c3597b8e1c0
SHA2567bef8830bdf0fbc8d84d85946a28cafe05fc47528741bc11998805982a3b421d
SHA512c4277b7e7652bd342dbda6d2d22acbaeeb9ec1321cd91ad236575d0c8f504220736218711e91f0984e3d2f06652101f52aee123163d7bf3cd173c7ec2d1325cc
-
Filesize
31KB
MD58b692911c2eef0d2e2fbc8ee84c39e03
SHA1b5f558a2cbfee2dcf1cf5f7e5dd229309f5bca1e
SHA25668ff5bb5a44f019c7c8a50cbf9ee0af264b4782e6516917b4760c0b05d247161
SHA5126a4118eb9d1bdcb4031db82682ee919f62d575dc765ca0a65028bd31c8bdc061155bc2139318916b3be3572b6a3656d194e3a925b5711241f436267a9af1109f
-
Filesize
27KB
MD58ff46334ccb442dbdce0b04e84cc6364
SHA152a7dfd39529c0669d8fe72416876bb2b241741e
SHA25647c08c6be842b50d119c4921ff860bfc1739efdb017de42c1247bf0fb5c1e254
SHA512b23b74b2c7f76abb613630c888eff8ec2fe6c28138522ebed478f6d55e21917e658f269ef0d6014e8778225b81e2839cb965a1ff243b5639766bdbcd52c28f47
-
Filesize
27KB
MD55d365ca4dcb28432aae57e60dfae29f7
SHA176150d3ae3070e10f378df87e433b1324f5f008e
SHA256990051016c4d565d20167c62be48e92ecd840231bd0ff21838d105cbea750ed3
SHA512f46fb26ef0ce04eb0655cd4ed769b5af055ccec0a15cacc25c9bdd6e3c3a4ca501164e5093eb7381d00ea28a3be59e69762ade995a421c7ce8b1944fd2446465
-
Filesize
29KB
MD522b0343d2498e2a0b9d4168d480bd6b8
SHA1d4dd3b497b262905788c7abdc791af1cdd80c6a8
SHA256094dd4e1d9cf8114145c254372b0ac20f6593f16f7b53e02953bd21bbe26a4f0
SHA512970fd6cb5fa68e2e12a6288b00250a3c400939963298bfe7610edced53036990c51edef7f5054c371b12eb992ce8e05b1eb7af4d9ba61e0af41096a9ed64957a
-
Filesize
29KB
MD517006114f71cb462041e1ec50a952047
SHA13062f6d33dfa215b18492a3e0a2d0fdf41a08429
SHA256bd195bbeb179e478cd1dc4bab518568edd65603e3d33b11b3298ccd1995b183f
SHA5125d7fe67bc1d6e22c9e7c13df5a5b9dd039eb77d94b991908a6e23ae703295d2c857b38799c30b40cdb2f3bf503f951de54e11fd65e6f482bc184ffab54ff443f
-
Filesize
28KB
MD5e4a76fbf2d73c51f37bb96ef5b76ceaa
SHA15bc9a30d11fae80286f0a73db5900e9b2a94fc30
SHA256a1c067279ba80bacdd975117ae5e6aad9923b3138340d25d08742163107d7313
SHA5120b4751d5a7914daecc8f0f620dff0228bfe1853af901c6ec277656f3c568d916bc1e1d22bc737ee3f54107fca6ded731c73e80147e34ce3b81c276f8b6d2b2e0
-
Filesize
29KB
MD5a5824f125e7c5a363618e10eb166cfa2
SHA1b9265cee687f031f52eb6cfd6ffacd728f7c9c71
SHA2563fe2d705da261a98a8cb375d59ff98b0552b61e7c57132d46126fe4646b2cdd7
SHA5124b2c4fc806097320a56c2547d2962f21e99e6e17a211cfd9aab1a7845dce78d958ab6a03481cb2a827ab233afb2cbcd059bc6e211f8951c1a2e3b7ac51825b8a
-
Filesize
28KB
MD596e70c3aced49e26c5938bf5ec7e7a7f
SHA15fe35ee220c39cf8cad8d434b49ec31fa3f729ba
SHA2565f8d8a9d207108426a3f4776786c4a7b5d70db237ded870b9a7ab191602fd83e
SHA512af6f420164c2504a6c0fb3b62c89790dc3e08ae0b847e0a888c2c793aa6198134a8c18914fa0a5f3153dcad51698cb7125d2c90ae68de221042cbb97b7f8b78a
-
Filesize
28KB
MD55ce5cf921d0e522b8a05efa79031cfde
SHA1a081d73ab637ad63831b0e05d0122e8e9036a41b
SHA2566d049ab238bffbfaa0408460f3d76bc23bfd62ccf57659beaa81346e2dd69e98
SHA5126ef468f6f6b6186fee208b3101c089a168bfc286fd7a84c220a72be085744c70b30a299cbce1bb0c25689da1f348552322a6451277be604f211017ce6d16f989
-
Filesize
29KB
MD54bfe23c9930f814f7c9d977525cf2046
SHA13a6147006bd805a33d7caa647e8088a257061781
SHA256a9a40611ddccf179b8cd342c07d947af951f85072b598b5332ca772a5ce7729a
SHA512a235eef64580b8922e5f507f9bb2080800dcb4ea6b156150d2266748ebf38c2eb1e39342b01856ebd9e63b6e89c2104b434e444277dfe03e549293c928cb89bd
-
Filesize
30KB
MD5e22edad44e45a6e1da46e0afbb318052
SHA1d35c28b112fc386c6f4c52e4faa2ed8a56a4f6eb
SHA256a7a163fbcbeffbfd4655e41d162817a56b8da8b679b139a04961e830ea5ad05a
SHA512e750271aa41b402a5682f6863e95756c91afcbd5a994453280c7dac3973da3ecaf0fa0689b962cadab492ce90d510a436bd773c995b93ff6b40007371cdd2713
-
Filesize
30KB
MD586e02140bd5ea5090460ab7ac5c5cf08
SHA13cc00afb1b108b2247cc38211b64bb360c1419b4
SHA2564edd7b2ec1438f6a5d56eb0b7fcd7a42f2110eaf57439283afe85f527f9c1574
SHA512a0e6177a3791e59aebcc960cdc2861e10b6a20e0169940f219c92cccbd4827afc47bbd94a5629d25a9f2d547e8e2094a3c96aa55a1bc3fe9b744c07436359e95
-
Filesize
29KB
MD5912713dbc1bf81366497d2c10ba3783b
SHA1cd42a85838ef70f72c2faa5a149bc6a904f81585
SHA256f4b3c90ab375d5f465e2abc2bdff37fc41e4a1ed44ebf8370cd9eba7408fb586
SHA51211b2b1b726b314a725d24fa3c8b85f9c05a1643ae768adcad4b7006870b728db8688cf708f355ed8ffe2cbc24fb874dce2dbad86231c045b454dbcddfde35225
-
Filesize
30KB
MD503cf202f9262f42dff2b35987eed7c95
SHA12ccf4e4b8f55d61032048101c18a4b6cc7b6a087
SHA2566f033953fdb5ad272ddf29299577a4bb8d9a53bda4b3d8ffffd8d56c542c2c56
SHA512c1d65b8457fa2b0998aa6500b585c14e177154ae5cbf08cbb0ff0fd7a1d82e31520f4bee4ad20badeb91784501057b1a968c7d7d8415a2f7683f1a434bbca30d
-
Filesize
29KB
MD5e2bc2cb179b0758f9deda1fde5f60ae2
SHA171367f007ab0daf92d954b7e86eae037ec2fa8f4
SHA2566a2342b270f775433bc77f9d48ab8f71b221c3cd60d84e893314bebff19c4801
SHA512ff3a3afdf1780d6351306c0e00fedb59c020de68499005726e57487e9c5045636e59baffa487ffbcecc95f9bace000f66d1c3bf3b107e309e3cb522d45dc7b7d
-
Filesize
29KB
MD534b01daded37b4003b71c63712ff2577
SHA17cf99924ab19d94dca8a51d00f95ffc29b9f8e98
SHA25611ffdf625eb3de49818a1a6288e9d7a60f4f3c8951b163eea84095ffd4ff871d
SHA5126a865be6b2c5103db06dd14777833bd4835f10c2a282c5edd43325fb0c1669fac875367f4a4f3d98c26c55449682ee406e7c882c16d9f48b41f3be533d82f161
-
Filesize
29KB
MD51b10182ad3f07c112f26fbd9f7a43848
SHA1b9b9b4bc37a9dc1f9a9cb11df44583594d72f6e1
SHA256381cbc579d5200ed6725a0dc149dd04703d157ae793d39be130d68eff7109c02
SHA5121575d4f0f756aa5bee99c0b1f60ebca946abfcba08b180b13eb9fd966b05c44cff94ee2db6b5fa7025b5f0247f06d5bcec3c790a20c1086a59933aa7e5cf7097
-
Filesize
29KB
MD5e03b903ae9e8a21ab7e24230c05ff0f4
SHA16c9b3354c0b5a96b7f062d94bf874c67ebbe4c72
SHA2569fbff63d4b7dc5e94958bf657321ff8f93de76394f78ed679863072d4ed3062a
SHA51231b7322288802c58e7b287605bae0899bd4bff0b3b1c1daa2898ed32453b5e8d0d4d5b508c79c6236e924a23d61321981d80a80929dfe875bcbe6fd0b4400b04
-
Filesize
29KB
MD5c4404953c519113d70e8fb19ce4b23dd
SHA1c01ab7651ab1e3ae24f146ec72bf53d64001e14f
SHA256e903ef5c4ba6872159e21dc6f4afa9a20113868cd99ddb8857369637053c3b05
SHA512a575ba69f83408b219a6b3b63e031fe37d691de67e9b069daa43091b6eee3089100c1f15d34c36f0a40e086d97568866386d52cf60f0160296ea2db745b8c567
-
Filesize
28KB
MD5cad5e407dc341f661f3675c821807c84
SHA18581e431be8308b4a0746719898f66a2e4efbfd4
SHA256df5d8fc7010fff00081f71f3fa2f8a384f45f077caa9afb066d45a070308581e
SHA5126fcaf91c27feef117430a185d6189bdeb4c438186e4307a6c91c43cf9584c236b93ac04fa549eeb7f63e13494e30d58fd295068d7572cbe8beb438666a4fcf4f
-
Filesize
28KB
MD5fcf71fc0b6f12c6d3ccb03418228a538
SHA190afa2cabc9eda94a7d01689f605e59601481cf3
SHA256a3b8c23468dec69532ad374b9a3475e552b941d965ffcbdc6de0f23d58baeab4
SHA512ca804da85ac67fecd46a5820328f5f209ba08e3f2ef587ce1021754928de36f14f47fe08ddffd729d1d0ff64d5c7dcb0d508818248ceedc5c83fe0a6017aa031
-
Filesize
30KB
MD58986d1d9e5fc10d99a45d00f2858ef5c
SHA149102f4cfe2dc62ef633fee73678a16f8c06c136
SHA25664576a5588c0facf99197d055c9a6a9b0db9a25c5601087b94407dd79fe44ce4
SHA51230a094bf7d0db33d54581da8708f5f19cbaabca041e7e559b849f9581e22b8d3415093461e33fe7091acf643e02847c6edbd71a107f462f0057a4e9018266f95
-
Filesize
25KB
MD5785d4681543392b616bcd95e52da7998
SHA1d538f78f7323f50d01f2765432705ff30ce47930
SHA256b05c9c1312c869cd6ec5682372bfb01b3e52a60a01ab2fe68afcd6fa20a8cef7
SHA5128031fa240100e6fd6721affa3ca37e6d88b6341b51d299f03736c31c67fcb2e3c105ecd8f27a6570e69a60616008c9868da424615f035e3d25a89cf95e63e622
-
Filesize
24KB
MD5ad20644a4ef8b16c043d4c1b68a0e771
SHA1d1bd42edd650c3141a58c6ff0aa858709b7e0258
SHA2567f2eacecbcda9339249b386ce8e23611e94d2fbec3d90121569d6f1cfdf6f9c0
SHA5128cf2e34a23f99bf8c37bd5727c8ff6b7666f7752427df8b05d8d82e5e7d97786b4ecded4031bde32d91e46627b169e8d31b2bdd2119c6b755731a787364c0e1f
-
Filesize
29KB
MD529bb41863ca31837876d4acac58f8a47
SHA104add82abba27c6ce6922709ea864ae4b40fa8c7
SHA25620fcb7142b72803b1f74e52d434cb28eb09fa8ff2d178e5edfa7fa5885552e5c
SHA51200d3a9c33ba5b7b995cdcea97e708fe4b9e14883e0b14f0547cbce5b1ba54c338cce7ae81b18e53ab3072152e748528710ff0bb49197970d4f1d1fc700a1ae52
-
Filesize
28KB
MD5f53a96193b592c3b5fb18292d59c9bcb
SHA15a218c70180f408d393397b9a9c2c34d7deb8992
SHA256e6244f73585ae3c74a0df8e077a58da3dd7b7d914b991747686edadd6de7f87a
SHA5124f1cf04a8f50f3c9cab562d3df52dc10cc98232a50fd99a61d4e7557a3c1cecf5cf89d7db1bccb42467f1e3ace2057f2359007ddedf9f831e4e9b16ad2c046e3
-
Filesize
27KB
MD58cb769dafb0dd354d2b567160bf82a63
SHA1beba881af68b4081ece5c3baa70864225c0c7472
SHA256926c2fc5f0dbe67a1da03125ca00fe6fad055e9fe65bedfb75aa23fbea289e8e
SHA5123905e30b1c47e4bac91ec09bd08f9c23bf1a5015f58ac843369632d58315c53372a2b87e9d0560b95803941be26b066b4b2413c9b66f2ab9288bda1d6a99b804
-
Filesize
29KB
MD5790d15a76ad2a23841dc9fac85ddac88
SHA1cb30bb84d28d97cf96c767833ef6d2357a15b437
SHA256927c9d8800e490b0f6affd0fd93dc4ddc27348ec7bcbf594b0866b7ece46e33e
SHA512011806c6059c1a25fe451d04339641e52e94f8b582d1a60a80260584e8aeb012df30d01496de7e7cce942c631922d12271718806ac3656e207775e98b2cf8166
-
Filesize
23KB
MD523a9415f5fa8793237b1a6500d683189
SHA1e8e628e9237402051f331d01e1c3bef4ac407a9f
SHA256d56e63986eb323739599da79b3a8b1db4fc616668dec44dc878195f2b86bca1b
SHA512615a50c7e062e7d75e13bad2c23867fb6b543bb2969e5b32bcae0b1874f1cb15179021599507c9b1bf16d7dae0bc22c1e246411c9cd643772314a7561a5d7140
-
Filesize
28KB
MD5c912101b5b967c289e9a74d5bac4b21b
SHA116885dd84c387e8d15da2820a0d46d5e890b3fa0
SHA256b5d71221182a4444c673670dd1b3714fcb56bb800700382b71f0ccde2c2f7fb3
SHA512c0662ad808f6859034b7081e19c1991a2033a1d5674069cf1891018daa0b2381df1a250f4c54e374fe363eb2090bcf10a7b7f3beaa05a2dba6d36af20cc54b9b
-
Filesize
30KB
MD5cf789b5c418cc53b1706dfa2d8ff0332
SHA15b17e020b2a83e182f8137777e926a9c84545660
SHA2569ca3c9fc60d6947046e2a3526eb24fcc45ca152bd9bb2983a6d5105d3649d579
SHA51252e5b1df2b3167308b9b6e5552311db906acff0e9abfd03db307be6977344592977cafb04c0dec0abc60fdd3e41a8724fedeabc9d2256d171b991e8aa0ab835e
-
Filesize
27KB
MD58d673b29833feaa76ee739c62d827ade
SHA1d74d90db9d88fda7de2ae1573ca74ceeb93f1c06
SHA25653fb9df7b1baa733c170c72a194958349f740396a7ba01a88c8f83bf24b78718
SHA51244599a57b12b7b8cdd79113f5059b5ac85c28927787929505e511e19adf304d3f26c03113a56ad250f2828dcb163233d4eb4baea21c4c856d6cb17d98ff9a165
-
Filesize
28KB
MD57c6e8c05a8f9924836d3a351f8351edf
SHA1f284487780f2da4317a5dbed28be5dfec35e5717
SHA25671ad0e4e5e12d815cf1c3ea68e6031019993bad8a87b80ac2784f25986be0453
SHA51292f31e19ec3f0afeeca2f7de0d058066b489b4a67aee983df32f32a4c96186af9d2236e33217aab050a39f90845fb6b15adeacc9bacc0392fbab023d81a9f5a3
-
Filesize
29KB
MD562febccb48955668ba8c86328cdfc1dd
SHA1995c1a5b919bc66da3eae5de21268547276348ad
SHA256895dda8bb6b6b6778ba7fdb4f7c4267262ed4c3b584c5f7955fb40723e802d79
SHA5120e5d0c0e4a57b3c6bec70f5bdfd5c95dfc83bf6552dca81faa0e6a7d0276ea30598f26028caed4960d5ea2ec527504386a9cc601c3c03680be33188eede1378b
-
Filesize
2.1MB
MD5418e3145a7d62d50f2c0228454d106b7
SHA10152f1d4c2431db2bbe8ee2d8e37b5308ec6aa05
SHA256617c6e174c67e906a0e3fd665b3e876e5d4a1c5855e49145a779ac2ea63fd940
SHA51295596d46513909d47eba56fdbab2522b6aada9dd27127528a144f3798fd09b28a1515825b90201c940964c7fa494df65d20461afd4eb6c8df1075ba52de0f713
-
Filesize
280B
MD57588cde892ad74abe35cb2ee7dbbf772
SHA1fb18477b5847f1c1fa99a5a1e09d59af9970b9d5
SHA256f9863539697a17370292ed4871423682a93afcbe266839a184de5cabc3e12a05
SHA512ce76272536527a90caada15d838313c2707bfd61c98eb9503395a2f5f2f11d4b0dd21e2e5872863f4ca96b665cca23030b0573b679a98b10b733fccb0781e02f
-
Filesize
113KB
MD558906e3c8ceec9ef1daa96b1a6df3e7d
SHA190081651660bff1d98664be83907b078bb75d8e4
SHA2561cfceb5833a4eea5831374b173af76228cd0487a7a124fe5debb54b17abe3298
SHA512309961550b666a7394ab2fe78c3e0b3bb21c1195d4eaed02e3b75189a6ee15b6da1698b1275fb59d58475ec7700b913a6a563390b0f65542708d1e44f5e30fd3
-
Filesize
2KB
MD5b20350fe892639da957eae196619dcc0
SHA12bcced9df70908052cd7cf6e5b607fa2d6f961c1
SHA256a0ec744854d8e1d3e4aeef4f7d58f05fae8975019779e32b10aa70151156d8c7
SHA5123964a325757ccb6c2e321d7a419962624228f624551931b3bf57f7ae3d813370b13819f6ce0d471deed34481e69024d876c751f1653982589e912eb55b12167b
-
Filesize
1KB
MD56fe6ec7c83015e809b93664abaa70b71
SHA134e8d3ca82a498c495d83f98f9054785602cc07f
SHA2565da68d4c56d0fe5b6b1c6828bb9166e8fe99ff2c8d6bd4f5f0eaf318a602d32d
SHA5120c5f668eb145202db09f8b3ed633e981b5e314c57366ee1a156d104a88fb286f58c9410b6413287a71c4033283acfbef927186f79956a26455cce97b27b8827a
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
1.5MB
MD52fbe10e4233824fbea08ddf085d7df96
SHA117068c55b3c15e1213436ba232bbd79d90985b31
SHA2565b01d964ced28c1ff850b4de05a71f386addd815a30c4a9ee210ef90619df58e
SHA5124c4d256d67b6aadea45b1677ab2f0b66bef385fa09127c4681389bdde214b35351b38121d651bf47734147afd4af063e2eb2e6ebf15436ad42f1533c42278fa4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7.2MB
MD541b668fa04036128f085becc56d806e8
SHA146e1c4a77f786749160601e2d9441f8c581bbd12
SHA256dbb2a42570b120c061f9764b02c7a0583998c97bc6f06e7ee98bbe4f52826987
SHA5129732cff8d9d8a73f04a50d0849785e6ce98f707095c38bb2bdb671c45d7184904bf378674ca77c8793c02284dae36045769c00e14d3094acf59d840ef33e5abb
-
\??\Volume{18122b6c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{7a9edeaf-0bc4-460f-8e25-d768f315a53f}_OnDiskSnapshotProp
Filesize6KB
MD5cc416a3626246d37fa234ae7bb6f9018
SHA17ae6aefef06c6428c9bfc5bb8678c27703e6440a
SHA256f08e13fc20a126d0f5a69d1c8382b15c45c4d7d1d6981b92fbacaaaa6fcc99ac
SHA512aaf74ff25b6576af47a9653bceb38bcaf6764c8174f29db560d5b88a85ec801dd17441c8c7a75bf05f16dbd852a5fea5a1833fe77025c229a60500563ac5f4e0