Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/02/2024, 03:17
240228-ds1rqshh8s 1028/02/2024, 03:01
240228-dh1nzshf9x 428/02/2024, 02:39
240228-c5sq8ahd97 6Analysis
-
max time kernel
280s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
PowerToysUserSetup-0.78.0-x64.exe
Resource
win10v2004-20240226-en
General
-
Target
PowerToysUserSetup-0.78.0-x64.exe
-
Size
249.8MB
-
MD5
aa98e52c780c510c6d7a7eef1859cb4e
-
SHA1
da888750065c08be20312e643782a9b1255e7eb4
-
SHA256
120b1cefc94d76ec593a61d717bbb2e12af195d19e04c811f519d3f9b9b3b5c0
-
SHA512
1adee598c5c6ef32acfef1343e404dfe0f82fe7f02bde851236006748d9116e8e848e8ce120de811bf2085029635ffd8a70c923574666791f3ef6dc8010e85e3
-
SSDEEP
6291456:Yan+LwMs9L55ZETFxAVHpn0XXTC2XNBgRAEnY2pnHFQ8/C5kX3hXMXuMWA:Yls53uIVJn0XG28bYmn2ookXyoA
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4568 created 3424 4568 PowerToys.exe 72 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\{2229436b-e304-42ae-befd-275c080f99dd} = "\"C:\\Users\\Admin\\AppData\\Local\\Package Cache\\{2229436b-e304-42ae-befd-275c080f99dd}\\PowerToysUserSetup-0.78.0-x64.exe\" /burn.runonce" PowerToysUserSetup-0.78.0-x64.exe -
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation PowerToys.exe Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation PowerToys.Peek.UI.exe Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation PowerToys.Settings.exe Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation PowerToys.PowerLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation PowerToys.Settings.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 10 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\kok.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\msedge_wer.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\mip_core.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\msedge_elf.dll setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_it.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_lv.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\libEGL.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\ca-Es-VALENCIA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\vi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Extensions\external_extensions.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\VisualElements\SmallLogoCanary.png setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\identity_proxy\win10\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\msedge.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\hi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Trust Protection Lists\Mu\Fingerprinting setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\WidevineCdm\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\sv.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_fa.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_mr.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\fa.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\identity_proxy\win11\identity_helper.Sparse.Dev.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\az.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_es-419.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Trust Protection Lists\Mu\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\th.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Notifications\SoftLandingAssetLight.gif setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\el.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\MicrosoftEdgeUpdateOnDemand.exe MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_cs.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_es.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\az.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\kn.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\msedge_100_percent.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Trust Protection Lists\Mu\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Trust Protection Lists\Mu\LICENSE setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_ar.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_en.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_ca-Es-VALENCIA.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\hr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\lo.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\MEIPreload\preloaded_data.pb setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\msvcp140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\concrt140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\wdag.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\ml.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_ne.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\edge_feedback\camera_mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\ml.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\identity_proxy\win11\identity_helper.Sparse.Beta.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\km.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\mspdf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\webview2_integration.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\gu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\identity_proxy\win10\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_ro.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\msedgeupdateres_tt.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\en-US.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\fr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\cookie_exporter.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\nn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\cs.pak setup.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI7D4F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI83F8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8F47.tmp msiexec.exe File created C:\Windows\Installer\e5a72d4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI802F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8A91.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8C68.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9729.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1C19.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D24.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI31E7.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5a72d0.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9718.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2EE7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI31B7.tmp msiexec.exe File created C:\Windows\Installer\e5a72d0.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{CD764F6E-D151-45D1-9EF8-4D858CE1B272} msiexec.exe File opened for modification C:\Windows\Installer\MSI8B5D.tmp msiexec.exe -
Executes dropped EXE 30 IoCs
pid Process 2636 PowerToysUserSetup-0.78.0-x64.exe 2120 MicrosoftEdgeWebview2Setup.exe 3704 MicrosoftEdgeUpdate.exe 1412 MicrosoftEdgeUpdate.exe 2764 MicrosoftEdgeUpdate.exe 624 MicrosoftEdgeUpdateComRegisterShell64.exe 2052 MicrosoftEdgeUpdateComRegisterShell64.exe 3280 MicrosoftEdgeUpdateComRegisterShell64.exe 4436 MicrosoftEdgeUpdate.exe 1088 MicrosoftEdgeUpdate.exe 1760 MicrosoftEdgeUpdate.exe 2648 MicrosoftEdgeUpdate.exe 4920 MicrosoftEdge_X64_122.0.2365.59.exe 3224 setup.exe 4648 setup.exe 4268 MicrosoftEdgeUpdate.exe 4568 PowerToys.exe 1204 PowerToys.exe 1604 PowerToys.AlwaysOnTop.exe 1728 PowerToys.Awake.exe 3396 PowerToys.ColorPickerUI.exe 672 PowerToys.CropAndLock.exe 1632 PowerToys.FancyZones.exe 2232 PowerToys.Peek.UI.exe 4484 PowerToys.PowerLauncher.exe 4860 PowerToys.PowerOCR.exe 4056 PowerToys.Settings.exe 3140 PowerToys.ShortcutGuide.exe 4164 PowerToys.exe 4068 PowerToys.Settings.exe -
Loads dropped DLL 64 IoCs
pid Process 2636 PowerToysUserSetup-0.78.0-x64.exe 3704 MicrosoftEdgeUpdate.exe 1412 MicrosoftEdgeUpdate.exe 2764 MicrosoftEdgeUpdate.exe 624 MicrosoftEdgeUpdateComRegisterShell64.exe 2764 MicrosoftEdgeUpdate.exe 2052 MicrosoftEdgeUpdateComRegisterShell64.exe 2764 MicrosoftEdgeUpdate.exe 3280 MicrosoftEdgeUpdateComRegisterShell64.exe 2764 MicrosoftEdgeUpdate.exe 4436 MicrosoftEdgeUpdate.exe 1088 MicrosoftEdgeUpdate.exe 1760 MicrosoftEdgeUpdate.exe 1760 MicrosoftEdgeUpdate.exe 1088 MicrosoftEdgeUpdate.exe 2648 MicrosoftEdgeUpdate.exe 4268 MicrosoftEdgeUpdate.exe 2240 MsiExec.exe 2240 MsiExec.exe 2240 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 2240 MsiExec.exe 2240 MsiExec.exe 1564 MsiExec.exe 2240 MsiExec.exe 2240 MsiExec.exe 1564 MsiExec.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1728 PowerToys.Awake.exe 1728 PowerToys.Awake.exe 1728 PowerToys.Awake.exe 1728 PowerToys.Awake.exe 1728 PowerToys.Awake.exe 1728 PowerToys.Awake.exe 1728 PowerToys.Awake.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{FCDD4EED-41AA-492F-8A84-31A1546226E0}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\PowerToys\\PowerToys.SvgPreviewHandlerCpp.dll" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{FCDD4EED-41AA-492F-8A84-31A1546226E0}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{729B72CD-B72E-4FE9-BCBF-E954B33FE699}\InprocServer32\Assembly = "PowerToys.QoiPreviewHandler, Version=v0.78.0.0, Culture=neutral" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{729B72CD-B72E-4FE9-BCBF-E954B33FE699}\InprocServer32\Class = "QoiPreviewHandler" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{77257004-6F25-4521-B602-50ECC6EC62A6}\InprocServer32\Assembly = "PowerToys.StlThumbnailProvider, Version=v0.78.0.0, Culture=neutral" MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{77257004-6F25-4521-B602-50ECC6EC62A6}\InprocServer32\Class = "StlThumbnailProvider" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{0440049F-D1DC-4E46-B27B-98393D79486B}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{f399fddc-285c-7ca6-b0d2-8364e450b33c}\LocalServer32 PowerToys.PowerLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{0440049F-D1DC-4E46-B27B-98393D79486B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\PowerToys\\WinUI3Apps\\PowerToys.PowerRenameExt.dll" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.155.77\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{A0257634-8812-4CE8-AF11-FA69ACAEAFAE}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{729B72CD-B72E-4FE9-BCBF-E954B33FE699}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{729B72CD-B72E-4FE9-BCBF-E954B33FE699}\InprocServer32 MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{10144713-1526-46C9-88DA-1FB52807A9FF}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{F2847CBE-CD03-4C83-A359-1A8052C1B9D5}\InprocServer32\Class = "GcodeThumbnailProvider" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{AD856B15-D25E-4008-AFB7-AFAA55586188}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{AD856B15-D25E-4008-AFB7-AFAA55586188}\InprocServer32\Assembly = "PowerToys.QoiThumbnailProvider, Version=v0.78.0.0, Culture=neutral" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{D8034CFA-F34B-41FE-AD45-62FCBB52A6DA}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{A0257634-8812-4CE8-AF11-FA69ACAEAFAE}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{84D68575-E186-46AD-B0CB-BAEB45EE29C0}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{f399fddc-285c-7ca6-b0d2-8364e450b33c}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\PowerToys\\PowerToys.PowerLauncher.exe\" -ToastActivated" PowerToys.PowerLauncher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f399fddc-285c-7ca6-b0d2-8364e450b33c}\LocalServer32 PowerToys.PowerLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{A0257634-8812-4CE8-AF11-FA69ACAEAFAE}\InprocServer32\Assembly = "PowerToys.GcodePreviewHandler, Version=v0.78.0.0, Culture=neutral" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{A0257634-8812-4CE8-AF11-FA69ACAEAFAE}\InprocServer32\Class = "GcodePreviewHandler" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{D8034CFA-F34B-41FE-AD45-62FCBB52A6DA}\InprocServer32\Assembly = "PowerToys.MonacoPreviewHandler, Version=v0.78.0.0, Culture=neutral" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.155.77\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{A0257634-8812-4CE8-AF11-FA69ACAEAFAE}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\PowerToys\\PowerToys.GcodePreviewHandlerCpp.dll" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{10144713-1526-46C9-88DA-1FB52807A9FF}\InprocServer32\Class = "SvgThumbnailProvider" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{77257004-6F25-4521-B602-50ECC6EC62A6}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{AD856B15-D25E-4008-AFB7-AFAA55586188}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.155.77\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{10144713-1526-46C9-88DA-1FB52807A9FF}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\PowerToys\\PowerToys.SvgThumbnailProviderCpp.dll" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{51B4D7E5-7568-4234-B4BB-47FB3C016A69}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.155.77\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.155.77\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{D8034CFA-F34B-41FE-AD45-62FCBB52A6DA}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\PowerToys\\PowerToys.MonacoPreviewHandlerCpp.dll" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{AD856B15-D25E-4008-AFB7-AFAA55586188}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\PowerToys\\PowerToys.QoiThumbnailProviderCpp.dll" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{84D68575-E186-46AD-B0CB-BAEB45EE29C0}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\PowerToys\\WinUI3Apps\\PowerToys.FileLocksmithExt.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{FCDD4EED-41AA-492F-8A84-31A1546226E0}\InprocServer32\Class = "SvgPreviewHandler" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{AD856B15-D25E-4008-AFB7-AFAA55586188}\InprocServer32\Class = "QoiThumbnailProvider" MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{FCDD4EED-41AA-492F-8A84-31A1546226E0}\InprocServer32 MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{51B4D7E5-7568-4234-B4BB-47FB3C016A69}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{F2847CBE-CD03-4C83-A359-1A8052C1B9D5}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\PowerToys\\PowerToys.GcodeThumbnailProviderCpp.dll" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{DD5CACDA-7C2E-4997-A62A-04A597B58F76}\LocalServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{84D68575-E186-46AD-B0CB-BAEB45EE29C0}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{60789D87-9C3C-44AF-B18C-3DE2C2820ED3}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{60789D87-9C3C-44AF-B18C-3DE2C2820ED3}\InprocServer32\Assembly = "PowerToys.MarkdownPreviewHandler, Version=v0.78.0.0, Culture=neutral" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{60789D87-9C3C-44AF-B18C-3DE2C2820ED3}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 3520 taskkill.exe -
Modifies Control Panel 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\Colors PowerToys.Settings.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\Colors PowerToys.Settings.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\Colors PowerToys.AlwaysOnTop.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\Colors PowerToys.ColorPickerUI.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\Colors PowerToys.Peek.UI.exe -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5} MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\lastrun = "0" MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\WinUI3Apps_WinAppSDKLoc_af_ZA_Component msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\cmpF740C950DE512A21B1090FAD9AA7F43B msiexec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\SystemFileAssociations\.rle\ShellEx msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32\ = "{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.155.77\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{A0257634-8812-4CE8-AF11-FA69ACAEAFAE}\InprocServer32\Class = "GcodePreviewHandler" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\MarkdownPreviewHandler_zh_TW_Component msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\cmp1569D2545DA5756B7AF09D6E24571D1A msiexec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\SystemFileAssociations\.tif\ShellEx msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\ColorPicker_ar_SA_Component msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\Launcher_WindowsTerminal_fr_FR_Component msiexec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\SystemFileAssociations\.rle\ShellEx\ContextMenuHandlers\ImageResizer msiexec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.gitattributes\shellex MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.gcode\shellex\{E357FCCD-A995-4576-B01F-234630154E96} MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\VSCWrkCompFiles_Component msiexec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\SystemFileAssociations\.jpe\ShellEx msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.jav\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f} MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.ctp\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f}\ = "{D8034CFA-F34B-41FE-AD45-62FCBB52A6DA}" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.gyp\shellex MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\GcodePreviewHandler_pt_PT_Component msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ = "IPolicyStatusValue" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{51B4D7E5-7568-4234-B4BB-47FB3C016A69}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32\ = "{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\Launcher_Service_es_ES_Component msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.dats\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f}\ = "{D8034CFA-F34B-41FE-AD45-62FCBB52A6DA}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\Launcher_Service_pl_PL_Component msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\RemoveCoreFolder msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\Launcher_History_hu_HU_Component msiexec.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\SystemFileAssociations\.png\ShellEx msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.svg\PerceivedType = "image" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\Launcher_Service_de_DE_Component msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{D8034CFA-F34B-41FE-AD45-62FCBB52A6DA}\InprocServer32\Class = "MonacoPreviewHandler" MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.m\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f}\ = "{D8034CFA-F34B-41FE-AD45-62FCBB52A6DA}" MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\ELEVATION MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.clj\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.155.77\\psmachine.dll" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\Launcher_ValueGenerator_pl_PL_Component msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Drive\ShellEx\ContextMenuHandlers\FileLocksmithExt\ = "{84D68575-E186-46AD-B0CB-BAEB45EE29C0}" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\SystemFileAssociations\.bmp\ShellEx\ContextMenuHandlers\ImageResizer\ = "{51B4D7E5-7568-4234-B4BB-47FB3C016A69}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{09F4E6FE-F1D3-4E5C-B4CF-25D9C378961D}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.msdax\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\.swift\shellex MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\Launcher_ValueGenerator_zh_CN_Component msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\ProgID\ = "MicrosoftEdgeUpdate.CoreMachineClass.1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\QoiPreviewHandler_nl_NL_Component msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\powertoys\components\Launcher_Uri_pl_PL_Component msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine.1.0\CLSID\ = "{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3704 MicrosoftEdgeUpdate.exe 3704 MicrosoftEdgeUpdate.exe 3704 MicrosoftEdgeUpdate.exe 3704 MicrosoftEdgeUpdate.exe 3704 MicrosoftEdgeUpdate.exe 3704 MicrosoftEdgeUpdate.exe 2240 MsiExec.exe 2240 MsiExec.exe 4124 msiexec.exe 4124 msiexec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe 1204 PowerToys.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3520 taskkill.exe Token: SeDebugPrivilege 3704 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 3704 MicrosoftEdgeUpdate.exe Token: SeShutdownPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeIncreaseQuotaPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeSecurityPrivilege 4124 msiexec.exe Token: SeCreateTokenPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeAssignPrimaryTokenPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeLockMemoryPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeIncreaseQuotaPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeMachineAccountPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeTcbPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeSecurityPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeTakeOwnershipPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeLoadDriverPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeSystemProfilePrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeSystemtimePrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeProfSingleProcessPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeIncBasePriorityPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeCreatePagefilePrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeCreatePermanentPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeBackupPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeRestorePrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeShutdownPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeDebugPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeAuditPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeSystemEnvironmentPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeChangeNotifyPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeRemoteShutdownPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeUndockPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeSyncAgentPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeEnableDelegationPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeManageVolumePrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeImpersonatePrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeCreateGlobalPrivilege 2636 PowerToysUserSetup-0.78.0-x64.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe Token: SeTakeOwnershipPrivilege 4124 msiexec.exe Token: SeRestorePrivilege 4124 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2636 PowerToysUserSetup-0.78.0-x64.exe 1204 PowerToys.exe 1728 PowerToys.Awake.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1204 PowerToys.exe 1728 PowerToys.Awake.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1204 PowerToys.exe 1632 PowerToys.FancyZones.exe 1632 PowerToys.FancyZones.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 2636 3172 PowerToysUserSetup-0.78.0-x64.exe 91 PID 3172 wrote to memory of 2636 3172 PowerToysUserSetup-0.78.0-x64.exe 91 PID 3172 wrote to memory of 2636 3172 PowerToysUserSetup-0.78.0-x64.exe 91 PID 2636 wrote to memory of 2208 2636 PowerToysUserSetup-0.78.0-x64.exe 96 PID 2636 wrote to memory of 2208 2636 PowerToysUserSetup-0.78.0-x64.exe 96 PID 2636 wrote to memory of 2208 2636 PowerToysUserSetup-0.78.0-x64.exe 96 PID 2208 wrote to memory of 3520 2208 cmd.exe 98 PID 2208 wrote to memory of 3520 2208 cmd.exe 98 PID 2208 wrote to memory of 3520 2208 cmd.exe 98 PID 2636 wrote to memory of 2120 2636 PowerToysUserSetup-0.78.0-x64.exe 99 PID 2636 wrote to memory of 2120 2636 PowerToysUserSetup-0.78.0-x64.exe 99 PID 2636 wrote to memory of 2120 2636 PowerToysUserSetup-0.78.0-x64.exe 99 PID 2120 wrote to memory of 3704 2120 MicrosoftEdgeWebview2Setup.exe 101 PID 2120 wrote to memory of 3704 2120 MicrosoftEdgeWebview2Setup.exe 101 PID 2120 wrote to memory of 3704 2120 MicrosoftEdgeWebview2Setup.exe 101 PID 3704 wrote to memory of 1412 3704 MicrosoftEdgeUpdate.exe 102 PID 3704 wrote to memory of 1412 3704 MicrosoftEdgeUpdate.exe 102 PID 3704 wrote to memory of 1412 3704 MicrosoftEdgeUpdate.exe 102 PID 3704 wrote to memory of 2764 3704 MicrosoftEdgeUpdate.exe 103 PID 3704 wrote to memory of 2764 3704 MicrosoftEdgeUpdate.exe 103 PID 3704 wrote to memory of 2764 3704 MicrosoftEdgeUpdate.exe 103 PID 2764 wrote to memory of 624 2764 MicrosoftEdgeUpdate.exe 104 PID 2764 wrote to memory of 624 2764 MicrosoftEdgeUpdate.exe 104 PID 2764 wrote to memory of 2052 2764 MicrosoftEdgeUpdate.exe 105 PID 2764 wrote to memory of 2052 2764 MicrosoftEdgeUpdate.exe 105 PID 2764 wrote to memory of 3280 2764 MicrosoftEdgeUpdate.exe 106 PID 2764 wrote to memory of 3280 2764 MicrosoftEdgeUpdate.exe 106 PID 3704 wrote to memory of 4436 3704 MicrosoftEdgeUpdate.exe 107 PID 3704 wrote to memory of 4436 3704 MicrosoftEdgeUpdate.exe 107 PID 3704 wrote to memory of 4436 3704 MicrosoftEdgeUpdate.exe 107 PID 3704 wrote to memory of 1088 3704 MicrosoftEdgeUpdate.exe 108 PID 3704 wrote to memory of 1088 3704 MicrosoftEdgeUpdate.exe 108 PID 3704 wrote to memory of 1088 3704 MicrosoftEdgeUpdate.exe 108 PID 1760 wrote to memory of 2648 1760 MicrosoftEdgeUpdate.exe 110 PID 1760 wrote to memory of 2648 1760 MicrosoftEdgeUpdate.exe 110 PID 1760 wrote to memory of 2648 1760 MicrosoftEdgeUpdate.exe 110 PID 1760 wrote to memory of 4920 1760 MicrosoftEdgeUpdate.exe 113 PID 1760 wrote to memory of 4920 1760 MicrosoftEdgeUpdate.exe 113 PID 4920 wrote to memory of 3224 4920 MicrosoftEdge_X64_122.0.2365.59.exe 114 PID 4920 wrote to memory of 3224 4920 MicrosoftEdge_X64_122.0.2365.59.exe 114 PID 3224 wrote to memory of 4648 3224 setup.exe 115 PID 3224 wrote to memory of 4648 3224 setup.exe 115 PID 1760 wrote to memory of 4268 1760 MicrosoftEdgeUpdate.exe 116 PID 1760 wrote to memory of 4268 1760 MicrosoftEdgeUpdate.exe 116 PID 1760 wrote to memory of 4268 1760 MicrosoftEdgeUpdate.exe 116 PID 4124 wrote to memory of 2240 4124 msiexec.exe 119 PID 4124 wrote to memory of 2240 4124 msiexec.exe 119 PID 4124 wrote to memory of 1564 4124 msiexec.exe 120 PID 4124 wrote to memory of 1564 4124 msiexec.exe 120 PID 4124 wrote to memory of 1564 4124 msiexec.exe 120 PID 2240 wrote to memory of 4568 2240 MsiExec.exe 122 PID 2240 wrote to memory of 4568 2240 MsiExec.exe 122 PID 4568 wrote to memory of 1204 4568 PowerToys.exe 123 PID 4568 wrote to memory of 1204 4568 PowerToys.exe 123 PID 1204 wrote to memory of 1604 1204 PowerToys.exe 124 PID 1204 wrote to memory of 1604 1204 PowerToys.exe 124 PID 1204 wrote to memory of 1728 1204 PowerToys.exe 125 PID 1204 wrote to memory of 1728 1204 PowerToys.exe 125 PID 1204 wrote to memory of 3396 1204 PowerToys.exe 126 PID 1204 wrote to memory of 3396 1204 PowerToys.exe 126 PID 1204 wrote to memory of 672 1204 PowerToys.exe 127 PID 1204 wrote to memory of 672 1204 PowerToys.exe 127 PID 1204 wrote to memory of 1632 1204 PowerToys.exe 128 PID 1204 wrote to memory of 1632 1204 PowerToys.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\PowerToysUserSetup-0.78.0-x64.exe"C:\Users\Admin\AppData\Local\Temp\PowerToysUserSetup-0.78.0-x64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\Temp\{BF8225C3-7646-42F0-8ED1-DBE2AA08FB4A}\.cr\PowerToysUserSetup-0.78.0-x64.exe"C:\Windows\Temp\{BF8225C3-7646-42F0-8ED1-DBE2AA08FB4A}\.cr\PowerToysUserSetup-0.78.0-x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\PowerToysUserSetup-0.78.0-x64.exe" -burn.filehandle.attached=512 -burn.filehandle.self=6563⤵
- Adds Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Package Cache\CEEB2F4674AB44E9EBCE9175CE716612D979979C\terminate_powertoys.cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM PowerToys.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Package Cache\F7119E3AB3D5CB3ADCD9A57F0EC227F783695819\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Package Cache\F7119E3AB3D5CB3ADCD9A57F0EC227F783695819\MicrosoftEdgeWebview2Setup.exe" /silent /install4⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU562A.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"5⤵
- Sets file execution options in registry
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1412
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:624
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2052
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3280
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTUuNzciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTUuNzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MzkyRDI4N0YtNTExQS00M0NBLTgwRDgtNzU5MzEzMUNGMDAzfSIgdXNlcmlkPSJ7MjJGQTkyNEMtQTgxNy00MDI0LUI4RjQtN0I4QjA0QkFEQTFBfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins4RUJCMUI1RS0xRDJGLTRCN0QtODlEMy0xOEU3NzlGNzhEQkR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTQ3LjM3IiBuZXh0dmVyc2lvbj0iMS4zLjE1NS43NyIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSIxNjQxIi8-PC9hcHA-PC9yZXF1ZXN0Pg6⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:4436
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{392D287F-511A-43CA-80D8-7593131CF003}" /silent6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.exe"C:\Users\Admin\AppData\Local\PowerToys\PowerToys.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.AlwaysOnTop.exe"C:\Users\Admin\AppData\Local\PowerToys\PowerToys.AlwaysOnTop.exe" 12043⤵
- Executes dropped EXE
- Modifies Control Panel
PID:1604
-
-
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.Awake.exePowerToys.Awake.exe --use-pt-config --pid 12043⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1728
-
-
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.ColorPickerUI.exe"C:\Users\Admin\AppData\Local\PowerToys\PowerToys.ColorPickerUI.exe" 12043⤵
- Executes dropped EXE
- Modifies Control Panel
PID:3396
-
-
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.CropAndLock.exe"C:\Users\Admin\AppData\Local\PowerToys\PowerToys.CropAndLock.exe" 12043⤵
- Executes dropped EXE
PID:672
-
-
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.FancyZones.exe"C:\Users\Admin\AppData\Local\PowerToys\PowerToys.FancyZones.exe" 12043⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632
-
-
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.PowerOCR.exe"C:\Users\Admin\AppData\Local\PowerToys\PowerToys.PowerOCR.exe" 12043⤵
- Executes dropped EXE
PID:4860
-
-
C:\Users\Admin\AppData\Local\PowerToys\WinUI3Apps\PowerToys.Settings.exe"C:\Users\Admin\AppData\Local\PowerToys\WinUI3Apps\PowerToys.Settings.exe" \\.\pipe\powertoys_runner_c5db4fa1-4af2-417a-8699-86abf5755874 \\.\pipe\powertoys_settings_c5db4fa1-4af2-417a-8699-86abf5755874 1204 system true true true false false false false3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies Control Panel
PID:4056
-
-
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.ShortcutGuide.exe"C:\Users\Admin\AppData\Local\PowerToys\PowerToys.ShortcutGuide.exe" 1204 telemetry3⤵
- Executes dropped EXE
PID:3140
-
-
C:\Users\Admin\AppData\Local\PowerToys\WinUI3Apps\PowerToys.Settings.exe"C:\Users\Admin\AppData\Local\PowerToys\WinUI3Apps\PowerToys.Settings.exe" \\.\pipe\powertoys_runner_34b606d6-1fde-4e3f-8dae-671ff92dd7d3 \\.\pipe\powertoys_settings_34b606d6-1fde-4e3f-8dae-671ff92dd7d3 1204 system true true false false false true false Dashboard3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies Control Panel
PID:4068
-
-
-
C:\Users\Admin\AppData\Local\PowerToys\WinUI3Apps\PowerToys.Peek.UI.exe"C:\Users\Admin\AppData\Local\PowerToys\WinUI3Apps\PowerToys.Peek.UI.exe" 12042⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies Control Panel
PID:2232
-
-
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.PowerLauncher.exe"C:\Users\Admin\AppData\Local\PowerToys\PowerToys.PowerLauncher.exe" -powerToysPid 1204 --started-from-runner2⤵
- Checks computer location settings
- Executes dropped EXE
- Registers COM server for autorun
PID:4484
-
-
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.exe"C:\Users\Admin\AppData\Local\PowerToys\PowerToys.exe"2⤵
- Executes dropped EXE
PID:4164
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTUuNzciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTUuNzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MzkyRDI4N0YtNTExQS00M0NBLTgwRDgtNzU5MzEzMUNGMDAzfSIgdXNlcmlkPSJ7MjJGQTkyNEMtQTgxNy00MDI0LUI4RjQtN0I4QjA0QkFEQTFBfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntBNDBBQ0YxQi02ODc3LTQ0NDQtOTIxRC1DODc4MjhBQjcwNUJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMDYuMC41MjQ5LjExOSIgbmV4dHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZT0iLTQiIGluc3RhbGxkYXRldGltZT0iMTcwODk1NzgxMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:2648
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{955EDCA4-DC19-4A68-A7CF-C0114E9BD1C0}\MicrosoftEdge_X64_122.0.2365.59.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{955EDCA4-DC19-4A68-A7CF-C0114E9BD1C0}\MicrosoftEdge_X64_122.0.2365.59.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{955EDCA4-DC19-4A68-A7CF-C0114E9BD1C0}\EDGEMITMP_97F77.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{955EDCA4-DC19-4A68-A7CF-C0114E9BD1C0}\EDGEMITMP_97F77.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{955EDCA4-DC19-4A68-A7CF-C0114E9BD1C0}\MicrosoftEdge_X64_122.0.2365.59.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{955EDCA4-DC19-4A68-A7CF-C0114E9BD1C0}\EDGEMITMP_97F77.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{955EDCA4-DC19-4A68-A7CF-C0114E9BD1C0}\EDGEMITMP_97F77.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{955EDCA4-DC19-4A68-A7CF-C0114E9BD1C0}\EDGEMITMP_97F77.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff67ea369a8,0x7ff67ea369b4,0x7ff67ea369c04⤵
- Executes dropped EXE
PID:4648
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTUuNzciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTUuNzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MzkyRDI4N0YtNTExQS00M0NBLTgwRDgtNzU5MzEzMUNGMDAzfSIgdXNlcmlkPSJ7MjJGQTkyNEMtQTgxNy00MDI0LUI4RjQtN0I4QjA0QkFEQTFBfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InszNkNDNUNDRi04NkNGLTQ2MDEtODg3Ni1CN0ZDMjc1QjVCMEF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMjIuMC4yMzY1LjU5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iNiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5Njc1NyIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjM5MCIgZG93bmxvYWRfdGltZV9tcz0iNjI5MDQiIGRvd25sb2FkZWQ9IjE3MTU0NDEyMCIgdG90YWw9IjE3MTU0NDEyMCIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iNjE3NzciLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:4268
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 736E496E7AC7984623F618AD6F12DD342⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\PowerToys\PowerToys.exe"C:\Users\Admin\AppData\Local\PowerToys\\PowerToys.exe" --dont-elevate3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B9119F1A5A512B7290798C08AF10B6082⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566KB
MD52ce6241048cc1bf228a1038af30ed53e
SHA12f58ed6b2ae242fb6ef8ca7897b1a8587369aa8f
SHA2569ebe3530a22756c3d81cc6ca81e2f76c270fae956b775065e9db40e464e17133
SHA5126c8a5d1ec7f0d5c00ac442d1fce71da8fec34a40b3088930059ef921e0054b0bbe191b3f73cc1909311e39df7b80241d4e1701da1427f6fab7c7984ca9898138
-
Filesize
4.3MB
MD5fecf83711c18940e2cee867109a70aa1
SHA1880480ed53512011d0fb2453968e7a77a42f92d1
SHA256b61c941ead985bba25ccbea7619423395a0d01a035f5ff96ebbb63f6dc1a6d13
SHA512608f31ec073f5c4d049e92c0dfd9d2bb7c4d05f71236d8a0ffca3ac195508f98f8eb7b3e6092daa38a9c3637ea9ac588f0de6dee4cb26e6151b26616d678ed66
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\122.0.2365.59\MicrosoftEdge_X64_122.0.2365.59.exe
Filesize2.2MB
MD56f8061cf4d1b7673aa307961ca414327
SHA15e0dac73b7a4d4fc0e823d9aed3702c78fdfa2fa
SHA256ed1539ad419b035f5305524fb1d55e8e06d83f2d93252641046fdf07be2244b9
SHA51296b93d04df75219803d619e614bfc67716c2d3236ccb1a2fc16a9b4590c01da6b207e4d0eff60ba6b15dc00eaebdebcd9de6d6019eb740a0b79318a847ccd1c6
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
160KB
MD5cf9a26b458293978a908536927ec327d
SHA1e8b293e3799f352921c7f430648c21f79e47b052
SHA2564faa7cd71e234433f684c3d70efbfb1ada8d4172fc55caf78c0705e5646b0ba9
SHA51254447d830595fd5e4cb8ff60e78916b676f983033397932fc0ff402cc310771d9e448cebdb1bcae6e0dd3d90c8968df01171ac52a1e14a36eda950f67909e714
-
Filesize
209KB
MD50032498af2ebc50357cb31f1024c87fb
SHA19818522c47ec379ff7bddf92ea72cd831691d094
SHA256c6bdf041b02561700c71c6275df4704a52d1fed4ba6a1bec98a602c6c325d6e7
SHA512f83fc43ca54e87a67d949666ca8c30721f372312042be978b01dcdccd530ce5db4d3d9d6ddc934a92c079825b91fd988f362cd481dd87fa09ddf2cfac85c05c3
-
Filesize
204KB
MD5cbb1acbff5a8ce79804e687be8e3e75e
SHA10bb50f813e08ff13d637a8f4ee66e4c0f1fb01ca
SHA2566d483505a0c9fd508ef48323099e2c64fce025e4b018df1d80d60aa00d8fb004
SHA5127f4a8df19f94c74b1898109804f4ec596abe32ff59d35279e58b139cf3210f6faa2697eca422435a193f4f2f90535187fcd233a018a54a0cfc426ced25de5ce8
-
Filesize
241KB
MD5f70b0fc2f46f5e7082817a11c39e3c54
SHA19939591b236bdd16ea02e79eb11a2d6fefe2af44
SHA256f6e636cfe7c53c120d834756f52ab407f1c5dc97c27a14e557f24c176e86d87f
SHA512b8bde38507eb84725aad9b7ffa33eae462fe6c7779f7ba650453b10bc9b52128198c4e29a568b0ba865fe266c19af81efc3f62a7ffd68e38e9d403d71b1afd79
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
832KB
MD52dee8d159922d4b63c2662d65b4e191a
SHA10fb2cc41f82f476db096546ceaa4b3b007412aa0
SHA25686bafa310ae193c792545f527365f83d3f3ac11c37aea821748a5d9c35cefbd4
SHA51220c00636e4f78ed8bffa274264ed9aadedbb32ae11b34526506f16b8007830f07d0650a657c62f09f7943d71ce43723d88cd04ffeadca488f48b59c7931cc7e3
-
Filesize
768KB
MD515adcb5da69942b2bbded2883119f813
SHA1dad1459fd3a637aec6ed8014cc062164ed8b6cf2
SHA256cb69ba7a63fb8fffe73a455e0c04b39bef7f19b451412f96a245d38c9aed8657
SHA512970b04ff4846e34d8ab7fe7e89e0510b347d739b41bb89b3bd02cdeeee8c58696a3a0d344fb9b661b3dfcee2107e53b2a81c8d5c9e93dba3c1ddadf41b53474d
-
Filesize
27KB
MD50d8ca15cd08112472d8f725b9d26f400
SHA16082361001436a4d2c45babb755601a19bc58a10
SHA256a36ec679129d8fa6e3f56b37c88e7d3406bb4d6d74e559e5a272ac8f34a812f4
SHA5128ec03222c8a023fba580a309a487e4d9535cded212ce47aaf3d7f4cda250c99ce25417330e0508b0a306e0ba14f9451cda0a31c550fdf0ec92c192792af1e23b
-
Filesize
23KB
MD55b981b86b65935bae5fe5805660c7302
SHA11107f5a6b8bb4ed1e95f621fbb7b236d6a57e11c
SHA256bd380d64f5b9dd6bd979a78e912f1a3d2a7c08eda3418abc85d67c43c8477264
SHA512d00f6d92f0efa0c89ee042abcb8b583097cd173d80b8009fc9dcda98a25c73edab970d607b4993831577812335db49dd3d76dba64a4cd6adc7b57494f0f78766
-
Filesize
25KB
MD55e9ba26ad6068d5b12ee2ebd74d66c03
SHA12081cb86bbc6e20965b147f4178990f4c9ba52e7
SHA2566fc47a7fefb2ea88371b5e1ea84b24faaff6d4ccb503e6d9903b8301d16715e6
SHA512ab2eb6ae054cc107b83d877fc44dd62380c4098fbb805033c1d1f87d7172384c4cb7482d1f8931ad5f5b7dd181f6239748497e4b5866c2f406c310c6837028c4
-
Filesize
27KB
MD530a0dfc5374347d838199254ef2b27e1
SHA1739c8197c111eededbdfb8e1940e63188bd8c5be
SHA25692cc3b354e786d428ab3bb43c77119b81a2960b00bd9d99550639a8b5c0428b6
SHA512b8611af4595eea99fb45653f6419235368075664721c467753cedd3b71507a28e0d6c5fb2c4b3e01db56d4842c043b14e20ac1ae7c225e7d678c77befdfccd1d
-
Filesize
28KB
MD5da1dd46046721726b57bab405c7b7c49
SHA1f42267672f7112d772feee601d2add8346a0a89d
SHA256d699ca97e2bc94f0ecc95b2ccefed201786535e7ada3fd6ccb543f42cfc273b8
SHA512b71909c7df499a702b199b87a96d7f25fcc82a0dcbe1138e900b3f386a6204d1b95e37941f32f61a0a558ce2b514f938b0029c55da0e4955229863d8b4b40061
-
Filesize
28KB
MD59fbe7d6ef07bd3af76a9fc97dfd90e95
SHA1300ea110b9ec0ef6c754950ff4dd59dbfc9f2b23
SHA256fef5f9a3ac4626f756b28f6304dc5e5e50bff553930ff35d6b8429ee494b4313
SHA5120df3f0af13d5ed4291ba179846a741149807e073c767b90ab5fd50449879429de6dd2b43954b3a52d3cc77ef4c98dc9efcd594c17784b48c97bf5bdccc90cc97
-
Filesize
28KB
MD5583c93b26e5dcd4bab07f7d303ebf5c3
SHA1439e6d4762c2a3593512ff103a8ff32110fd0da3
SHA256c0bb2e9167995db0d8f1f69a202ba00529e2ead8daeb29fcb99d42b0613efb2f
SHA512aafbc518e596969d20327a2b860b63013b1d5bb7c89faacff0ba95a9f6bb160dffd5a0058475ec1ba2c5d07cfd8cd4a0cffe4bb89bd4bb74b3e5981d6beec414
-
Filesize
28KB
MD5fef17d66629715ae8ce4ab00464152ca
SHA1f62db519180eaaec0d62f56bf1dabcf353583aa6
SHA2562ee6f8216f4953f3101de9578b392e2de94d59a79d08cbdd327b3d433f2b70ee
SHA51298b2647b3bbb2476371fbf9329fad70934bcc7e1f958e925bbfca17a7083e47a5561db986d260025c339b051f7f00bcaaff938ff351032b95075bcc589b7255c
-
Filesize
27KB
MD5c359759bc31042b62167a40c7c0203b0
SHA121140ceadd92ab23835c0e7a8f2e2fb95d0ccbdf
SHA25643fe0258ad799cae8bb20f23c20d74fbbb4b650b97b1b5b737d1d1728556d897
SHA5121d5837ef553223ac09e93df362da460002fb4f9eccc19120c4fb8c29cd453139a3cef54e9514217ac2d862a423d7a82f3e3d9b09f00c611cb16f19dfbe90979f
-
Filesize
28KB
MD55928df4290e3b6e8676a5aac6ddbbc31
SHA1d83b71bc4b37c3b228b113239506f89761a55f7b
SHA256ac5f350f4dc790f61135186c113bb2b8a78f26dab322ddb86b0e3403ab960721
SHA51290113cfe50355d6df04382ee69db6ddad1651e771d0182e28d0d3de3d1d5a2f10d22d5de2b54e12bff1fa5d478513c881e9cfceb2b471746fa870516aa3d0e69
-
Filesize
28KB
MD5c2cc0764c763cd30ab629173ad2c9fdd
SHA10e681669c04e102a4b031378b38c2645dd42bb3e
SHA256f3b266910a5bc6f738c154cb6a754cb55df05ad7f01cd6d61cd6e0cc8927455e
SHA512f54ac389ea62f4c4af5cfd727be094d43976c53a84a1df4313fa5c81bdd9f7038ec9b13832abda95d6f496956383708b3828f41e4b746ebf645dbc343f6568e6
-
Filesize
27KB
MD5ebe48b47180b491688ec519a8d9bef73
SHA1bd98b11dbaef493968d999c22e2e35fdadcc51b2
SHA25602aae7715ad305977f316b9c80989ec63371c4c3e813b64252fe5f92143201d3
SHA5127b2b7204505d73ce66ad070bd31a7790dc56ef071bd233b7be3eb1ecf82a9cc30a605c0524c707d10a9828849de69a7169f8af5b7ea1c4da797deba89bcafc20
-
Filesize
27KB
MD5909c5c6afa14ee9756a4291077f2359b
SHA1819e5e4f3197a6f45b5ce461ebda5b8dcf5a9a8f
SHA2567b0b45ab3f199a316d33be841867e0e5219db63174efb5e6d9866816a3faf770
SHA512a7b75854111e769dbfc0fef86e6561aff12b883c34cd91d15a2f209c68d76412670e9ca732ca159bab42176a4c3f1d9707f8e9db5e21143c15d13eafa1381d54
-
Filesize
27KB
MD5764d47b36dc060e15414e850c974b983
SHA14cd0ef1c6a951c50844e441a3673de505aa38004
SHA2563fa89372d50cee57a316e279bb092287fad67ec1f47cc8f75178a985f43b5cd8
SHA5129017d3ddc85a919fd1ad5ae182c2e4f1194eeadea98f185a158b5c424b7730f30f10b18ca902cbbbc83d6567033d79327c7b1efa89d36b55b9066a8785530984
-
Filesize
29KB
MD524068ddcee174136374b56b4148678af
SHA1604ed94670081d22a50436076d813f3f09d71e10
SHA2568480fd2d3c59530bcb1fa9a07de57f354d4222155d928d1784cad51dce9e30e2
SHA512f8969cd5d3d34c2b1b1be9cc62d5e33cd7798ceced2ecb173c4c01fea3fdf72eac91bb533a7b2ccee6fcae5ae00c56c5f945de70c003ff30838c62a211a837fc
-
Filesize
29KB
MD562a99787a2c037f72588c10af0a4f97b
SHA1376981b7ab0da3a63dd324fb679046c1e2fa2542
SHA256b2b41c07abdc47d8670ae0f0c109450de99e95888cc2a1589bb526ab5c6204dd
SHA51223c9eae2398adc8ebd15ae8067d528650612d2ed7afc3378bf7bf86453139ae1ec77283f15c1872f553e9461cfef4a5b0b4e7111b86124f628f19ab1e4cf6251
-
Filesize
26KB
MD58816264aa944a8f17e3080af13badfe5
SHA1a200bdac7ddd6e52dff02530bdb6bcaa7c0ec271
SHA2566d059098bdc372b4cf14b3bde4832ff2c68e4012fe5bf6bfdc08a39c5f746178
SHA51289eb5ce3df70977d257f8524df8fa3f3f45432e7d9000db371f228f0d574b7dd844682eda7cd8a511d44bcfc4731dfad053db86ad5570abbb6d9a7db103e9bfa
-
Filesize
26KB
MD5c4e594d01bdcefcb1b71f06697e13c89
SHA126a90b0912332fde26451e2efbbed6bd8c4bd02c
SHA256a1be434cb4d92a01fa3b43c1967f254be29dcaa25ceeb6cb13fed711f90b81ff
SHA5121d0a1cfc7c8e10bc6b2cc9dcf6db0e204877439fa4cde26e6b1464cedb35676e67416956ca1b2873a10f0ab00a6049d000097c254ede77b06b1f329c34f17d0c
-
Filesize
27KB
MD5a3a5c7c28cdbe9ff4df338f6f9718944
SHA14c73b46b2076a16f8b21257865ce8b3d9ca94263
SHA256c2eda53aad3225b73496c9eec5f933d902dc9a3e7c90530f77b5bbfa269ae09a
SHA5121db7979e99b207f7c31a5db1cdcb76f6738c622c9c9146ae07a232c40f3dd2232f031c295d802bd3472006cd384ae7739ad6afd47fc31984b2101c6a2a0ecf8e
-
Filesize
27KB
MD50444405f398facffb9ac93c90bd61a80
SHA11fe865393a4a9967966ed4310f342280b6c9487c
SHA25683a11402bb26ef3a58c1bdf550a34faf76758a8a84b423a6f0a94a9692fb584b
SHA512a5df3e52a4169acb1c89b060e09fe5e6c18fdbd0c597c8b55e843895dc8433f5804613dfd2f4a16d656593effe62a8821742b6226abaffe9c2480b9b9da0de25
-
Filesize
26KB
MD5657c0184668515f256a8011c162f0bc1
SHA1ef56129d4edaffd59342ac2e94be2c570f44d23b
SHA256453597b38cb5e06b4596d8ad3763b08cbcd806fbcab0228179b40c065a7523fa
SHA5129340c5eebab4376b7fafd32985ce625f808311ab58d028c246095804c8022bf6e7e7dbc366974e5b80bb4117558ec566c1d40839ae451277d97cf8626693b223
-
Filesize
27KB
MD5b12325fe45848101245c164385c62205
SHA1a3c8d6938978c30c23534515bcdf45bb27eba40b
SHA2560fad2dc2ec7c313cace9afac3e645ed0b0d34df468a6f51450b15ab71793c3c4
SHA5121f5e63aa4061f9b1ea9f7fd3e092d8d978df6c34416e4139f7a7eacf8976ef8a5dc1b89a69e276e6e02d7b15f4ab50a2b958c98585563cd51a582561f1f6ad93
-
Filesize
26KB
MD58ac4c8e4072943915105e358f3b53193
SHA10badce4b142c3ee14ac906bf6be7d19f4af46641
SHA256abe601ab7930302cd675f3ad1582b9fea3837166e74f23f24765eabb7ae86d1f
SHA512267795330e1b10e29d4a7e54af14f3f621a612eb9b2bbd336cb2eec3e4feee29baa9e87c08136cafda891a3729aec4669cf55684d27f950695195bc20ee752ef
-
Filesize
27KB
MD50b6513b1eeb7193ec6561ee4c82f0315
SHA1fb5a8b42698aa4250179e5070422fd8adbfa9e6e
SHA25646c2c90780924935d4213ece24151f07e63d6c1dca4d99ac0542967a56ee9f03
SHA51237dbba2e969534dea488a64aed6b9a3e2ccb079b36865dd00f5e60f87699f60e7626ff85861aef2d52398fd95cda1637e39a47e037e26dd6feb26268fbc40ad6
-
Filesize
28KB
MD5c020597034e8e3f1a06744195ac08468
SHA167a9485915cfbac21d4ca172f685448e89bde928
SHA2566ee5908725a1780779a72022a1e0d9bca32a2f027907e7ec1b12a964221dfb96
SHA512d8ee3eb3f810b35dac344828cb920fe5fd0a1c8a17ee72b5a9b7e253b054b7bb43b65d2f1fc4232aac4364597c6fe8cce68e9f2867038661b1421343234a4824
-
Filesize
29KB
MD54df8d16f45846075e652ca9b701faaff
SHA1a605eaa6cf9fd4ff2e46aae331d48cbda1e50102
SHA25603d31c89ff1512a0671390151d0f30015fa445ba45364cbc4dd6fcef07198d37
SHA5123ef64490fce1702632557a7ddc24363620ca272e8b61e48c1f2b74374db83b52a59f156cdb019e0205d0d6096ec9fd73a15183eed2e3e0b8d8acc9b96e3e0690
-
Filesize
29KB
MD55b460959d67d7c7dee8966c7593e2d9e
SHA1bd4e1eb217d319f9367a3134d488eb57ef7456f4
SHA2567c8218e882f0b19291f8088fc1a0e9d8f793465b80b84c282558e19ee349efd1
SHA512c15c161b1cf16e8549675523ab2ba5086e5e090cf7a837f2aef6bbcce201505f9ff2478c774261ddb9f8ff563f8fb41dec0c6d8eee43841ea1fa0455e9b11136
-
Filesize
27KB
MD5807d3b85c91a3a78d857724f6d4df8f5
SHA164fccdca9e003186890c336dc5667455b8055c71
SHA2562a00e20da2ce93516d077fb52db7149b162e5a6b9fbc4b8f7ad442d3e51d3c8c
SHA51266ce1ce09d055676c919f36e31d944e7c4d5bcae0b6343d22b6fd8880602b326f9fa610e7e120daddc99fafa5c8a1818d428fdc6fd206f755e81a56f73b463d0
-
Filesize
29KB
MD50cb26946b22b67acbd2348d25baf1f11
SHA19b74999efbe944089ef779d04d92579b82b4683f
SHA256fe58df1b17fde8184475607bbb4367911c1ca9fdac79f256c001eaed0acb6b0a
SHA51287e9cda95c6cad7f6efcf71068e9ac6c4e73858062079d4d264e7bd2f1e4126948e0d2ab57c9be7ff9f21fa59eeacab477bb455ab06f547aa3c5270fe1192b66
-
Filesize
27KB
MD50a3eea473ed114af963258dfeac97381
SHA155fd6a61fb35eea2a34a831448b4f3a9b7d1fde2
SHA2567ce39b48849e3e33e78e9a39cc84665c33677ad248de27680c67305b4e6fa87d
SHA5128849621aa87728b0fcca0aed5e598019630f91b609214c043d9e7eaec53a39bd95c8cd77e7eb5382ec8231df5f4742a7f59e031d8efb4643ebb4f27bccba0cab
-
Filesize
27KB
MD5d75d2279ebc522f7b88d8e388b55a6bd
SHA1ae532f5cf3630fd164458ee2b9178805c93064d9
SHA256dc9e53b4d5b7cc6ea74effe897b6958b5991ddfbc60baf3ff5af74fc71fc138b
SHA512741fb93967b31091905df55899c33303e80b1273187e296a10e4b85d7f93f53bca55e3f76ef5031d63716615e4c258b11efe19355874cda3624db39b0770039a
-
Filesize
27KB
MD58088a0a302b58718eacc92fb787c74f4
SHA161dbe98e235723d82d7daacfbf3b0512976798e6
SHA256bf81c79c7a6f20e7c5d28d4384129d9d5a61c1df5fcf1e249802e3c979c9d7c0
SHA51241877350e92d46792f78984158557ef3cf78b7def79eb3b917e896e30c7865591406bd0245dc12220275bf4977aa25352e77eec037c46aa713e01a36d070ecfb
-
Filesize
27KB
MD5af2042a5338884a7b07ac78fb14091c8
SHA199c545e0ebbfb382918955519f88fc1a68aba125
SHA25631143a690e4c51859e18b4f9221468042e705817d52170ada0dc1d508c455cb7
SHA5125b00c5730c0233c196043b05ab4462c79b30d181ae7cdafe18713be881e09538b4f58cfa5c0a8c17f31a1b9459100dea3ae1adbee42d77f407b94fb25ed4575a
-
Filesize
28KB
MD52f8083b85f9c4f588cb8843e21077198
SHA1b21d1cdfaaa7b93064659614b3f27c8b4d5ce5ae
SHA2569de51be04b9b01664132c174bc2567fb2fe15ee4b74a6e68c2c7e8c8808ab184
SHA512296a6ce20a253c7e77ce94dbf46ec96b305df153915f96e338df21fc140bedcb9d4ba29b7faaf280a0dc607a870ee96254de9dc469c071c90fdd8c499ee8ef5b
-
Filesize
26KB
MD541ac4e817c88a1fc008a43e25c4d71a3
SHA1ffce205ffb01a54f96b0191b7c15dc3cd769e337
SHA256d4009d52a419b3870036dac6f40202f3670530d574829ad55616d7a00808d9d3
SHA5124d867b4ef9f33d93b67497ab52b826a31c130bb385734a5fc6278aa3b93346cf148713b36fb2eaa0b8f1196109b7975c45cf40ae3a69c1f109a9da2e42d3e0d8
-
Filesize
26KB
MD574d1be37b419bc050be7107d5320b8fe
SHA198d9868042a4671b0a9f5abc17289ce42a685077
SHA2565a379b8d3b188c8f321c4f58c9589a1e8e53dddfadd493fbea84bd14532d8c4e
SHA512e26e0c72b14b835abdecc0185eb4a0c664ab749ab75b178fae687538bfa6607896674900403ce38e5aa594f6e78f1c4bc3c61db49a568fc89c0242c8605af62a
-
Filesize
29KB
MD5cdd173c3f540c2fa198c84657804d969
SHA12278b71961c16c366760c972467d57e11354eb22
SHA256c381989587679bd6e6b90632bfe57c20c987127fe5743dea3ef278745faaaff7
SHA51201fc2e45183932c5b3029f3ee625d6c5fc4449f5f7cff11a963aeaa241fa2a510ba455dc4a408a9a0b0b0f127407983395545d0f8875d9a13ef1f368ddbd15f3
-
Filesize
24KB
MD50ec86b4b2f37b6d19b7f884852730da0
SHA1d39e6b0e1fda1e26b873ca635266b87bf41667fa
SHA256637178fef36bcca7ac50b10091731d86d0b73892d60b98531d21614fed28dc30
SHA512f49f9db37fbc1c47bf614ef391205a1a7da29045dec4f15ecfe38472c62264e5d107181d55b27f471b626fae7b6328ce05e8e60bc61ede271fc4c47804c0a4eb
-
Filesize
23KB
MD502ef894b4b4b6d8c071fffff05f810ec
SHA14c36f9c8a4f5e22726f87402826b69cd29087a9f
SHA256d0b824b90377e1912c349923d3cfc63018bf96f96ad6a46b0fabf5897fb248cc
SHA51299dc3dbb5eded5cb369fa080bb03299e816a51d541069d93982b85f68bd1ff116483d51339d530cc475015510e9186d9794aae0caa389cbc97a63cea2e39dcac
-
Filesize
27KB
MD5df96e9023cdb8cb827703e1fb9c592de
SHA1eda83f777bc404c3bcc0c3eb7a12d5561238ac28
SHA256415ab15b6a48176f3bcd09672de89ecd39684a482c9ee0d45bce366fb3450d43
SHA51223698883a68259ffb36dd932f6b74a2257e8499336a66a41fe0b2a98d6e866a90f4e071f5d41a3942d3e4884a6dd7488b458879f8379fdeb4676edf593226e43
-
Filesize
27KB
MD59022a388f56e7f59270dbd0ec1e36583
SHA19a3103a02938bf873e0398c404b3b6efb27f60d5
SHA2562e54385d95fcbfd998d5d83ac408c0a45af2329930678bc822544a46fd7390fa
SHA51268455fd649d03927eb484b515838c2c5fb24eb8ae1adec80e60f83c5e150bf701b9adb43972e5a9050603af68cdbded152150c5dda5d90b04e2a942d053a7c62
-
Filesize
26KB
MD5a351a85e384b65bb7b5260eda1aac709
SHA19446d97d7d32deef18a9e1c62167747aa316fb35
SHA25648423fa045bd50175e297cd0642335aafa57d16ce4eaba59734f12f88d2d526d
SHA5120dab0dd012c53426feb07ba55dac3d8fbb718e1146b8cc495278b3a432277ecb454d181f48013cc86ee9e26d722c5e070d418a0dc86f9594e0c9a017126ccd94
-
Filesize
27KB
MD55ff19e69a260367c9f4e667d283da5d7
SHA1e54c111fb7a02baadec488c358297a877aaeccd3
SHA256c5fe72e4bf6ec76ba7f4d14374a2b15873de9a5815227ffb303a0b165dfe790e
SHA51217a4f5a6e927146dfb3690d8e5cae29bb898299953734b1c1d8391c38106dfa96dca0246dff83b2bfabf9840661828fa7131df74a69b1ccd1470ce01f07fb99f
-
Filesize
22KB
MD57a79d9fb7cb385c79c5cd7fee302d9d2
SHA10c2ec8d27c8faaed1a184929e92dccd1182b0e32
SHA2569463457928689d87aa7a52cf5a205bb8bc67c0f94eeeed681715125582cbc2df
SHA512224a3a960577afdbe47bfb42fa6059314ae16cf26686421603d1276bfa3bdcf58a9a26fc6dca298f9ff2f6e190a3008edf8a614d28cc354a8bc253b65b180d95
-
Filesize
26KB
MD5ec003a7505d58aa0ec231415267c97ef
SHA143f4ce1a7c859b571042f2f23cc6a758ed806c95
SHA256eb324b717e98ab6f47eaa65a7ba9e0e7ef9c7563fd05613ec149eab121edf86f
SHA51220f61759938ed69df7b40628587915dea21e2ded3c9901ca9334b6add5f21995afd8d90ce7e290b6b51b9418395f526acca90f8071b6564f85a08d1253031bfc
-
Filesize
29KB
MD57e830cc3d425a9d58f47b67f0c0284eb
SHA1e7535444087b1c43f2414385bf77a59afd4ffb28
SHA2563a99e182cfbae7e5909a7b35408db26ca16d987aeb5f068d0961933a5a4a7a5d
SHA51290995fcb27bd58b9c0d6b08418eb66405ff5287ab9a4b27d08a5183efb54828fd3a9acbabb7aa146a6eb0cfb0c9aa5ce9f32451a35a9e0f5064850cc305f5dc3
-
Filesize
26KB
MD520125fa0aa6057fe9483195d98b53b6a
SHA1b90a5dcd8e65be58c4c8d6276aa1364f4d0d7e1d
SHA256a909ffd028323697edc04d824a9de5e4e69f26fb6c8e9c11b0e311bf5b940d17
SHA512460c0ebb18336391c25a60e99ea0927b36833ca2c91de6fc9cf3f32ac90e7e45527d95f668c03a859d91024ae7ae5372719ebba2e2c7745091b768407e2e4f9b
-
Filesize
26KB
MD591c5d6031932f5d0cfb2778d08d6f63c
SHA19ae092d7b0b189eb24a2d4282f6598577a39eace
SHA256afae45e481b705702da9b8c6b1cc32aef6e1c5df3a876dc8ad8b75fbca8a16ef
SHA512aeb8675a78a48069224d0ce13ef69d2211b96d6e9c7fe75d0560bce03091ef9efdfb085cc616097072dd952e605e73e2493d6b38b03e01e7f8e85987b0e680b6
-
Filesize
27KB
MD547de5673add4c9043d0890e27afb273e
SHA1efddeede2791e5ab1e57c3afd4399b0a439b7497
SHA2566d3918c43a0eee94053e38c9b45dbf572af62ebd076c1317a5af8db10868ee34
SHA5120a61f73b67aee5f980dedf14bad2df4cde19d0cbee83c76932a3936e5d2a9b66c131bb367d74e030ca453a4772d2beb5f72e79f6f3c0bfb9cc4856c3ba26de4a
-
Filesize
280B
MD513c95107f267682a95bcde70ab7181d1
SHA1b1a0a56347e2dfe77356720f4306938c1fb93ef3
SHA256f0f8d089e6bf43e626c12ebbc9414c5f3f5ada41731503d429786778a4189bf3
SHA512922415797a915d3759cb25132a692f1e40deaa3eff7939416312da53f6824818123f06ce51c625a5741a8e6333f82b7876ec90fd76a9356248436d0f13e600a5
-
Filesize
76KB
MD59be9ec15fd071b58e5661726fa7d4438
SHA1c3dafa5752658b0faf17b0e0e9ada26e706f0058
SHA256626687e4218b94e112241afc1ca79cc8fb9606b0248ab4e1dec36d5e5c37d0d1
SHA51289bcbe3fba52b194dc5eb10254f79e7ac29d7cd2e6bb03d9184137e00ecbddd09f26906376fc92d704264545bc4204ffef863d809908f1c20ef3f241ba4de1d6
-
Filesize
7B
MD5afe4405d6bd2dea6178c4d401e155fa6
SHA1819ad2e50a1e779b81e51b7d0912e3e76d83245c
SHA25677f3269d6572eeffdc1677b514f6a98ff3d2eeaa815b54a05eb8d04815336729
SHA5122eb436876e30fd55ec1c31ffe6fab5d1a832288f26e4586dafdccbb5d02fae01f77793c1f12d7ad7723c07739a2f60d2f4ef8c75e1f42dc7ad8476f50eba6e34
-
Filesize
2.9MB
MD52c797c4c60d7476ab01a8af62c13cf69
SHA1a9398e1ef58faf12e4ae8bf987e68ddf854822e1
SHA256d3a78947f6fcdab98bc9ba1bf50ba92ddc2143be2908ae3643da372192c533bc
SHA51242e0d16c9f9807f87cf9d0cf834787f8b85ad7ccc0bc0596b5dd2d028f07cebe98cd4db9225e94f3c0649a379b21f7489aeb815f8e850bbd9faef2c5c74d4fec
-
Filesize
469B
MD5e2f355a3e84e2589d9d69d3033ba5f80
SHA1ceeb2f4674ab44e9ebce9175ce716612d979979c
SHA256c5bded10d9ce53431e12f6806693a67122805f0a2235b373f868799374a353e3
SHA512439a8989d4069c0616dbfe7f9488ece1d173feb234706c45f47e5aa9db98d155974adb6a5e67343f6fe184210f1f581cb3cae08f4ff1142ba9fbcfa03f997ea2
-
Filesize
1.7MB
MD5dbc06aa42fc27fd5fd0b87b2f9067637
SHA1f7119e3ab3d5cb3adcd9a57f0ec227f783695819
SHA25698370211f329f59b97308915790eeae4580a29a88c4285ee43a9f190a16e832e
SHA512100cbfbfb0916e3658d5f8ff748c1c2368ea52f51e3c828425a9f9f2c366bdaf83612d650b93fc6cc4f4bc6d2d24efd841d761c13311cbb9293c4057907b9dd2
-
Filesize
466B
MD513d5246b71ef06b9e87a4e3326425dc1
SHA1bd122b16edb53681c1a490770e55529d1d0db6e7
SHA2565b4b3b67fc753f964a98ece173b953e38bc5b02df74f3d1dbc813cdafb413d14
SHA5126179286073cbb371451525ee2e19e44fa986ae4b015a0a1ae6ae6ec5c3dba1ca391b3806422a987872970a29219275ef93e5af272609863cca342c906889b7be
-
Filesize
1.2MB
MD57b04069ee1146c086fb502e0a43b5a64
SHA1c8b726acd5bc13568b9a81173d4e87289986b965
SHA256d2bd158112beb1266248f2d9d2d3a5f0c729d9d59e5e56609e9c84d02b545b2f
SHA5127697bd6ef6fa4d3b6311c99be9dc4c761fbee1b74126da4360eac5c3008c22319b10a41b5b2a8edf320e6729916f9b12a01ca7aeee3b85640e149d5c62ea8227
-
Filesize
16KB
MD54fcf19f54a4c439b449475c60ff0b6c3
SHA16dc8f76068d97737e39095f50dd764d308224e94
SHA256252646d9c752fde32b72caceff38d0518881024024ae553a123c392eea903393
SHA51283bb3f2d597dccd2229b0e57a23ef232445d45b1eb3e9c9be633d926c1842ea524fa211d8c2570795828fe20ca58ab3c48a23106b93ad60fba9298ae0bf12f03
-
Filesize
199KB
MD5d7c08d519ffb49c4eacdc68511dca380
SHA15769cacd99088d3dd62d86948a3431e2434c267b
SHA256a30db8e010bc129d63e3edc42ec195c9fc803bec0a4748c8a4a7adea199f01ac
SHA51289f0c1d25ff291ec6f02666e0d3952a01ecefc1d15efb4eaf6501c882a349c178e4e03d94aa256ee10f33dcb6d1967accfa04cc17e87e17a553505d392469c09
-
Filesize
1KB
MD53a6fe5cc04be369f7f829b49d693c01c
SHA1e230dc7932de3c576d865213d3564646ff58372d
SHA2562fbe512accf83de3b28d022c08905e6450cd9d67fb12dbf633ae3366b59268cd
SHA512db8d7c1941e6fc4a3227d25023cf97c44b05ae2a4272bbe373c897ddc4b2fa7e0ca35e0a875cf79601ba597a4f93cb022d665d707d085643cc5d24f5368cf18e
-
Filesize
1KB
MD5d2b8493b3c1165de98573eb2d324a8b0
SHA1ab538757b4fc36ee94a240c6394e3c90c9e7bf7f
SHA25630f0c897159cced46d9af091ba98d631602728cae020dc0ae11719f2683baa2f
SHA512b17ec1b1f405506e31980f29ac0019337a10b70479debed21be64bf4388b3d76fd76cb9b6a6000c617e4e00c61ec908de83457f8c7f158c685c01bfdc8093dbf
-
Filesize
433B
MD59847d5befe3aa972b305e7d692c22402
SHA12206e792c42b0130da89d7ff36857cd5c311df33
SHA25682d03a32d62938bff429633f721b44805b042274fa504e20a9318dae13027e06
SHA5121877c33b69f56a3dcf4bd12b11b332a356e6ed68d711cf4e1a4a90021bc7d6b4dc67d4d0ff080ae1e5a0aa97c86f62929b148a432bdd322b617c398c1a4fd258
-
Filesize
467B
MD5af9e1b9f75547fedda7e125bbec5e91b
SHA15f97c0d4d35879c6d310c6a9a7f8936fded1a9ad
SHA256cad9a71e901b64c3226b2376fa5b4df956c1bed047e479284cefaeff270793c1
SHA512217c28d3744ed77290bec1f6e1e37ec5e9e2fe3f4e14d0c1127d099df885b2a41d93d58098c63cad38ef84af124be1379c174a8c2e7a68e4ed1a2eac92f12d28
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PowerToys (Preview)\PowerToys (Preview).lnk
Filesize2KB
MD551f5d0130fd99bfd1d979dd5c871841c
SHA1c0a7c0482f9f6b0ee714f81f4d5983e324cbd591
SHA256f64827c2c35b7e57cc65de6265ef8ab055a95a643dabb06ed623d66f933f0f1a
SHA512be89681d73633dabd7e6a513bf99f61113d658e003b01bb40904b23696f4557da7509f063e95d2066c97cb6c1b9bdba4014b3df024ec10cc9e6a2cda68ab5b48
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PowerToys (Preview)\PowerToys (Preview).lnk~RFe5b222a.TMP
Filesize2KB
MD58c238f078a560404a415e3f20b7171e0
SHA128c2775c1216377442f00a1cc12faa0d9c8c539e
SHA25680a8b017563d98bfd741b604395fe64bb6ab5f0b42999b49ef9cd16baeedbbcf
SHA512a70ccfff75efaf757b5781d2bb682288a4541a3078d74951244db157dba3ca1c7934bd5e0507f8c15aaffbd70bc9ed6fbb4aed6307143756c1e5068d02803a61
-
Filesize
148KB
MD5eecafc54c8fa470babff03f88eb12224
SHA1d9243705183885750219baaf97593ba01db77a19
SHA25695f80b8f436641700f963490662ef09433145f21b38d1713dc9946fb7a51e509
SHA512788a753e1bc46a28a74bf342b1e8af2e63cdfa68f233377570b66d9161928e0523e9de914b9b582f531dd122bb182b542b300b045ccd985d07bb0a70353c183b
-
Filesize
233KB
MD569ce0f47a489fc5ed1980b43bf0eb0e6
SHA13f6d8ceece019812d43a0de767fc7bd72f2ce241
SHA256b29b65905905f7d9279737fad9ee4dbfb9375109ec03c0db2d96e11b031e9a70
SHA512ade5af5a8ca4716eb651d7de0f9bfd9c2f155884a022312fa808439f56b55ac5375dda3b4cd2dcf9af105d99cdc991e74250246f7c600a13b80507859bf43bb7
-
Filesize
797KB
MD5737291aeada46b0de9e2400c4d47ec79
SHA118891039b74397654b61b646ae35c009b62b1d27
SHA256544aff3fd38e069650b5c6e6906d573046d762bd80cec94a0905765d59e7da40
SHA5127d6169781c9c78115ce393afabe7db85ab5f78efd567d5ba5dcebd239eb30bf528b2c9beec807501b3dd5297e0574e8fd26fd8e5a3781ac1882599e68c8de4e4
-
Filesize
646KB
MD5d24fe4694e138b86d57ec179e2dfcd9c
SHA1ce0572380ae3ab9332f238b00d2087e9c13ffa5c
SHA2560c56f5d7fa7ef810567cfbe69b1368ffbad4dea15adff27244799264a0be3f6c
SHA512402ff5e07cbeb4d6650a9c445991421cedb173f9049c79c3649de19f18dd6b7a80bf8bdce1182da895ac556381d9eaec149b77712f0fdc83f4a60a248afe7475
-
Filesize
1KB
MD5807f899993da55765b3615a73a708862
SHA1aaba81806befe73710116a477fd58634755d0f57
SHA256d0f67d8dc4405840bbdef2ef78eed38db08739a773112f16d9edc2cec5f2daca
SHA512394aa7e4d929fac4264a8d9e3fb2066e879a8d58d1709b838b8c00ac044265f8f6a1c2647f15e3e10e031b03af7581e89150527c95cf5376be1b193ad17a0525
-
Filesize
203KB
MD50ba387d66175c20452de372f8dbb79fe
SHA15411d41a7d88291b97fb9573eb6448c72e773b70
SHA2567b3d4a22a56cd80f19c48a321f978f728d34b8227cdc7fcadeb76b7506b2bb33
SHA51213ec6e6ddc602e8053aadd4dd84ed87c23b581f2a41d738e32a522128ca4985dcfcaedc7fab192085f0eb4facd1cd7ad91ccaf8505491e29288d2f66cbf705fd