Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
240s -
max time network
243s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
HaruHost.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
HaruHost.exe
Resource
win10v2004-20240226-en
General
-
Target
HaruHost.exe
-
Size
29.1MB
-
MD5
e2c58ae2a0b8f22aa176e2e492c57784
-
SHA1
eda117740cb4df5dfe5114b3d13257261e4886bc
-
SHA256
f762a2cf752440ddae41f7e6b196394fbd9627be565db1a9c73d311281468fd1
-
SHA512
3a124d0cdfd95729fc49efba37fa019e833979b8ed8b73369bcdaa40c6476d9bba5e53b8bab82f7bdfce6408f7673008759a2bd526581b3c355da0023dafb67d
-
SSDEEP
196608:pkTOppiGuX4jxHgfJ5rWmGlXnY0t5qTEVwDHRdj7Fk9bm:pk6jiGuodqoXYCqTEyDHRdj7FG
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Executes dropped EXE 21 IoCs
pid Process 1768 MicrosoftEdgeWebview2Setup.exe 2036 MicrosoftEdgeUpdate.exe 4536 MicrosoftEdgeUpdate.exe 3524 MicrosoftEdgeUpdate.exe 4872 MicrosoftEdgeUpdateComRegisterShell64.exe 1028 MicrosoftEdgeUpdateComRegisterShell64.exe 4368 MicrosoftEdgeUpdateComRegisterShell64.exe 376 MicrosoftEdgeUpdate.exe 4232 MicrosoftEdgeUpdate.exe 3532 MicrosoftEdgeUpdate.exe 2012 MicrosoftEdgeUpdate.exe 468 MicrosoftEdge_X64_122.0.2365.80.exe 4368 setup.exe 1828 setup.exe 404 MicrosoftEdgeUpdate.exe 2812 msedgewebview2.exe 1896 msedgewebview2.exe 2192 msedgewebview2.exe 2608 msedgewebview2.exe 1468 msedgewebview2.exe 4976 msedgewebview2.exe -
Loads dropped DLL 36 IoCs
pid Process 2036 MicrosoftEdgeUpdate.exe 4536 MicrosoftEdgeUpdate.exe 3524 MicrosoftEdgeUpdate.exe 4872 MicrosoftEdgeUpdateComRegisterShell64.exe 3524 MicrosoftEdgeUpdate.exe 1028 MicrosoftEdgeUpdateComRegisterShell64.exe 3524 MicrosoftEdgeUpdate.exe 4368 MicrosoftEdgeUpdateComRegisterShell64.exe 3524 MicrosoftEdgeUpdate.exe 376 MicrosoftEdgeUpdate.exe 4232 MicrosoftEdgeUpdate.exe 3532 MicrosoftEdgeUpdate.exe 3532 MicrosoftEdgeUpdate.exe 4232 MicrosoftEdgeUpdate.exe 2012 MicrosoftEdgeUpdate.exe 404 MicrosoftEdgeUpdate.exe 1188 HaruHost.exe 2812 msedgewebview2.exe 1896 msedgewebview2.exe 2812 msedgewebview2.exe 2812 msedgewebview2.exe 2812 msedgewebview2.exe 2608 msedgewebview2.exe 2608 msedgewebview2.exe 1468 msedgewebview2.exe 2192 msedgewebview2.exe 1468 msedgewebview2.exe 2192 msedgewebview2.exe 2192 msedgewebview2.exe 2192 msedgewebview2.exe 2192 msedgewebview2.exe 2192 msedgewebview2.exe 4976 msedgewebview2.exe 4976 msedgewebview2.exe 4976 msedgewebview2.exe 2812 msedgewebview2.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HaruHost.exe -
Checks system information in the registry 2 TTPs 12 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\th.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\msedgeupdateres_ga.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\kok.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\nn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\sr-Cyrl-BA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\hr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\ru.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\msedgeupdateres_lv.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\msedgeupdateres_nn.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\fi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\ka.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\notification_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Trust Protection Lists\Sigma\Social setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\cookie_exporter.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\gd.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\notification_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\es-419.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\mip_core.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\VisualElements\Logo.png setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\msedgeupdateres_iw.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\msedgeupdateres_az.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\elevation_service.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\identity_proxy\resources.pri setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\sk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\dxcompiler.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\el.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\kn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\ml.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\ur.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\identity_proxy\win10\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\bg.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\pwahelper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\lv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\nb.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\wdag.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Trust Protection Lists\Sigma\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Trust Protection Lists\Sigma\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Trust Protection Lists\Mu\Entities setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\MicrosoftEdgeUpdateCore.exe MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\mk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\prefs_enclave_x64.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\pt-PT.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\BHO\ie_to_edge_bho_64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\lt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\MEIPreload\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\ru.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Locales\sl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\hr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Trust Protection Lists\Sigma\Other setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\fa.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Locales\id.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Trust Protection Lists\manifest.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\Trust Protection Lists\Mu\TransparentAdvertisers setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\Trust Protection Lists\Sigma\Advertising setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\msedgeupdateres_fr.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\msedgeupdateres_is.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.80\prefs_enclave_x64.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\MEIPreload\manifest.json setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine.dll" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ = "IPolicyStatusValue" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ = "IBrowserHttpRequest2" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ = "IAppVersion" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\Elevation MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusSvc.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.PolicyStatusMachine" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0A5F4B64-7FCB-4C1B-8133-CD01DB52BE83}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService\CLSID\ = "{CECDDD22-2E72-4832-9606-A9B0E5E344B2}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher.1.0\CLSID\ = "{08D832B9-D2FD-481F-98CF-904D00DF63CC}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\ELEVATION MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.Update3WebSvc" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\Elevation MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe\AppID = "{CECDDD22-2E72-4832-9606-A9B0E5E344B2}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 HaruHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 HaruHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 HaruHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 HaruHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 HaruHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 HaruHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 2036 MicrosoftEdgeUpdate.exe 2036 MicrosoftEdgeUpdate.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe 1188 HaruHost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 2812 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1188 HaruHost.exe Token: SeDebugPrivilege 2036 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2036 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1768 1188 HaruHost.exe 91 PID 1188 wrote to memory of 1768 1188 HaruHost.exe 91 PID 1188 wrote to memory of 1768 1188 HaruHost.exe 91 PID 1768 wrote to memory of 2036 1768 MicrosoftEdgeWebview2Setup.exe 92 PID 1768 wrote to memory of 2036 1768 MicrosoftEdgeWebview2Setup.exe 92 PID 1768 wrote to memory of 2036 1768 MicrosoftEdgeWebview2Setup.exe 92 PID 2036 wrote to memory of 4536 2036 MicrosoftEdgeUpdate.exe 93 PID 2036 wrote to memory of 4536 2036 MicrosoftEdgeUpdate.exe 93 PID 2036 wrote to memory of 4536 2036 MicrosoftEdgeUpdate.exe 93 PID 2036 wrote to memory of 3524 2036 MicrosoftEdgeUpdate.exe 94 PID 2036 wrote to memory of 3524 2036 MicrosoftEdgeUpdate.exe 94 PID 2036 wrote to memory of 3524 2036 MicrosoftEdgeUpdate.exe 94 PID 3524 wrote to memory of 4872 3524 MicrosoftEdgeUpdate.exe 95 PID 3524 wrote to memory of 4872 3524 MicrosoftEdgeUpdate.exe 95 PID 3524 wrote to memory of 1028 3524 MicrosoftEdgeUpdate.exe 96 PID 3524 wrote to memory of 1028 3524 MicrosoftEdgeUpdate.exe 96 PID 3524 wrote to memory of 4368 3524 MicrosoftEdgeUpdate.exe 97 PID 3524 wrote to memory of 4368 3524 MicrosoftEdgeUpdate.exe 97 PID 2036 wrote to memory of 376 2036 MicrosoftEdgeUpdate.exe 98 PID 2036 wrote to memory of 376 2036 MicrosoftEdgeUpdate.exe 98 PID 2036 wrote to memory of 376 2036 MicrosoftEdgeUpdate.exe 98 PID 2036 wrote to memory of 4232 2036 MicrosoftEdgeUpdate.exe 99 PID 2036 wrote to memory of 4232 2036 MicrosoftEdgeUpdate.exe 99 PID 2036 wrote to memory of 4232 2036 MicrosoftEdgeUpdate.exe 99 PID 3532 wrote to memory of 2012 3532 MicrosoftEdgeUpdate.exe 101 PID 3532 wrote to memory of 2012 3532 MicrosoftEdgeUpdate.exe 101 PID 3532 wrote to memory of 2012 3532 MicrosoftEdgeUpdate.exe 101 PID 3532 wrote to memory of 468 3532 MicrosoftEdgeUpdate.exe 125 PID 3532 wrote to memory of 468 3532 MicrosoftEdgeUpdate.exe 125 PID 468 wrote to memory of 4368 468 MicrosoftEdge_X64_122.0.2365.80.exe 129 PID 468 wrote to memory of 4368 468 MicrosoftEdge_X64_122.0.2365.80.exe 129 PID 4368 wrote to memory of 1828 4368 setup.exe 130 PID 4368 wrote to memory of 1828 4368 setup.exe 130 PID 3532 wrote to memory of 404 3532 MicrosoftEdgeUpdate.exe 132 PID 3532 wrote to memory of 404 3532 MicrosoftEdgeUpdate.exe 132 PID 3532 wrote to memory of 404 3532 MicrosoftEdgeUpdate.exe 132 PID 1188 wrote to memory of 2812 1188 HaruHost.exe 133 PID 1188 wrote to memory of 2812 1188 HaruHost.exe 133 PID 2812 wrote to memory of 1896 2812 msedgewebview2.exe 134 PID 2812 wrote to memory of 1896 2812 msedgewebview2.exe 134 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 PID 2812 wrote to memory of 2192 2812 msedgewebview2.exe 135 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HaruHost.exe"C:\Users\Admin\AppData\Local\Temp\HaruHost.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeC:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU8ACB.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Sets file execution options in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4536
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4872
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1028
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4368
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:376
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{7DA100AF-7443-4CAA-B8AA-E982DFF921BD}"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4232
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=HaruHost.exe --webview-exe-version=0.0.119 --user-data-dir="C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=1188.1680.30285792355291710952⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2812 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.112 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=122.0.2365.80 --initial-client-data=0x15c,0x160,0x164,0x138,0x16c,0x7ffb35f15fd8,0x7ffb35f15fe4,0x7ffb35f15ff03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1896
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView" --webview-exe-name=HaruHost.exe --webview-exe-version=0.0.119 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1816 --field-trial-handle=1820,i,17478494307114043158,17712658181014357773,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView" --webview-exe-name=HaruHost.exe --webview-exe-version=0.0.119 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=3100 --field-trial-handle=1820,i,17478494307114043158,17712658181014357773,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version /prefetch:33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2608
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView" --webview-exe-name=HaruHost.exe --webview-exe-version=0.0.119 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=3136 --field-trial-handle=1820,i,17478494307114043158,17712658181014357773,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1468
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.80\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView" --webview-exe-name=HaruHost.exe --webview-exe-version=0.0.119 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=3504 --field-trial-handle=1820,i,17478494307114043158,17712658181014357773,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4976
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjEiIHNoZWxsX3ZlcnNpb249IjEuMy4xODUuMjEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7N0RBMTAwQUYtNzQ0My00Q0FBLUI4QUEtRTk4MkRGRjkyMUJEfSIgdXNlcmlkPSJ7QzlCQTVGQzgtMDQwQy00NUM3LTgxNEEtNDMzRUNCNTQ4QzlDfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NzIxNzJGMEMtN0YwQi00OTcxLUFGQTMtQzdBNEJDODgyRkYyfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMDYuMC41MjQ5LjExOSIgbmV4dHZlcnNpb249IiIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMTAiIGluc3RhbGxkYXRldGltZT0iMTcwODk2MTQzNiIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzUzNDYyODMwMzc2ODUyOCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE2OTE1IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0NzU2MDIzOTQzIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:2012
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{13D85259-DC26-4AB5-B6F6-CE1EDDA6C321}\MicrosoftEdge_X64_122.0.2365.80.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{13D85259-DC26-4AB5-B6F6-CE1EDDA6C321}\MicrosoftEdge_X64_122.0.2365.80.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{13D85259-DC26-4AB5-B6F6-CE1EDDA6C321}\EDGEMITMP_C5EFB.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{13D85259-DC26-4AB5-B6F6-CE1EDDA6C321}\EDGEMITMP_C5EFB.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{13D85259-DC26-4AB5-B6F6-CE1EDDA6C321}\MicrosoftEdge_X64_122.0.2365.80.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{13D85259-DC26-4AB5-B6F6-CE1EDDA6C321}\EDGEMITMP_C5EFB.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{13D85259-DC26-4AB5-B6F6-CE1EDDA6C321}\EDGEMITMP_C5EFB.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.112 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{13D85259-DC26-4AB5-B6F6-CE1EDDA6C321}\EDGEMITMP_C5EFB.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.80 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff6c43469a8,0x7ff6c43469b4,0x7ff6c43469c04⤵
- Executes dropped EXE
PID:1828
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNDc5MDA3MDYyMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ3OTAyMjY0MjYiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1OTUxNTcyNjk0IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuZi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy81ZDJjN2RiZi0yZmE0LTRmYzYtODYzYS0yYWM0Zjk3MzYzZDY_UDE9MTcxMDUwMjA1MyZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1Sc0RpaCUyYmdTR0F3JTJiNWpqcGI5cHJnOHNSSkRvSno4aWZZQVVORXFoN0x1WnZrMVhYMTZlMDBrTjFoVWhmOHpvJTJiRDZmNGZON2VJMVNLNW9oTDA5NkxlZyUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IiIgY2RuX2NpZD0iLTEiIGNkbl9jY2M9IiIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjE3MTcwNzk2MCIgdG90YWw9IjE3MTcwNzk2MCIgZG93bmxvYWRfdGltZV9tcz0iMTA5Njc5Ii8-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-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD5c7355148bfe4f8c0f4a2d64009f53888
SHA171f924decb8b7ef5ff4c6ddd2f6a0dc49a06f381
SHA256d79bab271698082da29359c71051899f23f3dd956548efe0eb8965e7c2969983
SHA512fc52ace4c524e85883ca40b8fcd2a9d25a30d99a23e0be46a7b599bea0996392990fba9cb945a6dc24ca3b65d3f61eea5ce7af9d64bac1cf13345e648fa74357
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\122.0.2365.80\MicrosoftEdge_X64_122.0.2365.80.exe
Filesize26.0MB
MD5cb223b7ce3ceb9dad6feb6c4014b3c77
SHA149dffad2d3cf88a2cbe33f41b4fc83266a1458d4
SHA2566725549ea97b9f567b97d44eb78715c0e0b608f99cb2e2997c0d082308544da4
SHA512b5c1f555eea5850a77118698a9636b42c460223496078a56a2f334e9a9310f61d17fd6fa3b2fc9d1f3be58eea5db129bbd563c3818504c1e96583855bcf5d7c5
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
182KB
MD5433681ca511d96f96479ac2cca102522
SHA1321b86c79779e3685b022012a4ccae8b5f3aae19
SHA256da5f97895efb9698657ea213e6d0cab53ffe6bee32933ca2341406faf64dfcbc
SHA5127b90a0c624f9500a6aaf39c9244818d128cabc898f5e1e8a28f7a67fafb603b6906610834e172d2762703660dae2cc541d51a5b7478644faa5b6b820b6724188
-
Filesize
201KB
MD531f9e08922765ba2913632f758bc7423
SHA1b36b4bf74d6d4b6c8c0e38d9c6b65ec7da2fa9e7
SHA256c2988c13f66ce033fef65f3af20a00faf555047e710dc6c282c124c848c1eb88
SHA51213808d6b3cf8f8e645bd421eb3916b12cfcef46ab5f0ce1a0cbda91c4be374d03504ec09d1a5916ff2944cc24135cd46dc5be3e6c72fb599b30a58cf8aad7c57
-
Filesize
215KB
MD523a351591308d49bfe2625d302820715
SHA14787ceafc8492b09f85a1c8abb7e5d0c07f52e96
SHA2567610b2c0bf22563e850e185864d9244eee94c853e6595cd18ac59b6d603af651
SHA512cb266826f6ca3de75968dffebd2a3b480fd3348fa1c0b972851f1008540285cf93158555448446fb8b83f1fbff726221e05a3a18b11da0518ad65283d8eb8247
-
Filesize
261KB
MD5f5e9477194d0d7c18a7c3529a10f917c
SHA117b0f78f7c56a89ddcf2232242de8f13f0cdba18
SHA256f5c45634efa29acb9dbd1f16880737797171630c3f81fe23aea26f4dfb094323
SHA512227d890734313d4dbaed48501e6c4cd1f3d1bef403bbab1f65084ead6a32779381bd9d71eab03ca6eed332a7866030eb1fa01fcd1c28a8d7899705dde33446da
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD59cb2b82fbdde7133369f0d8618dba139
SHA14ac0771b6da4c435ed9ab270e4b87f5720fda0de
SHA2560aa838b27da61c7bd94e073b35cb5cf1cf0762d74ccc0214d052f7327d52ae06
SHA512002ffd9938e309693e2b4ffa3e2d3add2046f133e0f219cb5e8f898f55003815f326c98f529fddef9f7653a9a81e3ebb543f8ca034e786b25ae960c3cb2c730f
-
Filesize
28KB
MD5b02f36aca674edfd030906d8aa7d3e11
SHA1638981c1e6713e1c2ce2f551bf7326a1d48ae3c7
SHA256962a6ed3be729a924512528f6170fcec6a86bcdc37f89faf8df3e31fb2c9bf21
SHA5122b5c087c5a1a12e87b6b3ad621b9d5e0380f0a962a727bd261ab1b0ed0a40aa9d7c2500648469758889df598b86e343cb2a3f2d034d07250243a7d1e99dbdfb5
-
Filesize
24KB
MD59a1b664570e9631e6cedf8c2d662421f
SHA1d9efd018975d111a08e35fa92b1d8955dc31eb5f
SHA25652d1f080f3c41c4579603c3cca47b6667472d6b4ed787a3dd7d345ed8b3ac747
SHA51269d4b33cecc3280ba369dbdf60fae92481e8965d6640a1424ac4d72a2355f3d0c367469f638ea6296c1e508fc906f94a2987eddf9cff3ca13659113cd4c178ef
-
Filesize
26KB
MD5ff770d70c8ba319bd01ca708e2644572
SHA16b8c84053f4ae62afdc7002cb3f2e849800dcbb9
SHA256db673f6e96287e8827ffdea3ae880aebb5f1b2bc5d45bf26be6513629ed12f1b
SHA5128bdd358dcff62a0e3927202e7bcb85d374a2cc351e940707ed4d2638f4f40b3666c7741345f6c0bcfa75b9b3204c1a821dbb44458fdda95a05b0b6a253890cd1
-
Filesize
28KB
MD5009dce4ff4b372178c28397fce96a59f
SHA192277110bc332fe7863beb2ddd4e09fbc55bf81c
SHA256d333edca46076709ce749e5c55efc888e49120e27c63ffecdf3e78222ea155e5
SHA5124661f3262e7f002916530cb2c9c70d2de5297ba634ad451d4fb39870a26d1a829082995737b5c0b0911c32a20720862dd753330aeb30e993a882fb4fbb110c43
-
Filesize
29KB
MD5ef2bdeeade769996349c0a0f4a7c5872
SHA18d3944bebeca2cc674b0459c637e125df0621967
SHA2566d23e6e87ce3e847ed059781bf895c846e5e34e66083f92089cf08b403432a55
SHA512260d001693a36c7a5db55739d1781bc41b7c76a182d6761229af2723ec223b426b4b4b568544bcd1c97b2415821f2a9514a49c5483f9038438349f7dc31993b8
-
Filesize
29KB
MD57efa4d227351f5deab462bce9149d40c
SHA185cfaed5408724398f9a3584f9737ac24f4993a4
SHA256b36e0c8bb231ec5597b6a8e86379400d1c3dd2218ec8f401c53538ba7fdbc383
SHA51288dbf96fbe3b1756799f6dd9f216e26449277f0b692fcedf099ee5b8563ec2b44de967cfaac0ea7baf072992b0e24166986070811c6a752923c6894961ab3f36
-
Filesize
29KB
MD5f7d821198825ff1e2cf321d15e7033b1
SHA1fce91abf0300084e22521c81f8d194965f25f556
SHA2563518a0aafab4518df873bfe4e1c9e71e3809e092870acdb12eaacfe52c01e25a
SHA51285b196fe52121c49dddb552dfdaf3f986160b53a78523760dd94ca08cafc5ba75098a744dc5e605419c9914a111dd207d7d737afb91d73bee7ccf0cf83a8dbfb
-
Filesize
29KB
MD5a164b4c542d58d702e81e05024d95459
SHA1e034353f3b1e2afff2ec5c36b36028a94bba9567
SHA256f332fd86ea630afb90bc9d50925b25bd85037e18f186aa45c047fc179ccd77a4
SHA512f7f22ae416d949a45887e0f0f6f67f6b9518d8f5a26578365dc1bbe979f731eaacca34a53c1d55947ba9cb99697df6ea628f005701f711afbd73fc356f848893
-
Filesize
28KB
MD578bbea4a67479fad54a247e877c213c3
SHA1800c9ac56787b18fbc010cf0734b4a187d3f4a7f
SHA256beb02561cdbe2694028c2106b603661d4b7649fb4add685e5314c7c1d27f6252
SHA5128528525660df61bad32f3492659d412367ac42291be8f018ed1017d47baf205ae95b091616b0ac2b20859b1ccf504068dc4e317e176495e9021b109c97c72bc1
-
Filesize
29KB
MD564223294845556ab103ce781a07db647
SHA1988e53cba0f55e6405df02ac35f8013e79fa839f
SHA2568ff65e8754d8f33260e75d43c40b8a4b25eb7d42b85ef73ed6d67ea603c513a1
SHA51258af56f6212b055e350047b641bcf4fccc22012f70e12a4df24d5e2af0964f42ee25cce3d5c8cfb75071bb2e2f9cfde3d3142f2502a1a2cea20fad7e219e0de7
-
Filesize
30KB
MD57f21e0d781e6ca29c3912967eb920b33
SHA125f8be269cb3a1dd322de909b8d25e22919febcf
SHA256aa499ed11eb86855c85426158f198b3efb6fcf67c3b484793f34240bb04f049e
SHA512cdd78c9656aaee68306527e3a81bf6b2bb749b971342c1fe2b45230cc06d97a9ba6e6f6aa4ee50de0d5abf983b0f1d0cad3718162f046e623f2f6dda6ea87200
-
Filesize
28KB
MD57f14c4c134a48cdba2c41ad653a5fda5
SHA1a181b6f139b9e999efb74a11b3a966480c706e79
SHA2566fe845b8e932d1422935eadb0fdbbbcaecdf567778f50f6a10eee72e6ac860e8
SHA5124cfe470e0039f7452db7dacdd8512c5d873b597a583a35cf6132cef3080b3787f816022b14e067bf699bce2b142be2073dda65e9bbfb81457e8fcd8b1436e02c
-
Filesize
28KB
MD5b2d69e686d4d6401479b2cbeb5c62c77
SHA1696ddb825bd7f812c11191bb53c2c00d548d4c00
SHA25640810d25a6f9be67b000ad8228dc20e41e2b0d2223d0ae13878f265fa13bcfde
SHA512b0d877c0ea2266087b8f464efee9fa54a504ec12215d2e7f3f463081075e7128e2d9437a550773e2b703227ca952e0283f940d3a6e1325aae2784e53fb3e6a29
-
Filesize
29KB
MD55666fafa9199b490d2b20cbf2f5395f6
SHA11f43b774ef9a8fc218279dd81e437ffeb40966d1
SHA256e4bd6dc7a20b9053b9dfff7c2c6a8abded5914994d300fd1466c9b271a0bf42f
SHA512660403a3abe9a4c9ed7a1e54e5e582816c57cf3cc9a69cf67b8794e98989933d90acdea4df9dce222d82dafb92145efacfd30bae93c09193be281dc5ec634502
-
Filesize
30KB
MD579c1cef8c38d0ad8e4eac06c84accebf
SHA14092a10acc777d560f255c85b1a1437dd53a7101
SHA2565f50709f64eb3f03766e7aee5f446e8cadc1737d0f404db73f5dc447c1f77899
SHA51213cd04233e8af9c194e44d1f322aa29d156fd399717278cde1fbcac8acb1efdc4a004e5e299ff19ce8b423b3cbcf35337c27bc435a777bd60e0bc4e8417aa9c6
-
Filesize
30KB
MD50dbe7ed570d8139edfb03b022abe1b03
SHA1099e20aeaf984cfa025f017706c694a98f04e2e2
SHA25677b34e4beb5b9b9110582cf55432dd1c75d1816d5744d56c26617d44b7ba37d0
SHA512a0667ef377c52467f8c7da6627f9c06786c8134979929a60c8e248a08f44b0bbfbccbc79458db84d9c4e183446acac9e7e18a65ea4b5e8b60ee3a911d8c96a1d
-
Filesize
27KB
MD538d1b69a1f1e07a99c9df5416b7fc639
SHA1f46cca601d1cc38ddb8e93f393dbf9be909e49a8
SHA256952c6fdbcd0d333319e80d415caa91757ce759fb4d8adcff3229b134c5257244
SHA5129ce6849d6915352e746921b9e7c3222d8e99577c77405ac9d44d33d4b0d70df74bbf06d6ec750d38afa21f2824a081bb74dd271b79ee38015e4b23fdc5d840c7
-
Filesize
27KB
MD590afa78198ebd61bb588145b28f6ae28
SHA156e954a7a9d086a30c49b3fadb39108ed41008fd
SHA256900f4de13607028d1e4442d361e7e0b80670c9601cde0a634a12119b13ad1fb1
SHA512d3d5a80e06f1cdf976cff20ac840eed31034e7e7eb37ce10d58bd7a99c2a3a6db711358e32d77e8248e8f7029aee2b87b37a8ae600810c4b454ee3c08ab723e1
-
Filesize
29KB
MD5e393fa3d70aaa6dc5bef5dcd7df4ff9e
SHA1292fa091659e5954b760e75da9ac9c3d2e4ef1c2
SHA256f40ad5f9cde0853afd1834d3823bcb2a50cb358eee188b5d7a1d88b751237026
SHA512b3c879009495975f1603380d10756281ddc5a004474fefbd0fc470741f7f5b59ca8c3603d87f9bed6709a31f8eb04a7d84ca8c10db2c9d4a43487604058a3163
-
Filesize
28KB
MD510bef36b121886cb7468bb209dcc6836
SHA18b98619e4d8ade70f1f9008f6183de785b6b4509
SHA256515f0a0334db3271f84bbb288aac9b907d6c363dc1a9a6447117a7e7c967ad29
SHA5123b3a06f02d5bf5734b99ee38a249c3232b61f2a5fac837405501bd9cc9c8cbcbbb38dbadf3734a7a6b986a79ef34c7ce63c8c8fdde7d10c8bd916a13eb8f662f
-
Filesize
28KB
MD5999504016169d3caedb132c230feacc2
SHA1a0efc52f4104906ac51da46f24779358a319df8c
SHA256ec804f7507269d52785b699b4fd18a2d1a3ca7e0956dc15bac034151596b75c6
SHA512ae3b4b3c38ac6af5dc80238d0e3730ccdfd436dca6daee317b58f92cca22ea51ea2ef720e32f92693d23e8383fefccf9c46c10a148036687f0a7dd8bc844f274
-
Filesize
28KB
MD5cc332ec84b9dc507745c1833284ad4d4
SHA1acab1658ed5f20201ade23311f6436da6bc7ed73
SHA2566533a3d4e7af844763e89e3a4bf2330dc37dd2dfd6176f98720140b1f22a7830
SHA5125125af4cdefd131d79988296362e92dbed46c7ac70264a9592fbc633ea2527944745c7c3cd475b0117efb0729885b696fa7f90cbdacc04d699d6aed235482259
-
Filesize
27KB
MD5cf17425264c5d3e95ec3cc93e0cfd95b
SHA1132652c83194a66e1820ba805b0cd1060ab7c66a
SHA2560a394125c397e472932f7bcf40e2f54ca1050e0620d35ca322c6f48d80bdbf4c
SHA512f7e2408ab5560717252c0536ab652cedbc2cd17a7e6d375d7dcfbd2cd8894b4dcd71f023d2bae35237250e1cbda08385a1484550a07f13901f39e6d75e9f87e7
-
Filesize
28KB
MD53cdfa04a84ba151c6ef1e1711d90b243
SHA1d306f97bd7a3a6f620994c5c98758034a8899727
SHA2560a063456432fce42401c8362714e98ec157e9f9e5ed3eebc4d96f9b4a039167a
SHA512e02ba732feab507c478df22aacf2b8399bdbed4f937cddcde9a3c0dd38cdab0a9c434dcfa8989c1d97fdf1e9efa67b64e9dec631663bc56df0356ca2036e2cd1
-
Filesize
29KB
MD5e448e42312360c764f4eb091472aa469
SHA1b8afcc1406fcd0041c50ce858883d1a629700537
SHA256fb31e09bdf7fc834317bd9ddc3376bd1992c3eacde48ee71a133f969e20401f6
SHA5128af85244d4b24292289feb560e79f69e65dbdbf16ace5cb12fae73371630b71e3bb122bb276debbc7842d8b53b0ea3a12eb89acb51b3c8f39fb45c8337304077
-
Filesize
30KB
MD5000135745b1756a8a8d3e73140e18ac1
SHA12399c903c91bb969794a41d1a5e693e8f33125d9
SHA25692b4f9d8fb86a8aa24f929d27e76e680923717e29a88ede229abf357eec3a299
SHA512c0b3484a02888fd6323b6754d76325cbd5b48cbeaaeea91dd2ad8c2a3e74ee51294e7edbbf4725e9b00c7c589750199548444484c5d8d15ed973bb63bc8f0773
-
Filesize
30KB
MD51e41bacb6e221e7db7772bf7a9b9b228
SHA15036f8c73029b74b51da93330e5bd6be78998953
SHA256ecef2e77abe7a1e67ee7e2b1e281ff3f2b1e0cdc4ae1d96ca4e6d25730587efd
SHA51281bc5de9bf1c392c886b9d83de8e3dd290399c31504ed998a746eb2b3cc2f7c43154854973146a29e9164b2fd6df8e6bae7a63c9288c4dcb7ac9313c18289c9d
-
Filesize
28KB
MD5baab875fbcead06d6bfe0eb3325f9d1c
SHA17c770a51d93b5651f14a290858fc25a8c5458378
SHA256e2706880a1ed7cb34faef4ca0f3b2df7aa4e75d869dae74c86d750df8423c1f9
SHA512994fa0d9f9d02b1320acc5ad336e30451931a52e6a8c48b3b5d9d5179b42c68feaa14fc76cd2ce99f682f1dfad5d8ce21b87a12321fabe504eb9c0844a49fd32
-
Filesize
30KB
MD5c98c2777d3e3f5b4cdaacfac7b92233e
SHA1879cb8fb3f292c05aab59a2852daaa089b13cd00
SHA2561afc654cdc779a78ac66c08f527da746ae99197d2b4a8d23f024afabbe98434e
SHA51272ad4fd9e2f3b29f937ba0cefe6adeb85edcf26f913b5f4dcf8d7921a7cfd38fa1eef67db7c83e1ebc4714dffcc4adb9dd6ca909b2b7ebaf2827d2b2f90523c1
-
Filesize
28KB
MD564e4a461716700e7f14e7014abe9816d
SHA1cea6b0612f2dffb7e42d23629d41ffd73cbc63b8
SHA2569674903cdc0e08f18c8f071ed9fccdb8aa20184c85d48d99e8e90de4f4e33a05
SHA512f68f902cd1a3e1232401db23ab466e7a38ae09e3324bc91fd6066d19b9246dde068178b73ae5fa6cdecc420b0d3a818f183f46d280f53e8c311b063c029537f3
-
Filesize
28KB
MD52bc86512dd0753e4649fc66d72760498
SHA121d7a1ff5c5f54f9aec52b4d6dd6beb72c9988eb
SHA25601df748e21237a03eb6e9d616cf0ab2cc63272a736c8e6fefb476a2b59be3302
SHA512aa7cc40847eb65bd67c07261d48c18322d63cd7acd5d230cd93847ee7e94e879ef87e9fb96b4131af7aa45524b3c48a01c3a215bc515a2227223504045cfdc83
-
Filesize
28KB
MD53a60d0c9d26cd258b08f80daa33b0134
SHA1ea55affe72494cb0f7145644277270627d68f99f
SHA256f8647909bbfbe73c0c962eae21c45ca58717f97cfea7dad404fde52367f837b7
SHA5128e1b6e53020652f391511c8b4e64b8c12bddf5c52f869c8069349c44576520a9529bf120d377c243e5b6dbee0c37a8d9b31a0e4eaf2126b553d485e840027370
-
Filesize
29KB
MD5cabeca48e04e6bcbe4fcd9231bb70ff1
SHA1af016512f0bd3a51b38eb22c7aab8ce07a48e9f1
SHA256fc73ca5d57213643d99432389eb371e13d0217c4718aadf551677667b5f9837b
SHA512e3d1b7f9a5a4672da70090c2c63fbf1a87a27d127a538c940764b611d3e8952ffe7384bc5e103e7d5b90b216eaa595086a9bc070bc9700c7e450476be17a63e8
-
Filesize
29KB
MD5df6a438814eb75ad639cc572f123924f
SHA18aaaba665de347cadd55dce07133265e30d48510
SHA256416d5ed542c2dc6bb7219d2a76b5729ae835db4b63015a9a998a0eaddeeda1a9
SHA51202171d854bfc57845e6eb344a48c4aebd653d229ffd94d4ce1d3d76a623503c6a6b104f9323a7afd16bd0a2007a0d544d8e31f52a3e24a3ee0a4a6520f0933db
-
Filesize
27KB
MD5ef49bfeb60ee4283650932e4e50de722
SHA1e592965caf1dd2f894b24a09f2cd14294ece7d84
SHA256c49adb300b05a792e3b2d0e91d200055886acbbd26b7eaef43722ab3f5c40752
SHA5120a15abbb7f5e43425a561c91ce775ef6944044f3ea9e1dc60371189c79c4fe1cbe059ad38a7492f8b2342f1ecb5fa3a60e1643793bf9db90c21e64f1eeced079
-
Filesize
28KB
MD5333f733cabf382e901c99e1d3049f767
SHA18c858f0ad0f06f137fbc340f01831a7eccbbbaba
SHA25615fb8bbde296a384f6c9bf3acf0d8f6860e30d7dbac2c60cb928300d8464d81a
SHA51281abb4abcca78181956dab1bd8a3b9523cc38f30348675342198f2cf3394fe1366d12f8b61fba7775e8c572c45a23603eca96fe36e693ca2d5f5bee0300101c4
-
Filesize
30KB
MD520af857014bdfa8f869145dc25fdb5e5
SHA10d876e9b0abf907b4cdc0767d120504cf2ecfab5
SHA25613f6f81e6507f2304768922e81ccac99951bec4163cc576f2dc3f65b78cd08cc
SHA512992443bfe3c101270e1fe5b39d8adaf1990b46e79ea2b285fe848e6632bea2ddc6e2a1523611359518c79b0ea4ad5a228f5d778bdf78872010b67e753866ae72
-
Filesize
25KB
MD5f2b801a134d0e6016a500e7237f17fc6
SHA105135e4f7c5c2ffdf7989c761947c7f482e6f859
SHA256556146c69e56b62901e3741d606e12e766324651793c26ed75861c172a34fbf0
SHA5129fd5c3bdd6f6cf4c75869eb0c80f71f00207e3bd0a3cf1ada37ca0916018ad691d93c335faebb919de551ea7e0a0fb8c0ee4b406a573b48f6ce01a21558c555a
-
Filesize
24KB
MD57bee509a3cb93cb97a3c419ded29b379
SHA151b83ac0e624da9dd877894ddb229382c25d479b
SHA2569c24aa6f46f6bb4127a27efb46279762582909dbbe491c2fa1a621a8d9da2408
SHA5120f148229fa873878827437177717ca3be23630f62788886f53703484073d282e3204cb86aab49e493bbde2b2638bc1d6b7f05a7290b32e2b6115854774cf995b
-
Filesize
29KB
MD56e590abdacf69c0a95371ac48ab92698
SHA1f2a4a183010cafedb76c182a6149bbc313ed608e
SHA256975cb32be3ee396f0a076483206fc6a9f8d3671c439ca5aa3649d7cafc1276db
SHA512d2cabc0ae33c9ca75f6146d2c7ed3f37df03a2e6b82e7e6180a2a7bbbd32bff4fa157ec1c8d906c48445c79ad58105ac30e0217739ac21beccf13be369f0cdca
-
Filesize
28KB
MD52b4883e2c8eb6a1cc0618972ab9022bf
SHA190db614ce4217fe3703b87ce8be687e7b244da58
SHA2562815b85a065bab6aae4af23cf5c8ccb5c8f587b5ac57b9719b2fcc6343d573b8
SHA5125e86c7028fa5520fee13b29c833d5949b28bf6e803752df71b6abbe9e1fa5b43c9948e6b4956e554cd5461a101824e051e20b6762cbb418f112f938563f05e20
-
Filesize
27KB
MD519305a2fae65010d305d658338cc4ea4
SHA170fd2048440da6d411fd0ab61f441cbb706b3b11
SHA25627bb6d533b10539f18b9ac37c49d8340ad7bde91e5150981fdd317ef38bb7efb
SHA5125fa9f71e2d5f2b588935be0c1a91faec745e20992584071052cb7624637b7232fb6e5d60aa79926cf2c3ccca47f95ce494769a679259bbf2d5c98374981c61c9
-
Filesize
29KB
MD50b3764cd341edac4f859306f942d816f
SHA16728dcb1c38c7fbee72bf1a23084c806cb724499
SHA2569a7de95fa49e02bc700acc2820cd4099a997988cb57663d2d1e4c2f3c4fe365f
SHA512147380a455df8a314fc7c4173a8e9c2103b09206f0efebcaf8bea96b56ab72f9ee1f92c89146873adc73761d50103543cbe6dedd7717c7ead821157c1bd111ce
-
Filesize
23KB
MD5fc2bf0ff5b72217e0b581be65464836f
SHA1f3e63c61ee645d8ea1db82188ca9c0a74c2f5f9b
SHA256d5b610c073a7e96e6ab38fb15218395a94e4526446a1087f8a45f90fc0b25ce6
SHA512a0de9d8638e89d29dc9b6639ab7e2abeeb710093d6db3b67b0a7290184d0c2200e69ba750f94cec66a4e939687dda65344d6bb020f961fb095444f9c1608462f
-
Filesize
28KB
MD5b0993ff03e515e491a2b30344995f46b
SHA1d4591561bf7ee245a6ee8ef3f10ce59479f46683
SHA2567df3f55e10eb57e79a10a43c9c839ee4dadad6581b1cb696812636194ab3f97b
SHA512244f15d811c519e46a1742502b7cd4c956231239a35f064289398d2b9b94807849f0c0243ebd8d7cb0545a212f23d7d0b621e0254987e2cce46879707ef1af04
-
Filesize
30KB
MD5ae1afaba80329dbf7a2d8c9ae899cb31
SHA159a3c94260512c89f4fa36605273d0a23ca39681
SHA256c01f4e503aaf3b9ba81cdd79255cf3073671758f370bf07fbc59081dfbcd8e45
SHA5127c043fae0aea39b5930e48b2f5eb5a7660da5dc69f288febbac54b3d9b129540c5aa3423fbb77e7c127c6a16bbacb0dfc31f6e3246812a33c1683aecef029acf
-
Filesize
27KB
MD5f341581e529ee7cc558769c1cd23297a
SHA188c956c86045cce4a22fc5ecb16e6184b3ed4c59
SHA256cb5c131a93dd2b77cb0ef5499acc8a0b8d9de15a7193a314452efde262054377
SHA512196542376cd3ec6352a60c2e523ed240c4e1252a8ceb67d4b5ce27ff62c43e6bc5e7191f90afbd0ab910e325b6092a4c5e445fa021b8b02744bf494c62ed9317
-
Filesize
27KB
MD5bf5c6d4441d9495cd1b2a982004a026d
SHA19d92d96194cae48ede6296aff0244f55bd8ca363
SHA2569ef68efd2a91caa4b41321215e4d6adda225311e48ac5c2bddc3e3afe379a595
SHA512a93f651be188a27f90148009c2cc41e194799e3466b1d971f607ee80cda2ee75ce24003d14ae919ab7bfdd14907937aff31672421aed067f381f2480ef3a3a75
-
Filesize
28KB
MD5114b0fdf0183801f36202b4aa52a8c6d
SHA125de0a71c950117c332f3cddaa0f8bc4b1e6a90e
SHA256a8efc8a3399a54ca234bd76247f217576fd8cdc891d1d487e86ba06fef676be0
SHA512cd16f28783f1707215957c6e545cb8454e8d267a606fc91142c7feb1e8f83a020338d4ae3177779bf31b34324e6d8c35d648442345beb019112d402ffb7a0657
-
Filesize
28KB
MD510cd5ec2455ae2eb80280aa5f3a00ad6
SHA1fc0ac954970bb33f9e4f372efa3e99fdc9c32a2c
SHA2569f1f89692559cb6428af5336f29577640015df9fba272dbdf8a44709c9c34496
SHA5121f5209b4efc1d28e3ddde4e8087565861c31bb31e8535d1086601e0d56594ab5b163db0588c8913f6e710630cfa57c4aaf5f2c94717849cc5c73520bb1135738
-
Filesize
29KB
MD5699c8fb732043a02378ead6badb69cd1
SHA1ea9c3bd2eed254ff56dec2cff952a8804ae52ade
SHA256976be8789d91935bd083691afe245bea0230dc159dc2524c93cea2a78229d2e3
SHA5129e8f0af3d5a3f2c602f6566d8ad323bc27d182b6ddb26756d7d2dfa9dc2756f3243c258f6de96f50b8525fdd31cb7230cb360d4098492d52fd7b8a0904ea1f11
-
Filesize
30KB
MD5821fc1cebcf23ef54a7179a966172724
SHA11cc6f74fd03f89b17aee368657326c7b61ac4971
SHA2567795e21a9b66720c1771a90156f0beff5c7bd1318bfcda2309d8f0973f5a8272
SHA5127ff2f81b6bd0751b6aacc7ece6c937895b09acc13453eae3fe9ac5c0d0c4c9eeb6751bf083d42f0ddf941fa4660832d358b22142ef3bdde697b67eb1da49c832
-
Filesize
28KB
MD5c522b1f946733d1f98287e7cdfb7be85
SHA1b73900227cf47832275183e4fe34cd323d60fa8c
SHA256bc7d941dd7ea8641320b8219fc023e38cf21b2e0e8e90d7b2a0f230a62582dde
SHA51253ad9ce365ab86e54dd769c6b33d157fc0380af228a972076b24738615799a1128ae19fde353beb46bc847b68bb528b83945ddf0d08c622877d37a98594b1fc0
-
Filesize
280B
MD5e8bc01a61ca451ce60a1ff76f1a5c2cc
SHA12281561d4e0e065bd9bdba568b68b07cef9393df
SHA25621cd300a3e7a4f9da9591dc567a38626869354ebd7d92ed647ac1a4739ed3030
SHA51210e9c5a277af429a011cc861a62b85ac30b1afe8e6fd80b41580aecb71f00c490371d11d24b7b55144b006703fc77625fd05e6a94036e2e7ae9e91003f186254
-
Filesize
104KB
MD5369828d88d8ae4407d8a983e7364ba34
SHA1d37743f8a25eb44223dda63b36f8d2430a4ee3a2
SHA2569c3ead3091add25928d95a9902fc17fd37b9ba6239b9f0df304f960fb52d5dc4
SHA512e07affe6ea4992625ffd17aa47f1021593950e55d8d39136c29da0619f4d108cd4a90b05281b1fe2f1f832e726189c07e0fae7cdf6ef0c3ea97500e0510d8da4
-
Filesize
1.5MB
MD5afe19b551bef3007e6c67af7a3c726ef
SHA14f105cd2f045a0b107a58127b75e7818b430c3ae
SHA2560685c3054bbc59a1b1502257d0dafdf4dec22f0965ada2ea88939b4f729b795c
SHA5123d379fdf8f7d24a0032cdc89d68f8c9f4450f19b1ad36d870708a1e70bbdca1dc18ea2fa9710e25b5bcb757e23dd535b35e0212fb3b64055183930035feff01b
-
Filesize
280B
MD5157022d3a568932ffb46078666dd0c15
SHA16e9d4affc7fdd57e3dc191cfc76789162d9c8436
SHA256f8521a7bad36b94d1a589a2e5fbb56433b65bb9c7a5bd808a6a77069b8ae0882
SHA512bbaa7c1b59c5d62e76a0b6adcc4671b52b461ad75b93314f0a45005662a7272a832214d0b7ccab9175dbfc3de518a46fc7503aa190362464acedcfb32e09a44c
-
Filesize
280B
MD565e918c0493eaa98200c81d69a76928e
SHA162b3a02eb6f6997b497148e147b76bd481066273
SHA25646615a619e6f4160e5b2bebb732aa76f7c0f3fc60a98b7130ef3a13ecfaeef1c
SHA5123a927031120dde027da4739a15939909eafc0945e9510a4ec07cbc148c09e4aa118ad775d93c1207123c0f48f2fdf9c898a19343039d052043c92b8b2f76969d
-
C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD57fe65e1ca401c7841ade8213c898f3d4
SHA1284f7acc207e7fdb7cf30abde16a5ee232523664
SHA256c8b85033f12c273298dca1a1190e919e33ecb1305daefad34238d59809285542
SHA5121db2e6071ee808e5af39fb5ea37164676137d0c1d1fcf0d9e897996232f862e480e587d317e69be867f298de4a492662cb6719400109a9da33fa0ffaae0ed3a6
-
C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe5a7253.TMP
Filesize48B
MD5d75049025f6e28b7b5d158547e8b2bf4
SHA194ca7586c29ba9aa4ae3848f1c83a48cf1e85260
SHA2566316dd73391a5c7ae3398637cd217bcb2d4f6d263174433d957cb7c60997fb5d
SHA512fff4cae635ced38c7a8f38da9d077b89cf50fd65da8a1e66cfd825102c6e4622e3d3594536ee12e756a9d8954db49c5897caa5ff80f3d3ffe46e8f579828ff3c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5c2c13806227082cb58150c892ba33669
SHA17e5c2ace470dc78f4b96b2e5b4fcb01c7852bca8
SHA2566f159803dbca6c494917f999c87028e4f1ebdb86392c85f7e9aac1e8553e7396
SHA51298e02a58721fff10a09b0f55d23dd02d80e1e64171be056992c1f370380bf3c1ad6dbe2aa27650738822dd41e8fe9d12e29dd8d30ce3a14d1d9aad7ede4deb18
-
C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView\Default\Network\TransportSecurity~RFe5ade2c.TMP
Filesize356B
MD574a83ac598fd4910c902bee99d9d2d85
SHA1d6b4e43059ef7779deff608629f35c962b65b5f4
SHA2566d81269b88c1717673be0e8e3eaa7aa75d6829d910dcbf9d0d1dfd96c441c486
SHA512456d4dca37f3a661f05a0ab7ba067b04c74fb9b128df4088fdb9f1bfd94f93586182c311a92e54687631a53261a88d444cef44e641515a9e56878651af10962b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Roaming\HaruHost.exe\EBWebView\Default\b8215dc3-49ba-40a2-b687-a381e1828e7b.tmp
Filesize6KB
MD529d75ccd3aef7066ac283f2976e82d3d
SHA119a2ab493680cd269f0079a118d22f9bc3ab692e
SHA25687334467d76eacf49830cc8bf5756d19056958078176ac7fc1ec88d78e1e8ed1
SHA512806c3e4ab5fb54e0397faeaff3be948b9961bad9eafb3d5d24ddd030834ba006fa892b8ad110fbab743a4c227a7b7915a69ade1e0a8a0376ae91e5d88e4acc5c
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
2KB
MD55e3d08ae68bfb7b7f12f83272cc01845
SHA10d5dcc06a3494000e1aed36764f991de34922c09
SHA256ce19f957a2ea38bd748f587e9f43720c359c1dee5f79ec0b8e875877f66c9505
SHA51290275448a2b6c13d8551c6427feb9919a7142194078fc658ceae83adca13cfd1d08231808b8f22d24af2492fe1cf4f31e3b4e9a99d244b88a6957da73272dcd3
-
Filesize
3KB
MD5fcf11874856eeab79edc651ec088ceb4
SHA185be6c60417f896a9a70d49bd908268e331df9b7
SHA25643ffc36a900dcd02cd1cc9e53189d58d3770172d4bb0aae0e58bbd89b7902076
SHA512e34db6911086b9086508352d76810dfec925144a6e2db1bdfa2db3e2749d60cf9b123bdac47b04e04c86e5ba955fec681ba64cbf27df990d1d212b75974b0ff2
-
Filesize
16KB
MD52c9c56207ce3c26e03a6d17b4c4641ef
SHA13b563374864af4d057dc4f2c5eed906b7cb6e068
SHA256ec96a1da9a2e4983499c7bfd4ae08368c72f84245083cfe50d4b56fe7be11596
SHA5125413eeae4394f41193482bd8ac027ee042ac9908cbc533197f28071d3f60029bf83efa7d03c4e79f0fe982ca42e0e6bb13cff1c2fc9bda9171c0b5b88d965888
-
Filesize
1KB
MD5e1ffa4713bb5e238499632dd2711bfa5
SHA1372163bcef42e7a5438b6d4abbe8596abfbe9359
SHA2565809080b86bada85d55182921224897a6779c5d2aeacb738af509016dd14576f
SHA5123608cc69c22320977b249d01e14bd2bc547606b655a9837a906a1a658715a0db8bf183d97282ec1fc6cb6685979e04dd19185adf9f7b937ce433bde175e64854