Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
JJSploit_7.3.0_x86_en-US.msi
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
JJSploit_7.3.0_x86_en-US.msi
Resource
win10v2004-20240412-en
General
-
Target
JJSploit_7.3.0_x86_en-US.msi
-
Size
5.8MB
-
MD5
9c232fe2ede51929244afc5c67e53b51
-
SHA1
8e8bb0eda09d25c1f44b8abd66a7e15a414b76f5
-
SHA256
1985fdbec700334fbb2c907f37a102930744e6b3e9198c25f516eae9f6854e9b
-
SHA512
d7ba56ed15a4bb482a69543e6bfe11d0aed4bf6b6b037d51dc2d191e1eaae187d1297bbb7c847d73259c34bb9ee26f26f3689c2592b4ff92968101303be61492
-
SSDEEP
98304:57AC5TdoYMyLSRpyviWkKPm7I2lLYaQ9OoSwYQf9Ib9XuvmhueA34SHeFblFY6nm:/T+USRLWtPm/O9SwYmIb9S5K3F6Wa
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 58 4300 powershell.exe 60 4300 powershell.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JJSploit.exe -
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 12 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\libGLESv2.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Notifications\SoftLandingAssetDark.gif setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Trust Protection Lists\Sigma\Fingerprinting setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source5228_207931940\msedge_7z.data setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\elevation_service.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Extensions\external_extensions.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\d3dcompiler_47.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\identity_proxy\dev.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Locales\ne.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_id.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_ga.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Trust Protection Lists\Sigma\Content setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Installer\setup.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\VisualElements\SmallLogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Notifications\SoftLandingAssetDark.gif setup.exe File created C:\Program Files (x86)\JJSploit\JJSploit.exe msiexec.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Trust Protection Lists\Sigma\Staging setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Locales\uk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\identity_proxy\internal.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Locales\fr-CA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\BHO\ie_to_edge_bho_64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Locales\en-US.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Locales\vi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\ffmpeg.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Locales\sk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Trust Protection Lists\Mu\Fingerprinting setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Locales\sr-Cyrl-BA.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\EdgeUpdate.dat MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_bn.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_zh-CN.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_kk.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\msedge_elf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Locales\sr-Latn-RS.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_ca.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_iw.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\identity_proxy\beta.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\mip_core.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Locales\bg.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Locales\nl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Trust Protection Lists\Mu\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Locales\hi.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_ur.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_zh-TW.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Trust Protection Lists\Mu\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Trust Protection Lists\Mu\CompatExceptions setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Locales\af.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Locales\ar.pak setup.exe File created C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\BHO\ie_to_edge_bho.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Locales\cy.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\identity_proxy\win10\identity_helper.Sparse.Stable.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Trust Protection Lists\Sigma\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Locales\sl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Trust Protection Lists\Sigma\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\Locales\hi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\identity_proxy\resources.pri setup.exe File created C:\Program Files (x86)\JJSploit\resources\luascripts\beesim\autodig.lua msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_et.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\msedgeupdateres_hu.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\{31543371-3E1F-49AD-AC6D-E72F218E3508}\ProductIcon msiexec.exe File opened for modification C:\Windows\Installer\e577e67.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{31543371-3E1F-49AD-AC6D-E72F218E3508} msiexec.exe File created C:\Windows\Installer\e577e69.msi msiexec.exe File created C:\Windows\Installer\e577e67.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI7F23.tmp msiexec.exe File opened for modification C:\Windows\Installer\{31543371-3E1F-49AD-AC6D-E72F218E3508}\ProductIcon msiexec.exe -
Executes dropped EXE 22 IoCs
pid Process 4208 MicrosoftEdgeWebview2Setup.exe 448 MicrosoftEdgeUpdate.exe 5184 MicrosoftEdgeUpdate.exe 5212 MicrosoftEdgeUpdate.exe 5236 MicrosoftEdgeUpdateComRegisterShell64.exe 5264 MicrosoftEdgeUpdateComRegisterShell64.exe 5292 MicrosoftEdgeUpdateComRegisterShell64.exe 5332 MicrosoftEdgeUpdate.exe 5416 MicrosoftEdgeUpdate.exe 5456 MicrosoftEdgeUpdate.exe 5500 MicrosoftEdgeUpdate.exe 5276 MicrosoftEdge_X64_124.0.2478.51.exe 5228 setup.exe 5340 setup.exe 5292 MicrosoftEdgeUpdate.exe 3584 JJSploit.exe 5552 msedgewebview2.exe 4864 msedgewebview2.exe 4280 msedgewebview2.exe 5416 msedgewebview2.exe 5316 msedgewebview2.exe 5296 msedgewebview2.exe -
Loads dropped DLL 38 IoCs
pid Process 1544 MsiExec.exe 448 MicrosoftEdgeUpdate.exe 5184 MicrosoftEdgeUpdate.exe 5212 MicrosoftEdgeUpdate.exe 5236 MicrosoftEdgeUpdateComRegisterShell64.exe 5212 MicrosoftEdgeUpdate.exe 5264 MicrosoftEdgeUpdateComRegisterShell64.exe 5212 MicrosoftEdgeUpdate.exe 5292 MicrosoftEdgeUpdateComRegisterShell64.exe 5212 MicrosoftEdgeUpdate.exe 5332 MicrosoftEdgeUpdate.exe 5416 MicrosoftEdgeUpdate.exe 5456 MicrosoftEdgeUpdate.exe 5456 MicrosoftEdgeUpdate.exe 5416 MicrosoftEdgeUpdate.exe 5500 MicrosoftEdgeUpdate.exe 5292 MicrosoftEdgeUpdate.exe 1544 MsiExec.exe 3584 JJSploit.exe 5552 msedgewebview2.exe 4864 msedgewebview2.exe 5552 msedgewebview2.exe 5552 msedgewebview2.exe 5552 msedgewebview2.exe 5416 msedgewebview2.exe 5416 msedgewebview2.exe 4280 msedgewebview2.exe 4280 msedgewebview2.exe 5316 msedgewebview2.exe 5316 msedgewebview2.exe 4280 msedgewebview2.exe 4280 msedgewebview2.exe 4280 msedgewebview2.exe 4280 msedgewebview2.exe 5296 msedgewebview2.exe 5296 msedgewebview2.exe 5296 msedgewebview2.exe 5552 msedgewebview2.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133581298482206696" msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\NumMethods\ = "8" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods\ = "24" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ = "IPackage" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\CLSID\ = "{B5977F34-9264-4AC3-9B31-1224827FF6E8}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ = "IRegistrationUpdateHook" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\MicrosoftEdgeUpdateBroker.exe\"" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{69E11C9D-4974-41A2-B067-9F26953CF52A}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods\ = "23" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\17334513F1E3DA94CAD67EF212E85380\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods\ = "23" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ = "IProcessLauncher" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods\ = "5" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc.1.0\CLSID\ = "{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine.1.0\CLSID\ = "{5F6A18BB-6231-424B-8242-19E5BB94F8ED}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 508 msiexec.exe 508 msiexec.exe 4300 powershell.exe 4300 powershell.exe 4300 powershell.exe 448 MicrosoftEdgeUpdate.exe 448 MicrosoftEdgeUpdate.exe 448 MicrosoftEdgeUpdate.exe 448 MicrosoftEdgeUpdate.exe 448 MicrosoftEdgeUpdate.exe 448 MicrosoftEdgeUpdate.exe 5888 msedge.exe 5888 msedge.exe 1492 msedge.exe 1492 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5552 msedgewebview2.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4388 msiexec.exe Token: SeIncreaseQuotaPrivilege 4388 msiexec.exe Token: SeSecurityPrivilege 508 msiexec.exe Token: SeCreateTokenPrivilege 4388 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4388 msiexec.exe Token: SeLockMemoryPrivilege 4388 msiexec.exe Token: SeIncreaseQuotaPrivilege 4388 msiexec.exe Token: SeMachineAccountPrivilege 4388 msiexec.exe Token: SeTcbPrivilege 4388 msiexec.exe Token: SeSecurityPrivilege 4388 msiexec.exe Token: SeTakeOwnershipPrivilege 4388 msiexec.exe Token: SeLoadDriverPrivilege 4388 msiexec.exe Token: SeSystemProfilePrivilege 4388 msiexec.exe Token: SeSystemtimePrivilege 4388 msiexec.exe Token: SeProfSingleProcessPrivilege 4388 msiexec.exe Token: SeIncBasePriorityPrivilege 4388 msiexec.exe Token: SeCreatePagefilePrivilege 4388 msiexec.exe Token: SeCreatePermanentPrivilege 4388 msiexec.exe Token: SeBackupPrivilege 4388 msiexec.exe Token: SeRestorePrivilege 4388 msiexec.exe Token: SeShutdownPrivilege 4388 msiexec.exe Token: SeDebugPrivilege 4388 msiexec.exe Token: SeAuditPrivilege 4388 msiexec.exe Token: SeSystemEnvironmentPrivilege 4388 msiexec.exe Token: SeChangeNotifyPrivilege 4388 msiexec.exe Token: SeRemoteShutdownPrivilege 4388 msiexec.exe Token: SeUndockPrivilege 4388 msiexec.exe Token: SeSyncAgentPrivilege 4388 msiexec.exe Token: SeEnableDelegationPrivilege 4388 msiexec.exe Token: SeManageVolumePrivilege 4388 msiexec.exe Token: SeImpersonatePrivilege 4388 msiexec.exe Token: SeCreateGlobalPrivilege 4388 msiexec.exe Token: SeCreateTokenPrivilege 4388 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4388 msiexec.exe Token: SeLockMemoryPrivilege 4388 msiexec.exe Token: SeIncreaseQuotaPrivilege 4388 msiexec.exe Token: SeMachineAccountPrivilege 4388 msiexec.exe Token: SeTcbPrivilege 4388 msiexec.exe Token: SeSecurityPrivilege 4388 msiexec.exe Token: SeTakeOwnershipPrivilege 4388 msiexec.exe Token: SeLoadDriverPrivilege 4388 msiexec.exe Token: SeSystemProfilePrivilege 4388 msiexec.exe Token: SeSystemtimePrivilege 4388 msiexec.exe Token: SeProfSingleProcessPrivilege 4388 msiexec.exe Token: SeIncBasePriorityPrivilege 4388 msiexec.exe Token: SeCreatePagefilePrivilege 4388 msiexec.exe Token: SeCreatePermanentPrivilege 4388 msiexec.exe Token: SeBackupPrivilege 4388 msiexec.exe Token: SeRestorePrivilege 4388 msiexec.exe Token: SeShutdownPrivilege 4388 msiexec.exe Token: SeDebugPrivilege 4388 msiexec.exe Token: SeAuditPrivilege 4388 msiexec.exe Token: SeSystemEnvironmentPrivilege 4388 msiexec.exe Token: SeChangeNotifyPrivilege 4388 msiexec.exe Token: SeRemoteShutdownPrivilege 4388 msiexec.exe Token: SeUndockPrivilege 4388 msiexec.exe Token: SeSyncAgentPrivilege 4388 msiexec.exe Token: SeEnableDelegationPrivilege 4388 msiexec.exe Token: SeManageVolumePrivilege 4388 msiexec.exe Token: SeImpersonatePrivilege 4388 msiexec.exe Token: SeCreateGlobalPrivilege 4388 msiexec.exe Token: SeCreateTokenPrivilege 4388 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4388 msiexec.exe Token: SeLockMemoryPrivilege 4388 msiexec.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 4388 msiexec.exe 4388 msiexec.exe 3584 JJSploit.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 508 wrote to memory of 1544 508 msiexec.exe 92 PID 508 wrote to memory of 1544 508 msiexec.exe 92 PID 508 wrote to memory of 1544 508 msiexec.exe 92 PID 508 wrote to memory of 5040 508 msiexec.exe 102 PID 508 wrote to memory of 5040 508 msiexec.exe 102 PID 508 wrote to memory of 4300 508 msiexec.exe 104 PID 508 wrote to memory of 4300 508 msiexec.exe 104 PID 4300 wrote to memory of 4208 4300 powershell.exe 107 PID 4300 wrote to memory of 4208 4300 powershell.exe 107 PID 4300 wrote to memory of 4208 4300 powershell.exe 107 PID 4208 wrote to memory of 448 4208 MicrosoftEdgeWebview2Setup.exe 108 PID 4208 wrote to memory of 448 4208 MicrosoftEdgeWebview2Setup.exe 108 PID 4208 wrote to memory of 448 4208 MicrosoftEdgeWebview2Setup.exe 108 PID 448 wrote to memory of 5184 448 MicrosoftEdgeUpdate.exe 109 PID 448 wrote to memory of 5184 448 MicrosoftEdgeUpdate.exe 109 PID 448 wrote to memory of 5184 448 MicrosoftEdgeUpdate.exe 109 PID 448 wrote to memory of 5212 448 MicrosoftEdgeUpdate.exe 110 PID 448 wrote to memory of 5212 448 MicrosoftEdgeUpdate.exe 110 PID 448 wrote to memory of 5212 448 MicrosoftEdgeUpdate.exe 110 PID 5212 wrote to memory of 5236 5212 MicrosoftEdgeUpdate.exe 111 PID 5212 wrote to memory of 5236 5212 MicrosoftEdgeUpdate.exe 111 PID 5212 wrote to memory of 5264 5212 MicrosoftEdgeUpdate.exe 112 PID 5212 wrote to memory of 5264 5212 MicrosoftEdgeUpdate.exe 112 PID 5212 wrote to memory of 5292 5212 MicrosoftEdgeUpdate.exe 113 PID 5212 wrote to memory of 5292 5212 MicrosoftEdgeUpdate.exe 113 PID 448 wrote to memory of 5332 448 MicrosoftEdgeUpdate.exe 114 PID 448 wrote to memory of 5332 448 MicrosoftEdgeUpdate.exe 114 PID 448 wrote to memory of 5332 448 MicrosoftEdgeUpdate.exe 114 PID 448 wrote to memory of 5416 448 MicrosoftEdgeUpdate.exe 115 PID 448 wrote to memory of 5416 448 MicrosoftEdgeUpdate.exe 115 PID 448 wrote to memory of 5416 448 MicrosoftEdgeUpdate.exe 115 PID 5456 wrote to memory of 5500 5456 MicrosoftEdgeUpdate.exe 117 PID 5456 wrote to memory of 5500 5456 MicrosoftEdgeUpdate.exe 117 PID 5456 wrote to memory of 5500 5456 MicrosoftEdgeUpdate.exe 117 PID 5456 wrote to memory of 5276 5456 MicrosoftEdgeUpdate.exe 121 PID 5456 wrote to memory of 5276 5456 MicrosoftEdgeUpdate.exe 121 PID 5276 wrote to memory of 5228 5276 MicrosoftEdge_X64_124.0.2478.51.exe 122 PID 5276 wrote to memory of 5228 5276 MicrosoftEdge_X64_124.0.2478.51.exe 122 PID 5228 wrote to memory of 5340 5228 setup.exe 123 PID 5228 wrote to memory of 5340 5228 setup.exe 123 PID 5456 wrote to memory of 5292 5456 MicrosoftEdgeUpdate.exe 129 PID 5456 wrote to memory of 5292 5456 MicrosoftEdgeUpdate.exe 129 PID 5456 wrote to memory of 5292 5456 MicrosoftEdgeUpdate.exe 129 PID 1544 wrote to memory of 3584 1544 MsiExec.exe 135 PID 1544 wrote to memory of 3584 1544 MsiExec.exe 135 PID 1544 wrote to memory of 3584 1544 MsiExec.exe 135 PID 3584 wrote to memory of 4484 3584 JJSploit.exe 136 PID 3584 wrote to memory of 4484 3584 JJSploit.exe 136 PID 3584 wrote to memory of 4484 3584 JJSploit.exe 136 PID 3584 wrote to memory of 2116 3584 JJSploit.exe 137 PID 3584 wrote to memory of 2116 3584 JJSploit.exe 137 PID 3584 wrote to memory of 2116 3584 JJSploit.exe 137 PID 3584 wrote to memory of 5552 3584 JJSploit.exe 138 PID 3584 wrote to memory of 5552 3584 JJSploit.exe 138 PID 5552 wrote to memory of 4864 5552 msedgewebview2.exe 139 PID 5552 wrote to memory of 4864 5552 msedgewebview2.exe 139 PID 2116 wrote to memory of 1944 2116 cmd.exe 140 PID 2116 wrote to memory of 1944 2116 cmd.exe 140 PID 4484 wrote to memory of 1492 4484 cmd.exe 141 PID 4484 wrote to memory of 1492 4484 cmd.exe 141 PID 1944 wrote to memory of 4664 1944 msedge.exe 142 PID 1944 wrote to memory of 4664 1944 msedge.exe 142 PID 1492 wrote to memory of 2020 1492 msedge.exe 143 PID 1492 wrote to memory of 2020 1492 msedge.exe 143 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\JJSploit_7.3.0_x86_en-US.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4388
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 45D5F4E5BD081BCDED9B20AD70EEE5D8 C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\JJSploit\JJSploit.exe"C:\Program Files (x86)\JJSploit\JJSploit.exe"3⤵
- Checks whether UAC is enabled
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C start https://www.youtube.com/@Omnidev_4⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/@Omnidev_5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9a11546f8,0x7ff9a1154708,0x7ff9a11547186⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:26⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:5888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:86⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:16⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:16⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3056 /prefetch:16⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:16⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:16⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:16⤵PID:6532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2160,11812852276272607258,7355356256954258955,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4336 /prefetch:86⤵PID:7024
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C start https://www.youtube.com/@WeAreDevsExploits4⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/@WeAreDevsExploits5⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9a11546f8,0x7ff9a1154708,0x7ff9a11547186⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,12097668016595197217,14421138795658202595,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:26⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,12097668016595197217,14421138795658202595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=JJSploit.exe --webview-exe-version=7.3.0 --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --enable-features=MojoIpcz --lang=en-US --accept-lang=en-US --mojo-named-platform-channel-pipe=3584.1740.70287620492148302154⤵
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5552 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.61 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=124.0.2478.51 --initial-client-data=0x164,0x168,0x16c,0x140,0xf0,0x7ff99f98ceb8,0x7ff99f98cec4,0x7ff99f98ced05⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4864
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=7.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1780,i,10982313493521338220,13371605940533383018,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=1772 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4280
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=7.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --field-trial-handle=1820,i,10982313493521338220,13371605940533383018,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=1812 /prefetch:35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5416
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=7.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --field-trial-handle=1960,i,10982313493521338220,13371605940533383018,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=2368 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5316
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.51\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=7.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3336,i,10982313493521338220,13371605940533383018,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=3364 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5296
-
-
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ('/silent', '/install') -Wait2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe" /silent /install3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU949F.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Sets file execution options in registry
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5184
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5212 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5236
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5264
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5292
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjkiIHNoZWxsX3ZlcnNpb249IjEuMy4xODUuMjkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RDMyNzFGMkQtQTBDMy00MDk1LUIyMDMtQUY1REZGRkZDRTUwfSIgdXNlcmlkPSJ7MjIzQUE2RDgtRjQ1Ni00REU0LThBQjQtQjQ2RDI4QjY0QTlEfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntCQkRENTBCNy1BNDNGLTRBQzktODczNy1CNEVGQTQ3MjIzRTZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7KzBqVW1ZZUt0WkFGNUMzZzIycEJCNUYwUnlkdGYxU0g3Ym53c25vVStmaz0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4NS4yOSIgbmV4dHZlcnNpb249IjEuMy4xODUuMjkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ3NzA1ODg0MjciIGluc3RhbGxfdGltZV9tcz0iNDIyIi8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:5332
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{D3271F2D-A0C3-4095-B203-AF5DFFFFCE50}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5416
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:1608
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:5456 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjExMC4wLjU0ODEuMTA0IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI4IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MTI5MjI0MDEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM1NzM5NTA5NzAwMDAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTE0MzI0IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0Nzc1NTg4NDgwIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:5500
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5A9F70E6-21FF-41FD-B605-ACD85CA6221C}\MicrosoftEdge_X64_124.0.2478.51.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5A9F70E6-21FF-41FD-B605-ACD85CA6221C}\MicrosoftEdge_X64_124.0.2478.51.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5276 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5A9F70E6-21FF-41FD-B605-ACD85CA6221C}\EDGEMITMP_77B44.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5A9F70E6-21FF-41FD-B605-ACD85CA6221C}\EDGEMITMP_77B44.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5A9F70E6-21FF-41FD-B605-ACD85CA6221C}\MicrosoftEdge_X64_124.0.2478.51.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5228 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5A9F70E6-21FF-41FD-B605-ACD85CA6221C}\EDGEMITMP_77B44.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5A9F70E6-21FF-41FD-B605-ACD85CA6221C}\EDGEMITMP_77B44.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.61 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5A9F70E6-21FF-41FD-B605-ACD85CA6221C}\EDGEMITMP_77B44.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.51 --initial-client-data=0x290,0x294,0x298,0x26c,0x29c,0x7ff6993178c0,0x7ff6993178cc,0x7ff6993178d84⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:5340
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjkiIHNoZWxsX3ZlcnNpb249IjEuMy4xODUuMjkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RDMyNzFGMkQtQTBDMy00MDk1LUIyMDMtQUY1REZGRkZDRTUwfSIgdXNlcmlkPSJ7MjIzQUE2RDgtRjQ1Ni00REU0LThBQjQtQjQ2RDI4QjY0QTlEfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntFNTc4Q0Q3Ny1BRjVELTQ5NDItQUE1OS0xODFCNzczNzM1QTV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMTI0LjAuMjQ3OC41MSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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_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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NTUxMDU3NTI3IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMTc1MCIgZG93bmxvYWRfdGltZV9tcz0iMjkxNzIiIGRvd25sb2FkZWQ9IjE3MjY4MjgwOCIgdG90YWw9IjE3MjY4MjgwOCIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iNDQzMjkiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:5292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5300
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x4c81⤵PID:7072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5386961c480398d28e0c1b7f65eb7667b
SHA1cceaf07fd7ae96f6829e16826f264ab91e724335
SHA25665a51285e259c92ee7c9329ff5695d36c756c0c30eb40ed95fd1a46b298a1aa5
SHA512f63753885bce128ee4bea1080a93a9401c865b4b66eeed00e587d8e9ea48973c4566fefe403b391fbf5d50e40c47f152e0d59b8bebf7e315a32bea2a7c93bcda
-
Filesize
9.9MB
MD59025b1a81a264417aa8aa18a56075f88
SHA1d3b0c130acd815e9f7430d7f0857b05430420279
SHA2562a19e43202cef88fdabb63be7811cb4214ed455aeac227ea6a86b19d60a9d14d
SHA51263ea2d941ba66a30fbd57aee2758129414563e556479ff8e0911c4db0c8d2827ef58750b665e1b630009a730f542f790f771c89c9e5148747b98a4741c334d7c
-
Filesize
6.8MB
MD526ef24e23b9ae5aaaa204a4b6901a6c9
SHA1d852dce2672850096d43ed7a9e30ca72f44eaf73
SHA256073aec6b50085f135e8e9903806cf817950cb09b686e106d7cf9edbe6296b8d3
SHA512a538ea6a04be7928e9533149b681d7371c6ad7274ff87207b3004ee4a436d64c5b96668e3bc91b30227dff8d5a2b30b81c50af7db99a413077f18c008d021822
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\124.0.2478.51\MicrosoftEdge_X64_124.0.2478.51.exe
Filesize164.7MB
MD58f229750e00f388f5de3e974c351efa4
SHA1568c2bca689fbf870a965cb4867a76a2f5549fdd
SHA25692f8f1114c969dde4b8819de90c6b0662e9183c733e1378a64375fe4051382a4
SHA51209d00746c57f3928eecee36db144385b0013e307289a007a0983388ec3a45364edfbe4ded94f39d8c083a2c27d8ffbfe608e822441dfbf728cad880629a0407b
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
182KB
MD5e0a4142f6fd7098661dd27f41f6b51d3
SHA1b92bed61c6b66f958878f498d4e7bb3d23e8975d
SHA25652496289bd868f12474d9dca3f063853923f541803388b427487ef63f52c6e8a
SHA51242d071c4990cd2d5aefe53ba91cf0880810a003236675d7f251588a507d2654db332b940962479f97811b7b83f5f686f5ff662df4ffa124552fdb0a1be8d1cb5
-
Filesize
201KB
MD524e62a7c8d7f60336e60c003af843a87
SHA19576d1924d37113c301cadfd36481586cdef870c
SHA25643f7de9fae6b79a844d7da6056ac82beadf028a347e227c2bc33d503f7eb402c
SHA51234f33015d3e7cabdea2ef39f7f149aaf39caa534b188a34021e577d68bbc48d1d99b7b13a1303d4ebaf5c29fda0bb573f3a6cb171aa2db67cc4b25292eac4a36
-
Filesize
215KB
MD58200a55843c5c0da5ca8e01f77038bcc
SHA1cdf2588a010fd6ac5536f9083076c480e05eb43d
SHA256098eb4c373a48ee49681d83f9f03e3701f6dfd5361b6a071242ca23b3162ee96
SHA51210780aa7a9d2021f7dfa2273a641f64ca37a941ec5ef08486becf2422e76382f424f9aca03925adb964e2423322b62ba4ff87b4ae8731e7d5743ac82e33b75f9
-
Filesize
261KB
MD58f559de7fab651b2a31caed79ac2600d
SHA146c7ce06e6592c391dfb54634b5caf136f5f6d7f
SHA256a1b818b507c87bab9e3b4643ff68e6e35f05872ebcd1e8075a68a4cc87650df6
SHA512e975ab0175a363c56da03e43730abfd0dc90e14a486a0f04ecb40c4f2279eafd29254ff69748930d102fb8480bdcbc86611105fccb18028f60e7b3f451c6a69d
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD5c1c4e3a4d49561dd0f6bc85f8062530d
SHA15394c3a4a2601a6bf7b06b5ae9119a3f0c95c974
SHA256e9f1d362867beb3a767233de9d5af3a6e2762bb0627f291c6cb8f9faffb922ea
SHA5120e7f6d2a29c48d99fb417c630287d8d9e9f0365f1c1f2e415f0fc64e12e577c9d4e93bf6573a589e88c75a9dc6c5758fcfd970588c3d187621f8aff8e5ffc5b3
-
Filesize
29KB
MD5bd6f3d4a46abc156e47fe0d6c312a203
SHA1dedb517b1d75993df4d7140cea0a84afebbfb22b
SHA2565294a6e08b6f9818e89931eda4a0bd4ac3949c3f17ff036c1c5e2a6de8df458e
SHA512bee57ee4c14d4c93a125f5219894d10f68982e3f03fac8acc90f2f9e159553ed82aee373107d0ab3b6d5aac2ea8cd58ecb0138de8f6ab28d5d963c28d0d84039
-
Filesize
24KB
MD5914899c76f15e4eb33455f50f60e9e25
SHA1a66113325b547638824d5fa020e4b1eb0c3a4a96
SHA2565c0b6bcb983b3ec422c1459802c993219b66318e8b69ffb09f07ccb28f607ffd
SHA512ee2699489c6496d9db21484771a957acff27e39f2535d74f91dd352432b33ff15581ce4d9023a7ae273b7f2d8729103c5c06859e6cbcdef2c6ebda32ebfca3e8
-
Filesize
26KB
MD5b06ae2aaa639338686ec4f4445173ae8
SHA1842f67cab1334871e81e6428d23827505055a9bf
SHA2567e0fbc3af82b58dfc244d17d18335fac1c7e72d87d9593a359a2390a241450a7
SHA5124b8bb12b11074ce21314072577a7172dec62926a7a628d6526db46062354ad23c2e76b2dcc93e489c9ad17bf2a1b3782d155193f1ea24eb50c8fa551d40486bf
-
Filesize
28KB
MD57310b6ae3b95e9a1ca5b60b3fbd619f9
SHA103fd7d4d53fd38cc8b48d837d5a43788a6bd8ea1
SHA25665dcfc983496529b89c575451c6a897b4491f886783228526e06417499b124f9
SHA512d012d3a27bd7ac166c3ec3614423b89216ff7dcb165d99462f01ac204117fb5afc525d448f8c250638f0ee11929e2c5be61447f83089a4cee9cdd26459656687
-
Filesize
29KB
MD5af0364c9356845870577374bc5609ea1
SHA1be464b53d5dc8a31a32bffec2413081a330f0170
SHA256813220adb207a07ec609a757a10217bccf22bd3742e3ca658324add81849121c
SHA51268fecac6bf4e00fcd5c6c201c1756da13a3d87e4cbfa64fd2d1ab986bf3124303724f5ab9576bf33542d8a0f64d70069becd61182e4c6ab46801fe49a2e5be93
-
Filesize
29KB
MD5e3d3b90ed17afc3312b22051de516aba
SHA16dfd177bda02980ddcb21459969c8d21b4a42df0
SHA256ee36812f90b3a1b5f72c512d44d312dc0d72404d98222bca8ea27ccc8ef106ae
SHA512dbbe7499f0218e2628c357b5195e1f19349e79c53309daa972e294b19582c86d91a23b642c3bace74b0b7d7c94920931db7548178e0b7324feb29b0bae156a70
-
Filesize
29KB
MD5690f6eaa05e17f94ef59f988f052a4b6
SHA1a3703cd237aa460e2729657a339febcbf8b8a863
SHA2565a6dd9d9fdf372b723e8043881d4c39fcaa4f70c838fefbfb192f9c11b18fdf4
SHA51247aa48f8de124d928c0b5d7f635909b3bbb6e640da67a0f014e00c238e06b060540b98a99fa51c9ce1c37baf9ee149502e05a753a25608b00ec7da39526f88d8
-
Filesize
29KB
MD593a91259d51cf1260bcea708c44319d8
SHA12d76d5f7afa1be815838e1aab109973006e3d0fb
SHA256a1ab052c365976ae66b6b851a2282636c2c1f1b838a929e761f374472f0bcc55
SHA5128c3d7bf11796adb998362343399a85ab5127f36f7ce64d575cf9918724e09a21ca8cae0cc0123290db5bcf6254a7b10d979ad0c2a7251c43529edebce85279e7
-
Filesize
28KB
MD5c7fb8690962bd9a9051cfb04b87d3ec3
SHA1d843498bbc3ae01fc0f0fce13160db723696767b
SHA25612330d302841d37fd8bb5b74df7d454062524fac88e954041ce485ac818122c0
SHA512ed074b0890e5cfc2beadab8dab624687f2838ecebafc3da760e248c315201d2230ac6197e016ce480e1798d34e6bd2329e5bda2ef2d329207f1ed7f9d00491aa
-
Filesize
29KB
MD597dc17c19ea5196783b2a20ce423697a
SHA1693744a6f679cb111fca1134dd5efddf90b4b13a
SHA25605b78e67f9400c654ad368d3e63b988602cb2cb89ad486ea340bfe05acefa040
SHA512cbd980f7a99244bc47bf631bf6e661adece2c5d3f998172cbcdef59aab9cedf8226f15222cc9d96c56153c08d2424de70967dd96b76ab629492e25ca8660c974
-
Filesize
30KB
MD56212f397ffe20c6cef27ce0ff4fef439
SHA17910895fb0b9ff6f954ece32aa069507e6914a45
SHA256e94189425823ef69f9bf1f3cc133c23e67ad46419cc455a21d4090bf73a11ea6
SHA5125f04d8c9bd0269ba87bbf4b6a8af07ba426784c08b0a88af4fda3555e1c4e192b56db3c6f0214433fed23675ffde8b0590e5b39bd6b1011c2aad71599ec47ed5
-
Filesize
28KB
MD585f99091263667f3b5e10ef585c6e31f
SHA1de83594f08a9cf2df74b4100827d2a68d0304961
SHA256c73bdd7c4c4d89f9e0c6827f4f2feb78efd4cb047253aab3cf48412b9a78fb7a
SHA512272d8d8e45c5c9d96af41431747b09814b11ae7b08955e598b07f639277cfee8cac11455db43530d78a85ecb095ad83a8735d3e80f0e745629b0091fb0b8a2ad
-
Filesize
28KB
MD56ce4b22b621bf021bf79117a13118280
SHA11b35ca44973ac7bbdadc4d6f3d160ab15ceb47f7
SHA2567aa813b3bb3fbbec5d56da83d5b1db923be9c365511b1b02588336213fede938
SHA512f8deca730042198c2b4fe506b6ef1af62b0e1dd1983b9e92e8d4247027f30d07cec7ff097a8304226ff96cdd528208961754d33403f20463d0b6802ade2cfde0
-
Filesize
29KB
MD5bf382a14c9546ca8a6311f6b5df66d75
SHA110b61ba1e20da2b1b01e760caaa179256aa844e8
SHA2565e516cb414cd8adf278cdceb2ae537cfd7c49c277cb5d7718bcf97897350ce70
SHA5120172c495cc6213b073056dab89979a05ae9eabb7a04d2cc7c16206628f7eb98396909a1914055575b0edde75e53479739c54eae1b9282eb96172930ee10935d0
-
Filesize
31KB
MD5642225f16e2c841a23eb51dfc6e0e1f6
SHA1bcb8ed686351cc56f8c5c326b1032eea7e07c4bc
SHA25695643c34f8ba13738ad3d19a4eb6cd52eaf39f55cd46b21e148627866b4ea30f
SHA512d9fe06e5a81dbdb457f93435966e4321c1b0020e68ca0c466d870e599206a9f1b245653259a051e885cd8b88117881456d248308d278af86e6b3f75f41918b1d
-
Filesize
31KB
MD52c1b44a6c27b8510335dfe8c22d01840
SHA1e2c291fbf5a709a7a1e3c5ad507fcecf25e11554
SHA256b15d11ec96c712d102125d2e1de19507889562f857910e6f76a400d412c4afe4
SHA512adc4171a9335721c13d9d4c71ec0eaa3e873ec1729443b258eebe9ad723380bbf3eb912415f650ac3c8a13d31b658acbcc8cfbbb6fc6453eeb82b619a35e805d
-
Filesize
27KB
MD5985d279b815e130a790eaecd697bb5ad
SHA1bed21cdb6b3983a86fc7fd3d4e0bdf2a7690807a
SHA25622a5f81e478dcc8d54e0a0ca10a66ff98117698883d9fbdee36a110d6554f14f
SHA512018c9dd127a8b8900236c4c10c7770384db82946f6f1646878683960dee06b150558e52bf55a8003e7467eb9b1359d24f081539c644b7c11efa5e661e645ba4e
-
Filesize
27KB
MD5f5f1ed2d55637a183674959e82cab3c2
SHA19472086a62950c6b40e1ecefc1fda4573e36ef3c
SHA256cfbe36dac5d40f221f377aeaf2e983dc76ab3667f4672676a8fb37c7bd4f9fbd
SHA5129c4635f791608f815e359ce49f7535bcaca404dd4932efb23f638bc9900cd77854b1d38b5ca60e5dbf3e252cf06bb179b4d9a77368b524233117f48bef345013
-
Filesize
29KB
MD567ca727bdf1e5fd6686fe3e6c1b1d43d
SHA1d3ee7ce26c3b1eb4e0fcd5af6f83bbf3c949e8df
SHA256c54a461e2eeb79d7462a4f3810f720835a2827ca752282c01520b8fede5c65da
SHA51268e93cae35433f27593f92d1741ba98a430c6a408394de4f10ce0219fe8213e7878df71747c597c7384660ed696e35dedc08a1d15d5175f9b781fa70d92a3dfe
-
Filesize
29KB
MD54dce98d8ab8857371dc4f787c77b91b7
SHA19d8569edcb1af0e122e5293495f94b388a3c6f3d
SHA2567b79d2f66bdfea60aed02eb60f3d28d396c23c147e1d42f3f10a82b5d3afeb47
SHA5126f4ec5f3fc6f5dcc77d2e811b9fbc4dd00dd15385739888e81835624bbc5e5d32c11eb23bc5dc4e6e9c2b66c77c923efd7edb81f9d8b88b446ba244455881fb2
-
Filesize
28KB
MD528777e8a0de15e07d365f375b71796c3
SHA14f3231a68e7d4817c5f6ab20bcfbc208ba63b6ea
SHA256571aa6917ccbfe221dbeeb485b9f9b358dc2b3ec72271854f880fbadeebc9665
SHA51287a14421ba72f5255d568c1be6f8e108db587525909ae33cd84526714ff89a3ea2bf9c9a78c11718fc3f22c0139ec2bb4d9cde2327cfd4a8dbdd51e992d7381a
-
Filesize
28KB
MD57ee4925d3b4e4116b0b4d61a03ffdc96
SHA17f6e1116374314527100ee854ef5befcb962ce77
SHA25699fd8800699829fd0ad767eff54dafeb913a6261ccb5c31825fdef6835653ae9
SHA512c6ef896870d427fc2ee783bc38b187fc5485dfa9c29f14f4b044b060f2385b445dd051c83a9412d3fde79f929755239061ddcefb012f8fc38ce257c87dd9a8b5
-
Filesize
27KB
MD5f1e551e10354047b68ec1aa1b36327c4
SHA1417b267661838c0626a74e1232154d8245c4bb0c
SHA256171ef4f700c8bdfe146e9ac7306c72b7a41153796d23e526aa6852a150207463
SHA512674ba129c8e1b2d9dc57e77595a994afd8e19f81cff86dbd749c855aff1ffec9c7e9920e1d45b193d83ec6f20ee4fe5966415006a0dff357b471d97b271fa067
-
Filesize
28KB
MD573b893cd1d2d759f98944e8809db3ce4
SHA170fae4564f9eeb3c503a13eebbcbe725e9c2caae
SHA256bc9ed2615e5e6c185c20bbbef898e5ba1543b6dedb15330080dc41e74a0a5df1
SHA512255ef2552a35cba6fd41b53cebee1b9749485017a053668c1271aaf0056bd08107dba6c842a926c83d78472c92aa92f54fbd84678557dc911d20fc190ee242ed
-
Filesize
29KB
MD506fc13625ead1257583224eae1afe1c3
SHA102f3de2d81c4c2868a73211d8096ae79c506d846
SHA256ef3f30691b45838caff42db92a4d6cb8857c8c36ba4b3ed9bd600bae8dc0fcf6
SHA512b2fb89890c6ebf54a325bb1023194f461b532f94113b3ddbe337aa556b0db38159643c57e41b121b3bb21c4e547bd3e89137462a3fa29608e0dbcba00aa9cae5
-
Filesize
30KB
MD530c5a417363b47f3a58d08e44198dd17
SHA11e979631e34cefee21b8a0e0aa22f4dd6e30dedd
SHA2561e76475df6a8a5889f0757584787112745a3775c8dcb04257a4ec0a2cfa58b9a
SHA512691e25436186bbda91b471b5451d06950943e6efe653362be50a3f0d21f341f4b8f751c617f39ab04571d92ef93c04b9db04192220173b66d879cbd5128f7287
-
Filesize
30KB
MD546b4263a73c35d717d65eae93c781f81
SHA13f8678c63d174aa8289d20b7f821a326c33ec07d
SHA25688661266d279b161264678af48fbfbdcaf28b1f8821336b3fb16e2126c5e5e11
SHA5123453b80619277b9efe19f2302a2a2c94372ed2ccec2a01d07741fe037f64e93b281757669750db8e6cc2efdef96b0eb1e373211da51ab887d8f0eb748931cce6
-
Filesize
29KB
MD55381426201e98d1e6efd86d24e341f62
SHA12b2df88be65d0512e140931c2878563345c77dc0
SHA256e3f7c7d612945fc79d2e47872898ae3831d4bcc73bed8d24513780612fbc0523
SHA5129e6aed7dcc33f7c9e9a888da580c2d1e4732e3a61a04bc7e682c11aea53391c82d849e341a98edff7d4792b2d2f5f0e61730d12e19fc5b2a77a5a1087c2b9fab
-
Filesize
30KB
MD56feb8258912fca8354160c02d70de767
SHA1d04f918370da6a637f5a032c8bb616ab8d0d9b64
SHA2566b13e8b6149be225e7f35fbccfd84cedeed9219f06b70630db6bf4be598fa25d
SHA512f69ae204b6569b1cea77fbcaab30d556d325fd18989a347837cd08eb669dbc6bb7794820cb3028f864be7109af84c8532525242063fc2d1901f588fb458dc02a
-
Filesize
29KB
MD575c582abc6e13902afae51da71cdb3ec
SHA10f1813d9992209d9fe60bcafae8f8652658832eb
SHA256587b4af55922cbf961852d0a9234c77eebf0ded6e561b18b09bdb2b2d8b2190e
SHA5127afa52772caf93df7cba83fcffb8b427860dcd92fee4ac732f42b5db11c3c5ef086b212bda555cb095e23d89669e0e8a31c55ca59d9b00e564c5b7ddc43de4ad
-
Filesize
29KB
MD580f4ee6f0158c5a2f50e90ab12051ef3
SHA14a0daef60adc57559bcc22a5b071a0609de82b75
SHA256066e0e6f67fb92785002e0cfdc09777b330c55cf8d34f9597ad45aa5c2171849
SHA512b6cf12625f54bf1855797100a4fa3a5fff0e4c6fa8448ea78afdadccc2639237b34a4b058592a783d5918bdcdafe562d8e8bb59fdec5bb90f3f356fb94e70432
-
Filesize
28KB
MD52cdd815eca87eea8363d7789cbdd8595
SHA13dec86ff3c88b96da8ebdf340d149b775f84880c
SHA2560150d75f78763060d4b5b00e1cdc87cdd6398fb42666da9a733c8b708f3f53f5
SHA5123d66a2b955cc31885df66b9ace4f472136ffd94a00ad769414831f4df66e5f1b44b1d8787e781fdd2ef4300ab0e03b4ecd638f46e39958df7a12281ad6812fcc
-
Filesize
29KB
MD5a2027e9099d943f12ca8a5b6f3f216d5
SHA1b9060511354ac7204df9aa441fb084886f135034
SHA256c74ed61b07e5120798795de86695b8b80255f3111b77836f89820df27dc09b87
SHA5122ea7d141b568ac5df1ba6ccf2af3c4c4acef080763e68e3f3e2b3b3ffda9deda93fa1b9a4e19541afa1f4cf2039b576df23ff98c68d96213944d4f942266ca44
-
Filesize
29KB
MD523a61f4e352d09431c3e6ec05522fd84
SHA1c663b459ce508255cc7b09615520142694526191
SHA25665c0d3996fef2d9caf87e609fb16173c1b35a691a71d926ed3858955566be3fe
SHA5124ec261b2b4b32219eb168da8c247152a1ea4139e577974c0ab571ce84301fde030cc5c3fd554ab4f8dbfba9059be51b6ffca4eef996d5782968cbdf94a474133
-
Filesize
28KB
MD5874409f9bd74f4238e02a15ef3a21d94
SHA15e0336c6717345d102c4b58032e43e2a316e92ca
SHA25677fc8dd2400150d098583ce867fb98c5beec0f0ea72542418a8a99451af12fe7
SHA5124bfda3c743f435ad88db71feaef1a8ed9706adb255d68dedf7704af618476191524e0d9fe19b2213542ac9413f05d4673eca1cc94b00f5d4191868b59e063d5e
-
Filesize
28KB
MD507aa8bf27778ef275b4f7a5242eede66
SHA1386a57f02a521d373466eef276d59c69409d6854
SHA25660e6e4cdcb2147a4a516198746adba553bf9da839a2979222efb9c4220399ec6
SHA5122e529fcbed1418bd2ac674e21d49636af0e7aaaee4f2a63bc17a13a19e43ed9c7c55335089f3d73b232ea911ba384639696a33b603e2b5bc0857875ae78c8217
-
Filesize
30KB
MD522edd8cd3e92e093ab858277552a42fa
SHA1cd5798edcb6ff59a1592bb7a0e044599b7bd8d9a
SHA256620d1ddd4ea912b58589ca415dfd80c78f49c3bcfd6012512e309c4556ba932d
SHA51254838f0c7443930cb3ec1335a7000344453b62d4103bb0ce805a5c5187d63bf9016c9b92ef8a2437e1a9abc5c4b1a632d4c95bf57c217adbeb33dcdf50b68dbf
-
Filesize
25KB
MD546cf423c6ef9301ae776b8f31a0163ba
SHA1e45a34cd8e0e96111c4ec547fa22d176b185aa01
SHA256b4e700f59f1362b0ff2a6987a5a4604225f6aa02c897bfaeafd0cd220dd02837
SHA512c5e567d6d3aa19cc51ec258e596df2c9c742fa135ffa84b1a33b1a4a8b2c74f6e2e2ce0ee1dadeeac55456d2c2d949a440b4ecb9d0d8c69b57c292844266493e
-
Filesize
24KB
MD5196a62a2a30088c4f8f0b637e972dfd4
SHA1cd650889e43abce3a968778e7f47b9f7cd791f64
SHA256fcff08b2b6eec5c1d4a833e3b837923c5fd3f3789a42f9d3683c62e7d8320940
SHA51292861604f2f2077eb70df34fb1b6f91da02a144ded1afe84c7b3878bf068f740ebdef5402ad6832b4c87716d271548c5cc04acf472d3d1564a781a3c5dda5033
-
Filesize
29KB
MD55cfb34e296eccfcd63a6b86fcf04369a
SHA135fc9121ed4901d2213b612194dc6865bb3f4bac
SHA2566ba87a9a475468dad616e007f7953a5f193039714357361b4b5e64c7f4123d3d
SHA5126ccdf706485a0e719ccc806deb4689c7682f269b93869aac746aaa6831c5ebbbdc8b3acc6bc5aed61aeecfe48a37f63357722e55e2c806bd91691098af486247
-
Filesize
28KB
MD57baf1dd8638a4e15c791ea503de05aee
SHA1389fe381c5a903bb3fc1614fe5960c1b16d491ed
SHA2567bf3cb81f44fe8ab41b4f9b221a3c1f82de5388db0aa9b94fb60862748d2862e
SHA512b24bec0201a6246e2ccb1587466c7dfa186b3dcec59eeef1fc8db098e702a8eda49211bbd87e6fb9c553b3e70c38c1669b32072d572d2e8139d015f0710a53fb
-
Filesize
27KB
MD58cf564d06f56f0ae3624731d54728df8
SHA1deeef8265d72e6b7b94bf14ae55cc2b86f39965b
SHA256e9da52655eb8c5ad50560fd31b82566fd1342a56c2a0fd0cc3790ede20a274cd
SHA5128a9f057b6d861956e415c2c3709b750b9a4b3ecd50eacd7b1522599c0a053b218715e0ea3a0b8862b4ec66446b60aebc0a58ee024b52d26d4aed1a629b1dfb7e
-
Filesize
29KB
MD5c462816fc1331ff6113f4a3150c6e1a6
SHA11f7b88b8be5c3a44fbcb91182e6a7f22e6c96936
SHA2561303b13454b14dd66e8b1cf457cd4433cfd80c073db16a792dc4208288f39f6c
SHA5129ce9e599b652668b8d7c54b88662fc150227e91e8e78afe3daba725216a5853bba68e7502a99a118df03a524b065489297cc2b427a51608a6c71bdef815c490f
-
Filesize
23KB
MD52da92995e9d08cf7c00f7cbbc9a311ed
SHA1dca7524f8678a87931a86b9c5c16a40dea7e343e
SHA2566f8b8f4d016e36aeec4f1ee98b92abe3c3765e56fc636de5942c452a7eb58b50
SHA5120e1f7de9e265dfeab5af90042a30855e3df704790c98dd52d1732b0cbaa178d660990ec91f6e4d6f18f5e978533eb332fc7c03821c3f2d95ffd6f6cd76c66f4d
-
Filesize
28KB
MD554911ee16c6eb782e8b99059b0375ef8
SHA16a29f919b989bde902062a67d161c95a8ea1f28b
SHA256eda04490b96f2d84d5797abbb1d701c3a285c8e7c8080d52490403f00fe269a5
SHA5120374744f14a9a7d002b6ecdef8b7b5337643bf1ead8d26fd601374e37f5e9c95b6670050403f4d33f319ba72b93bd5c32f578d305eb2265368f988bbea02a0a9
-
Filesize
30KB
MD5d56474ba5aeb783e7de9ab3b0f7e9f7f
SHA1456d4ab0eeae04f10688fa713d0e3ba5cbd3dd8d
SHA256f8f94e6911d5d53475b5fab4286e2574a230b47a344598fe346130d3a3659746
SHA512efcbba3a011da9b97edfcc4e3ba7be78eb25e378b2ec7e0984b6781f72831c4a102c3e04e703e37e3f051ec9b2c1a00199dbe34818163f4731558f66e6787926
-
Filesize
27KB
MD53c5b463a336bd40a68851b5f8e257be4
SHA143c8ac429deb842963ac6ff9bfcad45d1afd4c99
SHA256b31cf5496370b607a747a04c984410dcc4c721cd6ff8182c1fd1ae37d802f963
SHA512d56d964ee1d43beeb7d764c148e3d90e9a8af94ab987ce307145b2d07d70c14deaf9bcdc64688438dfae1ee0d9f323d1893b7c57bcfa3bd3d5203ae36df961af
-
Filesize
28KB
MD5aee2ea9d2d8fb9df06f9f46c95688bbf
SHA15319a6a0b85b0d46a77be1362c4e778c5d2b63ff
SHA25617652385d4d73afadcc9c6ca0925b44dd4d20eabd67848a66a49d4302894952a
SHA5124a5e75a0a4ffa97c6d31225e953e6deac30d71e7b292b4e9b04b143a212b10f62b5df59c552009a45633ac9f56f4d60a85bafeb5706be370ae1be86adfcd4420
-
Filesize
28KB
MD561c33fe81c8cec70b9a1fe50188000cb
SHA1ec9de07380cf21d47129f276bb91e06b3f59d239
SHA25627dae16f95de324f1b9a9654d677ade6c1eac763683467b0c68470bf27decfc9
SHA512bcefe56a2ffdfd5349e37e823227c0aa08f4cb17b36db84573a70d76a6163f03b25b64771cddccd1d378ee646b3c856a2adbace830173249195380ebf53d9dab
-
Filesize
280B
MD5ab7155d3f6058334d0cf9bb0c961bfc9
SHA1a979a8ded3f10fa00a94a83d254cec55578c172f
SHA25689e4cd72a13cc2881b789e4c4d1323063e52981cc8403a65f4a035c94b438680
SHA5121d252c5b6cb2bbc6f2748acc0435eb11a0f9cbcd51469c77f499bb51aff1ea203662b931faec4e0375cfbaab931b13772694ebf57c7369983759175622d69f99
-
Filesize
100KB
MD5fdae358cd3b13fdfcff160f90cf247b6
SHA1d1088cc28dcb6447ef9709c49f6bc2250b976ab6
SHA25654ad0ceac3eb4c30f8613dfa94253474583b6cf144f1821f2a4c96e1b502b1ab
SHA51202c1c7bb821e5ce9d73b17b1024d17f90d9d52d2dbbb1218d0d20e5c7704f75e03eecd475931fe03c2cbe4267cf0ee8fa1b0dbe36599778632326925bd72c620
-
Filesize
2KB
MD5cd5d0eba8fc7e20a6eee6b2ff98d2e34
SHA17a91dc65504bf3931226706858caaace4a15938a
SHA256cf7eea3d1bb46158e3be2def8bb265f924d09aaedacb6f20afc6838691d99a05
SHA51293ba92f3cfca15947cc1f0b22b874431c5c2fe72579b7faf8f1a01b00344ef2bdbdbacc11f4d979a413051b1094647b05f1123ce102e7af5c403d38517290143
-
Filesize
1KB
MD5dd871b015071771604ae6db597063ddd
SHA1a753aae7d62577524fda854183e8a3a5eb61bd78
SHA256e298135f24c248d020bc8498097279c922e37ac184eb0d1c226501b23755905e
SHA512071d2edf160086a0c20786f3930baf0ba39cf0c15173625ed5171809913732cb49892888a401675b623122999eb82a07ce6784cf1ce86c507da947ce4d4e3251
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4c67232f-49ce-4a71-aeb9-2a9d09e5758c.tmp
Filesize6KB
MD5ccad3046597b5d0875ae67b1401ae167
SHA160f18187bf594c9b304858906295ed16122bee71
SHA256676d4bb513da09f40d61e7666f902a8ffd56e131f69906bdaad22d78f184fb0b
SHA51287ddfb72fcec9afe6b0e627e5fb1a1180b2e904d69dee326fa3028d4556852d29af4c99e18bef306bbf9dd088646bb687830a12409f4d7e320714df439515cc5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD56c34c55c483e144474ab9c4ec68b018c
SHA1d4ec7c7fa5af4236a3f90e801ebd83a837f44e21
SHA2564a9b339e124971fd3ff14bdca35238d1fac73d4ff79edf5f958673ec60ce4f74
SHA512b8f9d16125f6dd1177b1bd1111d0b5382df06618828a5ccdc20226f4e335d1227a37a4a2a5ede64988a1960b32958b6383ae2098a80f787dd979dba8a52614ac
-
Filesize
1KB
MD5453f816f866d66e3f5d5b7b974047b0b
SHA192b93ccd79ba0be05f40e2f74e84ecc572676b30
SHA256da035353e0521fa242804a64c27c819835749fd30725fa20f50401ac8f887b2d
SHA5127fad4962cd05bf7ac0c6a9343faecffa7eb72a0dada2ac256fa9957e9a9943d073697800af6fbaaf6e070a455316c87d7c2b40d2238fb8a3aee10529bcd833fe
-
Filesize
7KB
MD5f4516abb717c5167f3c5aaeba6497821
SHA149ea0522ba926c1ed869901f8bf8e33295b68f67
SHA256a604f85f687c8d2fe6ff40c0b6f5663f04aa3056c2cc400136dc43a096ea7c57
SHA5128f3cba591dae7d5c7db080af838e00f0ee0466b3af1c94fb2e5bcac6905064a659809e19b9a1058515f7416ad85fd9cc7ed23ebe4f6e7c7d0ded21db3870df3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\474b1f40-c61c-4de1-8e11-6eea96c70245\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD5e6ac71d5009565d0405dbe3582efd91e
SHA1d51faf466a001f12ec950f81e64374e1eec39edf
SHA256b262a4991c4106b01e31d28c5da35ec960cb33c3d5838261b60ebf16e7f4d3e5
SHA5123619bc6ec5c753a9dd0a517baf430833479d4f9ab57838cf5de93a95320e01ec7087cad7b0397f3efdff6cbc54cea42b1c5bcfe5feebe7df60ffdad5e1bb02c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD511921194550e87844b26b3d3cffa882e
SHA1765050f3582eb719b557d600e4aebd1273fc2e93
SHA256215222c7bcd5d8a1c146465137a562b85ebc92715b3c31d75f9738df82232278
SHA5125f0bf432e988310560c5eb1c8268f93b600b91ba35ba2c2312664ec1cd5087d609baea208759d23d040db6e8bbf7beababd494438f459ddea528e12c8fa298c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD58874e8cd1f9076d33d4e7e16c30c8702
SHA1af4946a56cf2fa502a0fb8ac27d31438303e0b84
SHA256d1dd796a446984facef2b114814b768540a0a2a856508976bac972cc815b81f7
SHA512614a397e76ec5d2f9deec40ac01ed161dbb308567cd5ad820e792d74ef2cea36878f00fea87827d647bf4cb5bf496e35a4d115c889c8489e9688b10721c30418
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5dfe5ee5122d5835cc61d4965449da954
SHA12a1c240d9ba53f44391677cba94aa29665168cbd
SHA2567394fe1009f8faf16764f30888ab140b0dd077f52f510f87c26d60e7c57077e0
SHA5125980b79a9e56572fc24b1e06b493b6d99cc1c31dd7911502ee00cd25e1f25efa1fb6be69d9531419cc2721f69bc46c96e27841ca7b7b26b1952ae67e981790a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe593687.TMP
Filesize48B
MD5fcdcdd9b55286f33d8b9ae291c6ef1d8
SHA163a204dcdb946fc974a5bbf3db9d56cbbc8ebdcf
SHA25660f81bd4f21e510d02b673c27e75054b187b5a798d36dd4a0fac6bb02b2ca1ac
SHA51248a1892bfd41d7fd43eac48152fa71928e448b08bdfd576f09db986276d06a12b08d596e4c4c700c0ccd936576233b0eee6726bb74da68de16430c2238082345
-
Filesize
8KB
MD5b22ec48240cd3492301cd141a015a9bc
SHA1d8b412ffa0ffea8fac454aed0029b9ec0e0dfc64
SHA2566da9a6a8086519a4a4fcac1b4ca90a53ef9d41cd1c5e9d65a4105f3237aad3a4
SHA512a4c7489ad6fc9b29b49df1a44d8acc5b7559374a98651559b1c2f676d3e8c1b42817171b3f54743c91021b09a97f1ee02434b723b5bc191a98e26f186f130857
-
Filesize
11KB
MD55f12296001c12d690cb8756ef87087a9
SHA14965007de55744990b13d104933561b812fe7d03
SHA256c612b76e2a6524b36a4e653203367b89a95cd68378e8d4d053e185f5aa60bcfb
SHA512f71ff0ba8b4c30b47742f8355ce7b49d7c817c396d22bdc4fbf743cc7a312e59e43c56ef89ff77091beab472005378a22a26704bfae1cac94d3baf0fa3964a9a
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
1.6MB
MD58b9812ba27e12c79319d859e97955ca4
SHA13cb35ac811c27e7b21b381dccab55517609190c3
SHA256a63d59b2af0c7b2be6984280386042a230dab928e3b426d51a0afb2eff5f98e9
SHA5128312081fcca20f1d8d393ea2588c2fd19830eb9b36700ec8bc541cd25c4c2046008f3eec07883056956adae5c56083d43ded74d3122d21555d1e43a9d1ab5618
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
280B
MD5173190a99b7541969d33bc2c1f5a7732
SHA12feeff6e3a7e03a94b4ede26853bfefca4b5603c
SHA2563d6086a542597305ca534b4da5f1e331556eb649c1bcce565fb084b833cefff0
SHA51234404f3ce085c7c1b00c048b97afea317401f491f935a866e056b5b92eddbadde396057c361215656f25426f9b61d0103b19500121f6adef5fb5cc8f4cf20183
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
2KB
MD5c043d8c4fd5315e9efa4da0bd3d10c2c
SHA193b412f56305fbb25febf3aaf2720245d40da6b6
SHA2565db0e7bcb6e5f7d66eca866fb4d2f2575e0cf6d93cd8a1fa24ece22a0f21b77c
SHA5122ad64e00184795aa8b1a8128007e7753606e73f7a5c1fa96823b33df35b167d92da107d56026a6fba7a737f9f584df7737aac4fc58c3bec3367761c81c7c768e
-
Filesize
3KB
MD54da61e4a42583ddf5242f203a33d3bba
SHA16440a1173e040d52f8320718e54e81b86f3f1864
SHA256f6bf812e76a22c4e7319308691fef4a07e6671dd828ca524ddb436bba8fce484
SHA512ac0927b4bc6b2d628e59c220bf1b1804d4d270d0a7d0ef350e99330715920e4faaf791053b5ffc8484b7727ed8a63d53eefb30abdb6d823a204b4c99debbcab7
-
Filesize
16KB
MD5e8b7bfe7c76f59ec0b3e77f7ba429f41
SHA1f187b4632d6689e5bcbf085dfe57f682b769b096
SHA256da63e651149f7dc397f1ef37338db4eea85f35b483cf0057a004ac917cd547d3
SHA51215a15c97f4926e8cf2f29977c1d95e4c6fe5e52672f399f722e7d6146422f4b2858893c40b7e21490e4bf4d37041f0234854215e88158f47203441cd81f52c19
-
Filesize
1KB
MD50fe9cd8ce032c21b533256cb56850e0e
SHA1ce2243aa8bac71fe0316d212d586c27bd4e25f7a
SHA256ab27da13ef9a938de598b4daeb5ebaa45c573457c715c197558e76fccd366f93
SHA512949e1bc8e48dd58c37116446192b8a80eb57cb7da12b4965d4cc29ac1de084465cb39ee39833e51d77c3d1086e9b756456a214e55ec583d70e3caac96cb9b3bb
-
Filesize
5.8MB
MD59c232fe2ede51929244afc5c67e53b51
SHA18e8bb0eda09d25c1f44b8abd66a7e15a414b76f5
SHA2561985fdbec700334fbb2c907f37a102930744e6b3e9198c25f516eae9f6854e9b
SHA512d7ba56ed15a4bb482a69543e6bfe11d0aed4bf6b6b037d51dc2d191e1eaae187d1297bbb7c847d73259c34bb9ee26f26f3689c2592b4ff92968101303be61492
-
Filesize
23.7MB
MD5abe178894c7ca0fb7dde3dc7f1d755d1
SHA10924ed971d8e483d2dea3a0327ad33a3538acd33
SHA256baf34eeaaf9fc7bb7d8c48e81067fa7f5caeb3f24956018560f98f6bfedfb802
SHA51262920edcf2a43d5c872b9a584cabfb79da940087b3289da307a854e9328eb4febddbd6261d195bfa47daa19c661452744066419d920bf575c69536d49dc3c47d
-
\??\Volume{dfbd1330-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{8086da37-1112-48d7-8cb6-6d79e6130a1e}_OnDiskSnapshotProp
Filesize6KB
MD53c71d38ce0f16a081c4e2c541c7909d6
SHA18a6efcff879d9044b0ee921f9b867587e103f5a5
SHA2561121d36d9f51bbfc67777c9ecbae5512f132fb11ca70e9ecdec4e082840f99a8
SHA512fd21a0ee62833ddb6d37e5b6155a93a44cc131f68e6c4492c42f589f34f47ea409cd0de04b4c020928103abbada90c12b1c930de0f5a5ced19943bb773284d80