Analysis
-
max time kernel
294s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 13:26
Static task
static1
Behavioral task
behavioral1
Sample
Modrinth App_0.7.1_x64_en-US.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Modrinth App_0.7.1_x64_en-US.msi
Resource
win10v2004-20240508-en
General
-
Target
Modrinth App_0.7.1_x64_en-US.msi
-
Size
5.0MB
-
MD5
5003486a784143bc96c3577172bbb44a
-
SHA1
9a960998807126041fae5b4fe9488d7ff3c5ca42
-
SHA256
b1ac36000cee14b9c36aea4cef7f53ed2e7c18c9534b4ff66f07da11e8c07b59
-
SHA512
3fd871414cffe35ae649dbb02935eddcad75ee094f2d61f2cef48827dfb852ff3b8e4211f913bf65e4619b2a4989a2807d876a920a105735ac3e59362802ee19
-
SSDEEP
98304:fNT+6HE4ThcGalSS9d+udj3mYcCqQcgT3XV8tEbETvsDHaLqV710ZZ9rPzrPW:1/HMlS2JxmYcmcg7XGqb6Msq51GP
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 2 2768 msiexec.exe 4 2768 msiexec.exe 40 1940 powershell.exe 42 1940 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1940 powershell.exe 1940 powershell.exe -
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 10 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\cs.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\sr-Latn-RS.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\Locales\da.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\fr-CA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\mip_protection_sdk.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\v8_context_snapshot.bin setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\resources.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\dxcompiler.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\icudtl.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\Locales\ne.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\Locales\sv.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\Locales\sr-Cyrl-BA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\dual_engine_adapter_x64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Extensions\external_extensions.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\cy.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\show_third_party_software_licenses.bat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\cookie_exporter.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\VisualElements\LogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\fi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\Locales\mr.pak setup.exe File created C:\Program Files\Modrinth App\Modrinth App.exe msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_hr.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_as.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\ko.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\az.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\msedgewebview2.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\identity_proxy\win11\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\pl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\Locales\sl.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_ar.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_bn-IN.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\EDGEMITMP_28655.tmp\MSEDGE.PACKED.7Z MicrosoftEdge_X64_124.0.2478.80.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\identity_proxy\win10\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_tr.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\ar.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Trust Protection Lists\Mu\TransparentAdvertisers setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_iw.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_km.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\Locales\fr-CA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\124.0.2478.80.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\msedge_proxy.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\Locales\nn.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_nl.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\kk.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\identity_proxy\canary.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\identity_proxy\stable.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\VisualElements\SmallLogoDev.png setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_pt-BR.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\EDGEMITMP_28655.tmp\setup.exe MicrosoftEdge_X64_124.0.2478.80.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\es.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_sr-Cyrl-BA.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\identity_proxy\internal.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.80\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\sl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Installer\msedge_7z.data setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\msedgeupdateres_fa.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\de.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Locales\km.pak setup.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIED00.tmp msiexec.exe File created C:\Windows\Installer\{67E35770-3BE7-49CB-BE18-C8626CE846EE}\ProductIcon msiexec.exe File created C:\Windows\Installer\e57ebc7.msi msiexec.exe File opened for modification C:\Windows\Installer\e57ebc7.msi msiexec.exe File opened for modification C:\Windows\Installer\{67E35770-3BE7-49CB-BE18-C8626CE846EE}\ProductIcon msiexec.exe File created C:\Windows\Installer\e57ebc9.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{67E35770-3BE7-49CB-BE18-C8626CE846EE} msiexec.exe -
Executes dropped EXE 15 IoCs
pid Process 680 MicrosoftEdgeWebview2Setup.exe 4440 MicrosoftEdgeUpdate.exe 3116 MicrosoftEdgeUpdate.exe 3904 MicrosoftEdgeUpdate.exe 2724 MicrosoftEdgeUpdateComRegisterShell64.exe 2380 MicrosoftEdgeUpdateComRegisterShell64.exe 452 MicrosoftEdgeUpdateComRegisterShell64.exe 1872 MicrosoftEdgeUpdate.exe 4444 MicrosoftEdgeUpdate.exe 2368 MicrosoftEdgeUpdate.exe 3048 MicrosoftEdgeUpdate.exe 4372 MicrosoftEdge_X64_124.0.2478.80.exe 1352 setup.exe 2988 setup.exe 2000 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 17 IoCs
pid Process 4640 MsiExec.exe 4440 MicrosoftEdgeUpdate.exe 3116 MicrosoftEdgeUpdate.exe 3904 MicrosoftEdgeUpdate.exe 2724 MicrosoftEdgeUpdateComRegisterShell64.exe 3904 MicrosoftEdgeUpdate.exe 2380 MicrosoftEdgeUpdateComRegisterShell64.exe 3904 MicrosoftEdgeUpdate.exe 452 MicrosoftEdgeUpdateComRegisterShell64.exe 3904 MicrosoftEdgeUpdate.exe 1872 MicrosoftEdgeUpdate.exe 4444 MicrosoftEdgeUpdate.exe 2368 MicrosoftEdgeUpdate.exe 2368 MicrosoftEdgeUpdate.exe 4444 MicrosoftEdgeUpdate.exe 3048 MicrosoftEdgeUpdate.exe 2000 MicrosoftEdgeUpdate.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.37\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.37\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.37\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.37\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.37\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.37\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.37\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.37\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.37\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Modifies data under HKEY_USERS 44 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusSvc.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass.1\CLSID\ = "{8F09CD6C-5964-4573-82E3-EBFF7702865B}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ = "IGoogleUpdate3WebSecurity" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass\CLSID\ = "{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ = "IGoogleUpdate3" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\theseus.mrpack.Document\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\CLSID\ = "{8F09CD6C-5964-4573-82E3-EBFF7702865B}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine.1.0\ = "Microsoft Edge Update CredentialDialog" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\07753E767EB3BC94EB818C26C68E64EE\Environment = "MainProgram" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\ProgID\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\theseus.mrpack.Document\ = "Modrinth File" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\NumMethods\ = "8" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\CLSID\ = "{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\LocalServer32 MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32\ = "{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\ProgID MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\ProductName = "Modrinth App" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\13CC58B29F9FD325381898EFA5ED7FD8\07753E767EB3BC94EB818C26C68E64EE msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{4E50ED6A-8A46-4CB9-9E77-B99CBFED1E68}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1D3747B6-FED9-4795-BB56-E077C582FB69} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods\ = "43" MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2260 msiexec.exe 2260 msiexec.exe 1940 powershell.exe 1940 powershell.exe 1940 powershell.exe 4440 MicrosoftEdgeUpdate.exe 4440 MicrosoftEdgeUpdate.exe 4440 MicrosoftEdgeUpdate.exe 4440 MicrosoftEdgeUpdate.exe 4440 MicrosoftEdgeUpdate.exe 4440 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2768 msiexec.exe Token: SeIncreaseQuotaPrivilege 2768 msiexec.exe Token: SeSecurityPrivilege 2260 msiexec.exe Token: SeCreateTokenPrivilege 2768 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2768 msiexec.exe Token: SeLockMemoryPrivilege 2768 msiexec.exe Token: SeIncreaseQuotaPrivilege 2768 msiexec.exe Token: SeMachineAccountPrivilege 2768 msiexec.exe Token: SeTcbPrivilege 2768 msiexec.exe Token: SeSecurityPrivilege 2768 msiexec.exe Token: SeTakeOwnershipPrivilege 2768 msiexec.exe Token: SeLoadDriverPrivilege 2768 msiexec.exe Token: SeSystemProfilePrivilege 2768 msiexec.exe Token: SeSystemtimePrivilege 2768 msiexec.exe Token: SeProfSingleProcessPrivilege 2768 msiexec.exe Token: SeIncBasePriorityPrivilege 2768 msiexec.exe Token: SeCreatePagefilePrivilege 2768 msiexec.exe Token: SeCreatePermanentPrivilege 2768 msiexec.exe Token: SeBackupPrivilege 2768 msiexec.exe Token: SeRestorePrivilege 2768 msiexec.exe Token: SeShutdownPrivilege 2768 msiexec.exe Token: SeDebugPrivilege 2768 msiexec.exe Token: SeAuditPrivilege 2768 msiexec.exe Token: SeSystemEnvironmentPrivilege 2768 msiexec.exe Token: SeChangeNotifyPrivilege 2768 msiexec.exe Token: SeRemoteShutdownPrivilege 2768 msiexec.exe Token: SeUndockPrivilege 2768 msiexec.exe Token: SeSyncAgentPrivilege 2768 msiexec.exe Token: SeEnableDelegationPrivilege 2768 msiexec.exe Token: SeManageVolumePrivilege 2768 msiexec.exe Token: SeImpersonatePrivilege 2768 msiexec.exe Token: SeCreateGlobalPrivilege 2768 msiexec.exe Token: SeCreateTokenPrivilege 2768 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2768 msiexec.exe Token: SeLockMemoryPrivilege 2768 msiexec.exe Token: SeIncreaseQuotaPrivilege 2768 msiexec.exe Token: SeMachineAccountPrivilege 2768 msiexec.exe Token: SeTcbPrivilege 2768 msiexec.exe Token: SeSecurityPrivilege 2768 msiexec.exe Token: SeTakeOwnershipPrivilege 2768 msiexec.exe Token: SeLoadDriverPrivilege 2768 msiexec.exe Token: SeSystemProfilePrivilege 2768 msiexec.exe Token: SeSystemtimePrivilege 2768 msiexec.exe Token: SeProfSingleProcessPrivilege 2768 msiexec.exe Token: SeIncBasePriorityPrivilege 2768 msiexec.exe Token: SeCreatePagefilePrivilege 2768 msiexec.exe Token: SeCreatePermanentPrivilege 2768 msiexec.exe Token: SeBackupPrivilege 2768 msiexec.exe Token: SeRestorePrivilege 2768 msiexec.exe Token: SeShutdownPrivilege 2768 msiexec.exe Token: SeDebugPrivilege 2768 msiexec.exe Token: SeAuditPrivilege 2768 msiexec.exe Token: SeSystemEnvironmentPrivilege 2768 msiexec.exe Token: SeChangeNotifyPrivilege 2768 msiexec.exe Token: SeRemoteShutdownPrivilege 2768 msiexec.exe Token: SeUndockPrivilege 2768 msiexec.exe Token: SeSyncAgentPrivilege 2768 msiexec.exe Token: SeEnableDelegationPrivilege 2768 msiexec.exe Token: SeManageVolumePrivilege 2768 msiexec.exe Token: SeImpersonatePrivilege 2768 msiexec.exe Token: SeCreateGlobalPrivilege 2768 msiexec.exe Token: SeCreateTokenPrivilege 2768 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2768 msiexec.exe Token: SeLockMemoryPrivilege 2768 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2768 msiexec.exe 2768 msiexec.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4640 2260 msiexec.exe 90 PID 2260 wrote to memory of 4640 2260 msiexec.exe 90 PID 2260 wrote to memory of 4640 2260 msiexec.exe 90 PID 2260 wrote to memory of 4160 2260 msiexec.exe 97 PID 2260 wrote to memory of 4160 2260 msiexec.exe 97 PID 2260 wrote to memory of 1940 2260 msiexec.exe 99 PID 2260 wrote to memory of 1940 2260 msiexec.exe 99 PID 1940 wrote to memory of 680 1940 powershell.exe 102 PID 1940 wrote to memory of 680 1940 powershell.exe 102 PID 1940 wrote to memory of 680 1940 powershell.exe 102 PID 680 wrote to memory of 4440 680 MicrosoftEdgeWebview2Setup.exe 103 PID 680 wrote to memory of 4440 680 MicrosoftEdgeWebview2Setup.exe 103 PID 680 wrote to memory of 4440 680 MicrosoftEdgeWebview2Setup.exe 103 PID 4440 wrote to memory of 3116 4440 MicrosoftEdgeUpdate.exe 104 PID 4440 wrote to memory of 3116 4440 MicrosoftEdgeUpdate.exe 104 PID 4440 wrote to memory of 3116 4440 MicrosoftEdgeUpdate.exe 104 PID 4440 wrote to memory of 3904 4440 MicrosoftEdgeUpdate.exe 105 PID 4440 wrote to memory of 3904 4440 MicrosoftEdgeUpdate.exe 105 PID 4440 wrote to memory of 3904 4440 MicrosoftEdgeUpdate.exe 105 PID 3904 wrote to memory of 2724 3904 MicrosoftEdgeUpdate.exe 106 PID 3904 wrote to memory of 2724 3904 MicrosoftEdgeUpdate.exe 106 PID 3904 wrote to memory of 2380 3904 MicrosoftEdgeUpdate.exe 107 PID 3904 wrote to memory of 2380 3904 MicrosoftEdgeUpdate.exe 107 PID 3904 wrote to memory of 452 3904 MicrosoftEdgeUpdate.exe 108 PID 3904 wrote to memory of 452 3904 MicrosoftEdgeUpdate.exe 108 PID 4440 wrote to memory of 1872 4440 MicrosoftEdgeUpdate.exe 109 PID 4440 wrote to memory of 1872 4440 MicrosoftEdgeUpdate.exe 109 PID 4440 wrote to memory of 1872 4440 MicrosoftEdgeUpdate.exe 109 PID 4440 wrote to memory of 4444 4440 MicrosoftEdgeUpdate.exe 110 PID 4440 wrote to memory of 4444 4440 MicrosoftEdgeUpdate.exe 110 PID 4440 wrote to memory of 4444 4440 MicrosoftEdgeUpdate.exe 110 PID 2368 wrote to memory of 3048 2368 MicrosoftEdgeUpdate.exe 112 PID 2368 wrote to memory of 3048 2368 MicrosoftEdgeUpdate.exe 112 PID 2368 wrote to memory of 3048 2368 MicrosoftEdgeUpdate.exe 112 PID 2368 wrote to memory of 4372 2368 MicrosoftEdgeUpdate.exe 114 PID 2368 wrote to memory of 4372 2368 MicrosoftEdgeUpdate.exe 114 PID 4372 wrote to memory of 1352 4372 MicrosoftEdge_X64_124.0.2478.80.exe 115 PID 4372 wrote to memory of 1352 4372 MicrosoftEdge_X64_124.0.2478.80.exe 115 PID 1352 wrote to memory of 2988 1352 setup.exe 116 PID 1352 wrote to memory of 2988 1352 setup.exe 116 PID 2368 wrote to memory of 2000 2368 MicrosoftEdgeUpdate.exe 118 PID 2368 wrote to memory of 2000 2368 MicrosoftEdgeUpdate.exe 118 PID 2368 wrote to memory of 2000 2368 MicrosoftEdgeUpdate.exe 118 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Modrinth App_0.7.1_x64_en-US.msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2768
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6D6C02D810846660C34B586467E52FEF C2⤵
- Loads dropped DLL
PID:4640
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ('/silent', '/install') -Wait2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe" /silent /install3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU105.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Sets file execution options in registry
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3116
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.37\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.37\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2724
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.37\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.37\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2380
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.37\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.37\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:452
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODcuMzciIHNoZWxsX3ZlcnNpb249IjEuMy4xODcuMzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjU2NDA1QjMtNzk0OC00NkIzLUE2RjctRkQ3NjlGNzk3OUM2fSIgdXNlcmlkPSJ7QkMzQ0M3QTUtQjlBNy00MTc2LUEzMzItMzVERTExRjRCRDM5fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5MkVFMkFBRS1FQjk2LTRENTItOURDRi00Q0NDRDFBNzczODB9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RHhPYmpIR2ErblJhMmF0QzN3bytJRXBDNzgrWlllQVVia1hwREMyY2o3VT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4Ny4zNyIgbmV4dHZlcnNpb249IjEuMy4xODcuMzciIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUwNTIzODAwNjAiIGluc3RhbGxfdGltZV9tcz0iNzY1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:1872
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{F56405B3-7948-46B3-A6F7-FD769F7979C6}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4444
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2596
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjExMC4wLjU0ODEuMTA0IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MTUxNzEyNDAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM1OTY0MzgzNTAwMDAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTE0MzI0IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDU3MjIzNzA5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:3048
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\MicrosoftEdge_X64_124.0.2478.80.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\MicrosoftEdge_X64_124.0.2478.80.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\EDGEMITMP_28655.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\EDGEMITMP_28655.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\MicrosoftEdge_X64_124.0.2478.80.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\EDGEMITMP_28655.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\EDGEMITMP_28655.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.118 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4F38F7EC-4B4F-4A66-89ED-294AB2E56F56}\EDGEMITMP_28655.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.80 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff716b088c0,0x7ff716b088cc,0x7ff716b088d84⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:2988
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODcuMzciIHNoZWxsX3ZlcnNpb249IjEuMy4xODcuMzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjU2NDA1QjMtNzk0OC00NkIzLUE2RjctRkQ3NjlGNzk3OUM2fSIgdXNlcmlkPSJ7QkMzQ0M3QTUtQjlBNy00MTc2LUEzMzItMzVERTExRjRCRDM5fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins2RTkxNjg4RC1EMDlBLTRFMUQtODBCRC1CNzY5QUIwOTlCRUJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMTI0LjAuMjQ3OC44MCIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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_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-PGV2ZW50IGV2ZW50dHlwZT0iNiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTc5ODUzMjYxNSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5Njc1NyIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjIzNTQ4OTA4MSIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjI1MCIgZG93bmxvYWRfdGltZV9tcz0iNzE5NTkiIGRvd25sb2FkZWQ9IjE3Mjc5NjQ3MiIgdG90YWw9IjE3Mjc5NjQ3MiIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iNDM2OTUiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD558ddfb423278cb4639f363fdcee90ed3
SHA1d8128947e19ed612df814eedc6f69b6d3e8961b9
SHA2566a17f56acc5c65433a455001c4f6cebe190d856de3d143408fdac0323a6c4b95
SHA51211f8e6453a330d58f3059c2987ae4febf16e009dda5c5e9b0b6e61f5f7c9c526f554475308bb07b44ecccffe67f7736b84e748fe9dbec323f09955e6793cabda
-
Filesize
6.8MB
MD51cd79627301bfdeb1d3fba51cad868a6
SHA12b71bae909047dd0374425e9df941ef93fb696dc
SHA25674ab283991de81543bff5786ad8bebd41c243bc00beda305da00c55a60ac2093
SHA512839860435573bddfcbb950e2986333dd43ab5df5b2a0032fb18cd25c736e94d998b5ea1fc1e1b0c1d02a28b9615653becc4b535434bfd8a7a02f5995acf1808f
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD513fad1a73c960168be59885cbd8681b9
SHA10fae27254003eb50d58e4f410681b65b9fc23f8d
SHA256ccdcbabb2dd8a0701bcc7cb3342ffe1b7bb633300de782c8cd0cb706894db709
SHA512093904555288198eb8bc7b67608be14f9fc33618f19f3511d053c26d5da9d3f1963b3f18e8ca3a13460021c3c1324ad45ec5e912e6495dae84807946ba66d379
-
Filesize
201KB
MD5f2d14ff6375c24c821695ec218f2330b
SHA19d7b115c16d2ed5c3e6c3da19ccb495b3eb66b7b
SHA256f9819b0b98e30da8b8f7c08191234ccf0bf03a33b7fd41fe93f120f974a8990a
SHA512972814a3334ac85a30643778fceeb6f9a550d6dd578a0966fca9fbe6f36fc4e899e0a1b0534fe1d245c6f17ceb038d14d0989d31fb13f5b1556e188bb38c8b3e
-
Filesize
212KB
MD5e75a70e3642516e42905833935d9a85c
SHA1f804b8edafa6451f8cf6bbd1c994934fec0578e3
SHA256aa3304fccb73b3c8f3b50f6bd539bb6293fa4393b6cfc56174878b1eb352eb61
SHA512a8a65dcdb8e0201f0e4072de035446e3e5ad543795e4abf1e47c4ebd1277dbff45e7539c528d8b5df5fb65e5479bbc830ae3dd00966d5b4aa16c4480b0e1866f
-
Filesize
258KB
MD50c02bf3f64e1e52e23a1ff1be975481f
SHA11512259afc08f95346d28dd0dc949bda6895e862
SHA25624b93e5e53c2fae8d6430da172bf79fd3a6a6d38c5ca9d3a844494f2b7bc01ae
SHA512609eb973c21384ab151ba700714fd8c5ef70f9f2f62bc25ed5465198542551530849c5eb066736c1c67d9fe301143c214f40bccc751d18cecba6667f054db5b1
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD5c35fda033b1b8441ae9d88c5763a7653
SHA16cd921518561d65155bdbdb085ad2fdc77fd635c
SHA2564ac4272afebc63cd0bc85a5a901403570e5ba8ecb867febffcb005efc7d65837
SHA5123068145da7f6d3755b8d497b8ce499823292d6b3be35bb3d1735ad1e3776c8bc2bcad59b48d69dd9135cd18a2238e9f2b1ebb4c3f19d47e70c421f620c7cc5a4
-
Filesize
29KB
MD5ed0e2b7f8e5d1d1dfec64347388b4eee
SHA18458c853b7f53646395197a0ce7ed62a7322277c
SHA2566c0aab9da650ff49e668f6048e7cca45d908f566e9b1ad1a2736db2abcb6a540
SHA5129ae9ba8bc2e2e24c63c15e2568f62df74558204f2885df0333f697635a85e47690c9a23546e758b0350b56bc26a58f1046950de00498727129b175832be82044
-
Filesize
24KB
MD552361017f9d46715074437f4f4ef510c
SHA10805c5b1e97d27b0a4e9a0f9273f76a78afde60c
SHA2561bfc89c8a6c558f70edab1a24585960276fe1c08c5f363855062e13503daf7de
SHA512beac1313538e97f3cfc87b9bd7bf2ecfc7beec003f757d73513ff3ce6a710f554c1f036c372d8c2da227293643cbf0bcc7ad3f1ac77457bb006e3ec17f14df21
-
Filesize
26KB
MD523825769098fcfeb651593ab1d9a17fb
SHA1d8591e5c31b41b54077e72ac3190b28d13a80861
SHA256e7a94d29115f6b575c9dce9a0d649e38058e369bfa32b4f510efeca30bb85388
SHA512631d87f130c3aee169312de6dfb1bf7df89b2263a4c753cd8fe5de679c5f476574ecfc40492ba044353a52edb062c6f5b6dca3ce4c790f9f89e27d95aa2bcda3
-
Filesize
29KB
MD50354ed3612ce1ad066261a816d778838
SHA1f4986dd7fe70b5e8b226ab994e082c625f1b1ed7
SHA2566ea80179f119d72f00940dffa2b0fe11c8559052d22837d035d57cf0fa923caa
SHA512c409c223075a50c39acee6465cc7e49d860f3ea856484ed328e3dba085d99f4ec3038c7f917eb630e6e624077c51ba086c5c13e37683f7fa698fd9d26e16d793
-
Filesize
29KB
MD5d2274e6ef10f7db41c95ef6f1d8e4bf3
SHA1898c671264d58164cb27364e8857d78e40daea2c
SHA2563cb6ba05195e7aee536d3734f7631f0fc47bd5f483c1bf6c646f57c008cd0ed3
SHA51242355d14a248ad372e366010c2ad1b0e64d0b84f52ea34acd37c2bc1da198c525d8e1c19558edf49a780098694b98b6b049f3ce62342e27a99ef0417f0f2ebc5
-
Filesize
29KB
MD5b34dfac8c3a1dbb83b0d41ae7a4b4059
SHA118d2696ea79d3e81356892cfeb4dbeae882517c4
SHA2560be36d4264d8ac8af871c1ebc448672137bfb894cb0b91a07dab20743d2f344c
SHA512f7f75859e9fe40db427c5e15446c6411a28f1628ddee73d818d840c0b6ae5b2d3176fac3fb83fe5343d3fbd8b44c294f060e09492304a49102863b99acfa4f20
-
Filesize
29KB
MD5e87a1ad4f7aa16527eb02b92fea2f590
SHA1f3362cbd635b803e1003c3a15edf52348ba1fb77
SHA256a248073ed5a436a921745aa78f3c039e8ac0c360372644c1f78c36737e78f87e
SHA5128018c0325f598e0071b4f5a8d4fa201aa6f30a2eefc34cd1a0effd05f5ba75be9fec30565d6d9c9f761a896a7c121d7f0ba665a22e6cd7dc39f932f0857a8b2f
-
Filesize
29KB
MD5d84aa26e9486830f6e34485ab4e97a0e
SHA1d4053cabcd346a9b17ec533319c0d9d3305bfd90
SHA25675951874d4a4624d5a054fada852f046add3d57424986bfdc2a1c3bfc66be484
SHA51252e50ced2e936ade01781b043ca518af8a32c33a64463fea4947c7163342e3375ae590d224311c47dd072969a79a85bca38e8bc41384b961f40979be7eae0a40
-
Filesize
29KB
MD5de8c111a65a9e98bd81041fbf51e3594
SHA1eed2545549c5dc2072ade08321d9229cb49090f5
SHA25642c14d538d82c44d0ea2b4424548269cf7dc9063d5c56c3e12a7a4f575a37f6e
SHA512987c660516b27f9fb671f381b353e2dd293811e9a0effc5cf2a9ac9bf9432b3074748ee0d99677ed5485ac9fd01d46f126d3880c762b8572fcf49eff36bdd8e5
-
Filesize
30KB
MD51481af2fe87b9ce9b891b6d79db6bfee
SHA1581b2eeae265ad4a8837d1b638e4b691bc064620
SHA25688f78ff99301af50ebaff945557092113f27201738aad2cf9ee24d416023617a
SHA5122eddf41b00100d55cdad663dea4fb7af405cbc77a282414c13672d315f0fd1f3578fd241d63da9ab246efc940b7510bcc19baf2772847200dccc3e0248355fd7
-
Filesize
30KB
MD5695da6b2e8c2ded73fa3b35a8f3178e1
SHA1f4fe324aa0b81bbdbe92c4eb5b08f307d8a9f770
SHA256ebeb21625556564644993a2eb2ab10a1f4a0507c175933343025c4d0ed5b3933
SHA51200c871d1f54fc80643ddbdf01976f00947a28f639894e8092d28582bea770ad7e68a989edf4cf7ed8de22c386225a75a500879b9151a0f8687cd6c28f6dc0310
-
Filesize
28KB
MD528acdb7e4762aad04b93e3462f09b16b
SHA14bbdaaa8411799a9108b81251c7d261c858ce7d9
SHA256b4f889351006556944447c9c6bd3f5591442296ba9f57948eae09a6828fbc0bb
SHA512ebf4366dc8f24253bd83d516f07b9b69033e70c09f4fd3fc9654d1e06436917e22b8f1eb10d33602bd1d72b42c22e1d89f10f98eef9b30c59e9b38133040755d
-
Filesize
28KB
MD5904baba636f7bd537f86c96b486edde4
SHA1c90548a30a322e0d2fb554b313ff99f0b0d12f94
SHA256e732991010f68800ad14718687e29df53ee763264facf87db8c08eab874309ce
SHA512ea20a7241de74b064c29f2463ab8ddc67a8b3604228f025ac5c0ca460deee2f7fa55283e82dacdb75959b8423faadd40e85c9d6b2b53f3f62f16ae37f440d07a
-
Filesize
29KB
MD5a9ee7fdeed416b6fce213235d74a6412
SHA1d1e478398eb5cfa2490fead8842ff386e52c5e46
SHA25630ae20bd4527f98e16af09566d67e3163d05be72a6021d9b54c493a1934f7792
SHA512fa00b91c7ee2119d82204c4961ad303102f21151dafd21b31a28ce7532790fb4c12df2fb062a267c24cd8419abcda1312a4b829876db40a5b3b320a29d87e74e
-
Filesize
31KB
MD56b3e71ac529dd6b60c52dc03958dce57
SHA11758a9be6ca598b88f89b2955f6e69b195abceef
SHA256edd1374957acefc691ebbc448c74636f5a5efcb91630d901ac1f323a91f55904
SHA5120b5f3089ffe94fea2809735b1b4d4331bfb2b438a85c549e57f34fe25295633d6785bf89da4b2f224734e9784c43255cb6ccb0de82b0c06a47770351ba566d59
-
Filesize
31KB
MD5609bb0fa897a29dc620192a99fd20738
SHA1204171116dab2677c16f3f8a275d52eb58baed4c
SHA25632a516ba9e696a37815e0870c42ec9deddeab24d6c66b9020afc4b28ab5d0de8
SHA512a2c2ef8523a01350b1d119f7ef9d9c3888b38a1ad088f0b7bd1f05124a1d720722bcb3175f88b3579b2d16d33f702b3566d3ae77d3f2f2e180c079f0428843ab
-
Filesize
27KB
MD51bc70e3fefc50aead40833779bb05142
SHA1faac018733971b29ce94bf81e9462b78c0c6a2bd
SHA2560bd45524f17fcc436eb62803f42ddcb9ab4ddf9de6d6338a8d90da8ecda699aa
SHA512b099b388e58bc0274070c74809c043e2f1a98ed14ff4e9b1be1d7ac4fc8af46ad8ecd272a1e60b0eb37d98ba5fd5f5d6e6d9008f9e050ddf20928e4866edd8da
-
Filesize
27KB
MD5c3dcb4ad44d0abedcb962778ff50c941
SHA1a2b48433c32f2bcf6565d59b0c2720e74ec939a7
SHA256387385234ff48a0faef8935ea7dbaab58acb85594bb9cd67b6b66da8e2c15941
SHA5123d98d48c57a99c9a546a9847fa238d7bf2c00e86728a5c53b2029ac1917857952c28abf94502269500fbcd26c625468a8fcc988737ed2c77a43451679ddec65c
-
Filesize
29KB
MD503b60cf8809192b6b00e125ed94bdc2a
SHA1aa5d7cbce3a7063abd6aa3030398c2de7b1478ff
SHA256a370d7198985602c8d1858d1b39aa57c62ae3463ddf99f03304b04c8dd3ce381
SHA5124c361f8302f89ab7e7bfde07cda67a2eb4367fc805142c3eac0c3f0ed10e812523ace1536aed9e9874a9b88664ed341bc873731da135786d36458fd9235030d7
-
Filesize
29KB
MD5c1dfc0e349268ffbcd87904762ec8362
SHA16a7ed33fd1b99a11bfedeaad301f6f60d1ddf873
SHA256a043288bb0006a2e9de1e10e2aed56bdd195ce93681dd63af8e86a4ba6932224
SHA5126a2297754b6117c78ef9c7b5b089f6a8b897836c8187cf7003c9232364afc48c1dbdbdc2f96dab8fe1efd87b684cb2005fca8734fefd0cfc93339ea0d7843d2f
-
Filesize
28KB
MD5f894161c808aba5106feb30193a2daf2
SHA137d5fee915f4215150ef7604ab21254e6e5883bf
SHA256541d96a5dd7aa5382547917d7426722f2a82f5cbf40fe457459b7b2b22e6f06c
SHA512ce50b1d7b9a851aa4a13b30e17e601fd61dadb82ba82de72f60ca344e8bdbb14e752a163d665d9c64d218ca0485dfb119a97731adc6d437e2f0132c4c04d6517
-
Filesize
29KB
MD5b63db4a72eaeb5ea638d4e8befdd303a
SHA11f7bc4ddadab1b5c469c750b527129531769fed4
SHA25621f2a1440e2277a3f1814a67e758ba2efa30f64653c8efc727f2ebcb92d3b85e
SHA512bbecb99955da46056918de3bd375b40ec9ce0b929a8b44859dc1364b2b3268b98351d8b44179d846c5a7b894532e8f5d1ef6b5e4f563425129845098d46e43a1
-
Filesize
28KB
MD5d681435419c9da50a1f5757ada63b58b
SHA1edc316cf013ccdadee3b6366231bc019e5612abd
SHA2566c938d3deb6eb18ed7406ac64eb97070b08764442f738fee98665db6b8397927
SHA5123beb7792c743611fa439accc520d2936137aeed25877cd3f853045d861f2eae2493798f8293ff0f231d04ffa0fe27c3209144858c3e03d7be838c60baddf7a4a
-
Filesize
28KB
MD51d241411ab33d0e4486666e032fe7e0c
SHA19dfbbd34e3c3cfb71e1ab501a9d2569e5e256e2c
SHA2560cf505cfd900a334226b4709520ea5a8f47ad8e4fa700bd4c82e00edb01d9f87
SHA512deb694f44e995f9475204f556e2edaeed19d101df3fcc9ce0e1a740613b2941a514b5ddf788a16008e91879751f3029875d298f6738e3824980933269fd4b195
-
Filesize
29KB
MD5d4b5e5849ed7d34e12a1048538ef8521
SHA1c7c379be5447ed7d19774bdc4b85e3b897384613
SHA25691ff7f63741c15c775b765b062be8f40950cc57bb006e93d89bef6f472de748c
SHA512fe40c3e34196bc9ef49c3b7ab527c09a89a29f62680e371ea42768233d54e944d29e2b6cfa102090e0825fdbdf6546c5a467254e8158bdcc506d84caa193fa3a
-
Filesize
30KB
MD51c99c11f090427310b096f57c36af42d
SHA14d5154e2dfd963ea5007b83ea938c2223a8c4565
SHA256277f8b8dc5158bf84c7aac8a6a12ee1b9168edcc68666d20e20f214f871c652e
SHA51230f1cf39102ec0d9c7b22b6f0a6ff590b3aba8524482d3f15d30353d0aee113a0a4abd297a59d8e6fc1107f959f36f12c0747394c4881e36d8993f11ff51f5aa
-
Filesize
30KB
MD5778d627cce903222a21a7e268bb0dcb2
SHA19e8d7a7940221f09d57182c04297bbe1f00107dc
SHA2564a3fd5525b8e7a84165a4699e8ce0d104bb59b3f4bf5d715b6428555d32d492f
SHA512f31b05c200a7e3f99dd0c8cb7770f910acb16ab34026d3f41c10b48ca76bd8f5dc6fac5078bdd90acdc544b544a034fc9c622994a768813612e18c9c4203dfa1
-
Filesize
29KB
MD5a8bbd2226cd37d2ca28e4888a06ef46f
SHA14f58a70f11148846f706430ef5aae4b711e4d90d
SHA2561ab0953411b0c744023ef5e4ea17608c8772ae55e6a3fff62549ab1b2bebbea7
SHA5124a57bc44fb17e6c64cdbb72401a8b7fec0130ab2318e52b5af0b947ac67427192083165ff420e2f264e0053391f1fc44245cf5a8814a96c83b99f5f7d80d378e
-
Filesize
30KB
MD54fd3fc7cc4323b94a79c2a96ec1ac80f
SHA19572e49e503d287566956045e25f315427532668
SHA256076e55afeb3032e06c8e5c0c98b65b41b13e90b501bde5028d8d0dae0adab441
SHA512eb89d958f0cc0f18dad361b0a12484753e1670d711a3f218323eda7b6e5f52de97fc636b40242bea13e552049a84c7cf6d82eb072fcb7497c21058cbb1422f75
-
Filesize
29KB
MD5a8a8e28cf90426d16d0b8e309e649db2
SHA100722bb48af2014083e82d3188fd5a33cdf61901
SHA2561c3873c582b343ff0960e1a2463db72eea88d19f79e95647bf9f6e7adc3013a7
SHA512994760e383fc08291bfa7e65cef2f27ee1a996cdc7268fb5a016e05662f1a4c8f99e49fdb3645b13b182a05c05df3a0c06cc2b50e354ad8500d7473dd0200eb0
-
Filesize
29KB
MD57557c378c10fe3ad0c10a40082098640
SHA1f831396d5e5c0b4d026d12027f4721064985b6c5
SHA256e30c0968c0697dc59a373064ddae9bb4b206098ef7ef4553445341c16314a033
SHA5128383c56d445123a891c13c0702d9eca4cc11a5dfb4e4170c28d11cdb201a99fe4695fe965d135db0fca3e01e8e786fc4e251001372579fe97221c085f68bb4fb
-
Filesize
29KB
MD55256e56d89700d9c31a68acded035607
SHA15770ebac28d430569fc46b30a623335f87f19f7a
SHA25636ba2c1da17821dcfb83eb5a232fd6252dd4c3713c197d3aa8aec1ca60125d8d
SHA51264578fe3046d79ddf948815475c6dc22dec1defd84b04e81d6e3a3b64eef4e1357db2081c33616a07bca470dec0466ff5ae413d209afa7e6a8c93e59a804eb4f
-
Filesize
29KB
MD5526966033704011a50885663bb4933db
SHA14c004899e8ddc7aa5895a7e6b0a9985e79b386df
SHA2568c0f964ea755e1c8229b17673884f7b53f63b626ba3fbb0c9fe1b0f5a00d7c45
SHA51245c69101da480d64b7f5f1eb980448b930b54b07af80737c2e7cecdea50e91bcc0b722efd096ce7212f806796f80515108a0357220b2db958970218ba34474a0
-
Filesize
29KB
MD56003f5a58c4b7810c6bd1a672b684541
SHA185030842adc4247304a60f00e70615b2f30e618a
SHA256ff398da62816181d321178edf1ba67ae505851cf6a4e5376dbb2719154463d38
SHA512ed3dca0e700133d655a487f6a3b39d5feff90f1d322462b4cc7d6fbad7dc1be4b111de26b92826266e42aba346a53cfb371b271629a50d89d8586eb290197bf9
-
Filesize
28KB
MD507b6aecfb9dc1386a59b17b9e0e13d8c
SHA1fe3f34a1d5e870fef480a1fa3a8d91f31bee972d
SHA2564ea354fe6800360b1af32d503d519809c880c9fb96f9b8e8e6cbd53de671c18c
SHA512df86c455fc209199fd880c94c42b66cc03ba9eafee4917bb43cffb1ae6cb27bc1ef42ac879352f7c775b866dc66c419d745038a8be16ae58dfd55332b02b911f
-
Filesize
28KB
MD539ddcd9d60cca7520c98899df9ad8693
SHA15e8f4682b45562ae2aac9ba7eda007637a962c60
SHA256d515ed955ebf704ec80649b61d35e92f2622c371025de8f2613c460515b642a2
SHA51275a18d2c20f9b130c13be22842ea2d665d1f8e7932d9767016774c3ff7f9874eb7b92aed97e2c625398cebfe935fe37d93bf4a20534e183867c6eedd679a2d2d
-
Filesize
30KB
MD573dfe1c5d41f0d38c89764f15b1e712e
SHA13b66bc93f17f23fc054e9830c2c3978552699a25
SHA2567b6dd7955e7e9c235cee987cffeb906390e7ffee57bf735f0aff36209933906f
SHA51210518f6e737a17675a422a5f63533e31a75933ff5de225c57ecd373c45cb563c27fc865f4f394197516a04ede3d9fa4f1e31b038769986369422700a26629d6f
-
Filesize
25KB
MD5938308716f5b89c0d1de1b74c5c40ddf
SHA1b4c4f09fa3e052bd71258f7c6bc69c494d3aa034
SHA256f3691eb9347aa0bb8b60e5dc8a4281141a82b88da9338866301cbb8bc026fecb
SHA51296b60db53c982bed217ee9ab5ae6b417c8b419fee1c323015e3537e11f3ec289e605472e5ea74a339a7a44b4b26a186b00956106f88687901cfe94970b0cb842
-
Filesize
24KB
MD534e4eb036da7c51e8e045efe26059e9e
SHA195ce9544f575e4f6a87a9ff30dbf2a62c674113a
SHA256cc365d352297d2ac78cb93379000b4e5affd6c650ebab6504d7028fce524935e
SHA512ecb9752a6ddccee9eebda386c004dd4dbb12d0488d7d7c7b3ec8fe8f14f953ca5537734691afdd1c3a5036bcce00a71e32e482b43e5230a1f5caf669dd8839eb
-
Filesize
29KB
MD525471b07f505670a309b8e6593a1af88
SHA10394035dd8d3e1e9f81b442073571e9ba121ba69
SHA25630ce2b7c6267161b356e297f5536abf5beff6b95052af10d0041e6c479309bd1
SHA51264cbf003d965b0a9f6df674a594deaf69e241763a978a6d81abb3149fe7ee2af81fac628d47f459966eec4691485426391d9cee0af40e17bb4c9b82c063d6801
-
Filesize
28KB
MD54eda0ab4a909751ff0aabb1d04b48669
SHA18b442b209081030469feb49d3014cb3a90fe1d16
SHA256541c864b2daeb81b4a280f1dbdbab1f3a22aa42b93bf29b632f53ab09bbded07
SHA5129c30162c038af0b42309e46eb3080f95afcf811283661c56e2df0be58d3fe152b780140586a9e1e3124ad487e42d253cd7669fffda9a737a295fb81e6479d627
-
Filesize
27KB
MD5a33f322adb541a19d11ce2cb8594ef18
SHA13875fda8f8ac60c83ba943a92d41f39c4224e8f3
SHA2565f5f4b01c659afed2e394de7539c6c7de394252c8c7df447f76a53bf5df98f79
SHA512cc405796e84902e24bf86ac8058d8e329eca8a480efd68f6744ae3846a4c4adf5fdc2739b76fef7613c88f098812cafb045ede19f6a5ac837a6b2e1ec7aede06
-
Filesize
29KB
MD5d47df9d1318f127218af4f769ab10647
SHA1696600fac66590e3f66711522167fb366058280d
SHA256297935c0721fe3e35d007e2df4bdcad94033584da953f4428d04c8924c1b8416
SHA5120331662212a93accd5bc3c5a94f492c7269a3093e216aa9cf795d50804a53e6db33e1d2879c12d892eb40d8593a3ce85fa94deb7a42e3b38bddfc51af814f06a
-
Filesize
23KB
MD5e5c8392f9c0977097c95a8276f28826d
SHA1679e1e6dfeb50b444e65d14481458138f39d29d8
SHA2560627fe52f076ceb509c28a0b1313ee3cde9374cf62838332046b8f7db791251b
SHA5125d38502f955f2a6125f1ea1864269b90d7b9d063c7b0fa21ae67a5d0eebc3ceacba3d899220d7f877862b733e4798f4436fa8600fa96b86ce1c6811db12bbb84
-
Filesize
28KB
MD563d614991f3ee1847de636c346be7c7d
SHA13b83b068fc8d9b3a5d5f0ab2b499b4b369dc31e6
SHA25654156bcd957fd10400b353a3f68cde2545598f754c7aa35abd659cd31d6ea4d2
SHA51296bfde8dbc8e8a02740fe47318b0993d9a51caec8f6c4a231245b4dc5e3c4ec5cba89d3ce90858a63f5ebaad10da42a5ae6f83862e18ad4309fc603de2179447
-
Filesize
30KB
MD5bfbee9ffb9550e8ec1a1231d56353ca9
SHA1084c8c59bdc2fe4e6ace6644254c26700a378c65
SHA256df61de11911c41bf081e70bea9b850596b2331981a58c916fd1eb19b00af6f38
SHA51256bf2f628840a03db8abb811be93e5e4d2e30fadc87ff02bc35c35280ed1585251628aece88dc2967ee264a38908e02ea4ddd0f32a4a0aeb58cfbb57239f323e
-
Filesize
27KB
MD5464864e83c2f08180b1ca8f49a3993f7
SHA16494b9086a69c4508fbc7c6929729c84820c897e
SHA256f3fd224b2d26c6e1a27a3ecf76221dc734b04beda90f226fbcad8c69ff2a5a37
SHA512c3c8f9cc022f6618cbf670abf3be7e7ce13db166018b9a31d436685e39b558b5e4b2c918f93a33eee0c96344c57f900bb5f9fa4f91fce708da96754655716dc0
-
Filesize
28KB
MD550eba70b0e29a40870053bc65569fb6a
SHA1a27acc813481f31fc65598cb4286f252e61a55fb
SHA256cf9a85e1bfcb7be8f18da235eba13324f4855b2fd3d8aa2adbe87233283a8764
SHA51219279fa97d38f28a7287677816b4604f9e94670cf707069d9e49c9e29f1c837763cf1f8e54e3f8b9bea23dcba49aa67ae41f2325263269fb9f4d6ec9abc527f3
-
Filesize
29KB
MD51c35e7e3e6907f922d80c37bf93a1c2f
SHA1bf04123ded8abc10338f2f4404c1a480911e88b6
SHA2561b34ffa7532ec11c26694ca5ed8ea261b6fc192f65302d8e029b821dfbe30dcf
SHA5120b3e3e8424b0e23d978c3050fd81ca51ca12718dc36a6aaccf22fcc8d6fcf9e6a8f3ab3d19288544cefd2966b02ada9a0dd382cdcfbad2aa5ba6f8edda2afac1
-
Filesize
9.8MB
MD59c91d4e56002b6395d6cdad016ab65fb
SHA197af80cdd148e85fe50cf934ed6a224e12fb8122
SHA256f9a00b54dee51fb3b86bbfb3236a5a53c12a3ceb5ff37063a4013606e485c31c
SHA512b6228eaaf7c9c33163fab4cbd84fc5dd8dd36800f940851fe6590adba6760d41f65776067f6cbdd8b7c02f1e525bfba4811e98deec4efc45d2edf2df596711c8
-
Filesize
280B
MD5fb90f04ae622b911a34eaecc63eb2b82
SHA114f4125bf78198ef4cb37a1bc9e27d21703e4beb
SHA256f671ae6969d0cd4b777231259318176ed7e3ac58758d3ab73a46a1e6a3190ecd
SHA5128fc3113e8e6f6b7a027604959072270030720eb83b24666741e874ef4252b20430f14b5fa1af185dc137f8f637794de46e88343b71384a848d4460531103aa17
-
Filesize
101KB
MD519747bf8422a81d2f099d973e4e1d101
SHA18f82218fe3890847df31f0dcf5a526d8bdce082f
SHA25678d2722f8c9acf89126aeb87aeddd54deb93a5e82cc35182d8c4a2b11905338d
SHA5121deb43822ccbb44081d6b9c488176de3998c6c424929890399f1ff4591b24f32c6c1ec6315d3c834fb1fcc3319e2a92178402b6425a1483f77886771830157c7
-
Filesize
2KB
MD547c6d39f7718b602fdf37edcafa1f145
SHA10866bda59b5c2ecc5e74479ff74d5028ccc56069
SHA2568c14ae1e7e1b65c5fb3ace5a3b5acaff6d88605acd0f2abbb84a3200e0debf9f
SHA512b31d4378c814b19bd8ec87ad4b86e23138fb7be6a9f3b4029a92d92f5d2b907cb12347c89f483dce19a93f05b6e0cf960178f69ccc8222fc7bb61ad8c7677ea6
-
Filesize
1KB
MD577e9e9126e3d04c83f57c97de205b7bd
SHA19a8602bbc630ec5b55c4e6a3e101a312d219fd1a
SHA2568054cc240d5daacabf6ddd8398366c625252fe2eacacf5e945274bf35d43e7af
SHA512b8e52c2a4c758914cfb009f71e3a832fb910f463e173d31eaca2950f02db720fa1193c0ccad7aab8ca2aa9a8adecb1abd3d49d5752af4f41dade72e13352438d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_7907B0D1F2DC082B9BA6064FC995BD36
Filesize727B
MD562a44f8a07acd8a38b70903afcbff775
SHA1b35779f40bbc0fa3bfc198870837205baf681054
SHA256c24d723d42cf25f34210ea41b642ff04f4718995faf20c2e2fcf0476ac09124b
SHA51226098698a858f2f91a5335610c8e6e622bcae51bdbd76e5baf5f129d178baefbcb2081a143503ed1b2a9555b1c43cc480bea5f794feac57119628a1fc677473e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_7907B0D1F2DC082B9BA6064FC995BD36
Filesize420B
MD5b5c4d21712ab5c077134d7906a0a9208
SHA1939371ee8cfae0bc03b06c356988ae590483abaa
SHA25689f36fa76a825f8eda428645b60c24cb02e9efa711e6d7486773ab9fac08e8cc
SHA512d543761922a1cc8e3451eee0ca7d83354f52a46856ef772d92c95277513855bf8a58ed52b9746541eeebcfa280d5d8c63141d58de72fa82508bee24dee69bf6f
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
1.5MB
MD51a8e15de0c4de9ff87e90268f780d1be
SHA1e90ee17d0d92b18efbb3f261d16b49742781a44e
SHA2564cfffb2178202505422fc9612d3418ed1ee58d72a22fdde34d5ec4010285c874
SHA512676438645c4b24d17d85a259ec587b494d418d84309651b7336935d019c0baf86648adaa6096273cb0848e7aaa0f0bd806aa6e3b3916bd03a5721d107601cdd9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.0MB
MD55003486a784143bc96c3577172bbb44a
SHA19a960998807126041fae5b4fe9488d7ff3c5ca42
SHA256b1ac36000cee14b9c36aea4cef7f53ed2e7c18c9534b4ff66f07da11e8c07b59
SHA5123fd871414cffe35ae649dbb02935eddcad75ee094f2d61f2cef48827dfb852ff3b8e4211f913bf65e4619b2a4989a2807d876a920a105735ac3e59362802ee19