Analysis
-
max time kernel
345s -
max time network
347s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
26/07/2024, 09:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1258666032768356383/1265308732326416424/Solara_roblox.zip?ex=66a455d6&is=66a30456&hm=e04fe7b9c80ba0738c06d069c525a07e26b3d2b572035c42a3feb23b5b71f282&
Resource
win10-20240404-en
General
-
Target
https://cdn.discordapp.com/attachments/1258666032768356383/1265308732326416424/Solara_roblox.zip?ex=66a455d6&is=66a30456&hm=e04fe7b9c80ba0738c06d069c525a07e26b3d2b572035c42a3feb23b5b71f282&
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 5664 created 3128 5664 BitLockerToGo.exe 50 PID 3560 created 3128 3560 BitLockerToGo.exe 50 -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
pid Process 1544 powershell.exe 1420 powershell.exe 700 powershell.exe 2932 powershell.exe 2932 powershell.exe 1544 powershell.exe 1420 powershell.exe 700 powershell.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 33 IoCs
pid Process 2556 MicrosoftEdgeWebview2Setup.exe 2804 MicrosoftEdgeUpdate.exe 4436 MicrosoftEdgeUpdate.exe 204 MicrosoftEdgeUpdate.exe 4140 MicrosoftEdgeUpdateComRegisterShell64.exe 68 MicrosoftEdgeUpdateComRegisterShell64.exe 4336 MicrosoftEdgeUpdateComRegisterShell64.exe 352 MicrosoftEdgeUpdate.exe 4916 MicrosoftEdgeUpdate.exe 2052 MicrosoftEdgeUpdate.exe 2948 MicrosoftEdgeUpdate.exe 3516 MicrosoftEdge_X64_127.0.2651.74.exe 2976 setup.exe 352 setup.exe 1836 MicrosoftEdgeUpdate.exe 4544 msedgewebview2.exe 1308 msedgewebview2.exe 4144 msedgewebview2.exe 3188 msedgewebview2.exe 1400 msedgewebview2.exe 1800 msedgewebview2.exe 5360 driver1.exe 5476 msedgewebview2.exe 5516 msedgewebview2.exe 1300 msedgewebview2.exe 4880 msedgewebview2.exe 312 msedgewebview2.exe 5796 msedgewebview2.exe 2784 setup.exe 5880 msedgewebview2.exe 380 msedgewebview2.exe 3876 msedgewebview2.exe 3136 driver1.exe -
Loads dropped DLL 53 IoCs
pid Process 2804 MicrosoftEdgeUpdate.exe 4140 MicrosoftEdgeUpdateComRegisterShell64.exe 204 MicrosoftEdgeUpdate.exe 68 MicrosoftEdgeUpdateComRegisterShell64.exe 204 MicrosoftEdgeUpdate.exe 4336 MicrosoftEdgeUpdateComRegisterShell64.exe 204 MicrosoftEdgeUpdate.exe 2052 MicrosoftEdgeUpdate.exe 4916 MicrosoftEdgeUpdate.exe 660 setup.exe 4544 msedgewebview2.exe 1308 msedgewebview2.exe 4544 msedgewebview2.exe 4544 msedgewebview2.exe 4144 msedgewebview2.exe 3188 msedgewebview2.exe 4144 msedgewebview2.exe 1400 msedgewebview2.exe 3188 msedgewebview2.exe 1400 msedgewebview2.exe 4144 msedgewebview2.exe 4144 msedgewebview2.exe 4144 msedgewebview2.exe 4144 msedgewebview2.exe 1800 msedgewebview2.exe 1800 msedgewebview2.exe 1800 msedgewebview2.exe 4544 msedgewebview2.exe 5436 setup.exe 5476 msedgewebview2.exe 5516 msedgewebview2.exe 5476 msedgewebview2.exe 5476 msedgewebview2.exe 1300 msedgewebview2.exe 4880 msedgewebview2.exe 1300 msedgewebview2.exe 4880 msedgewebview2.exe 312 msedgewebview2.exe 312 msedgewebview2.exe 1300 msedgewebview2.exe 1300 msedgewebview2.exe 1300 msedgewebview2.exe 1300 msedgewebview2.exe 5796 msedgewebview2.exe 5796 msedgewebview2.exe 5796 msedgewebview2.exe 5476 msedgewebview2.exe 2784 setup.exe 5880 msedgewebview2.exe 380 msedgewebview2.exe 3876 msedgewebview2.exe 3876 msedgewebview2.exe 3876 msedgewebview2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 75 ip-api.com 76 ip-api.com 77 ip-api.com 51 ip-api.com 68 ip-api.com 71 ip-api.com 72 ip-api.com 74 ip-api.com -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 setup.exe -
Checks system information in the registry 2 TTPs 10 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat MicrosoftEdgeUpdate.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 5908 tasklist.exe 2244 tasklist.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5360 set thread context of 5664 5360 driver1.exe 134 PID 3136 set thread context of 3560 3136 driver1.exe 162 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Locales\gd.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\identity_proxy\win11\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUB60.tmp\msedgeupdateres_es-419.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\edge_feedback\camera_mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\oneauth.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\it.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Locales\ar.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Trust Protection Lists\Mu\LICENSE setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUB60.tmp\MicrosoftEdgeUpdateCore.exe MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\lv.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\nl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Trust Protection Lists\Mu\Fingerprinting setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\wns_push_client.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Edge.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Locales\lb.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\ko.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\sk.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\concrt140.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\nb.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\resources.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\vulkan-1.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Trust Protection Lists\Mu\Fingerprinting setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\ca.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\sl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedge.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Locales\en-US.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Locales\qu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Locales\or.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\eventlog_provider.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\127.0.2651.74.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Locales\es.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Locales\mr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\ug.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\identity_proxy\win10\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUB60.tmp\msedgeupdateres_ur.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\mt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\ffmpeg.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\bn-IN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\qu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\en-GB.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\fil.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Locales\mt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\onramp.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\v8_context_snapshot.bin setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\mip_core.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\Trust Protection Lists\Mu\Entities setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\VisualElements\SmallLogo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\ar.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUB60.tmp\msedgeupdateres_cy.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUB60.tmp\msedgeupdateres_kk.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\dxcompiler.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\msedgewebview2.exe.sig setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\oneauth.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\gl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\identity_proxy\win10\identity_helper.Sparse.Beta.msix setup.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2468 5664 WerFault.exe 134 4536 5664 WerFault.exe 134 212 3560 WerFault.exe 162 5584 3560 WerFault.exe 162 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 352 MicrosoftEdgeUpdate.exe 2948 MicrosoftEdgeUpdate.exe 1836 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Detects videocard installed 1 TTPs 2 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1072 wmic.exe 6032 wmic.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe -
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 106 Go-http-client/1.1 HTTP User-Agent header 107 Go-http-client/1.1 HTTP User-Agent header 135 Go-http-client/1.1 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133664597051588706" chrome.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ProgID\ = "MicrosoftEdgeUpdate.OnDemandCOMClassSvc.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{513C065E-085A-40C1-B47D-D2F56F9AA0D1} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{513C065E-085A-40C1-B47D-D2F56F9AA0D1}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass.1\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.193.5\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\CLSID MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9DA54E8E-61A7-4FEB-A84E-CE76BBDB5175} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusSvc.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9DA54E8E-61A7-4FEB-A84E-CE76BBDB5175}\InprocHandler32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\ProgID MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods\ = "6" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{513C065E-085A-40C1-B47D-D2F56F9AA0D1}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.Update3WebMachineFallback" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ = "IApp" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.193.5\\psmachine.dll" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\CurVer MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 660 setup.exe 2804 MicrosoftEdgeUpdate.exe 2804 MicrosoftEdgeUpdate.exe 4244 chrome.exe 4244 chrome.exe 2804 MicrosoftEdgeUpdate.exe 2804 MicrosoftEdgeUpdate.exe 2804 MicrosoftEdgeUpdate.exe 2804 MicrosoftEdgeUpdate.exe 1544 powershell.exe 1544 powershell.exe 1544 powershell.exe 1544 powershell.exe 1420 powershell.exe 1420 powershell.exe 1420 powershell.exe 1420 powershell.exe 5664 BitLockerToGo.exe 5664 BitLockerToGo.exe 2604 openwith.exe 2604 openwith.exe 2604 openwith.exe 2604 openwith.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5436 setup.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 700 powershell.exe 700 powershell.exe 700 powershell.exe 700 powershell.exe 5256 taskmgr.exe 5256 taskmgr.exe 2932 powershell.exe 2932 powershell.exe 2932 powershell.exe 2932 powershell.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5256 taskmgr.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1420 MicrosoftEdgeCP.exe 1420 MicrosoftEdgeCP.exe 1420 MicrosoftEdgeCP.exe 1420 MicrosoftEdgeCP.exe 1668 MicrosoftEdgeCP.exe 1668 MicrosoftEdgeCP.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4544 msedgewebview2.exe 5476 msedgewebview2.exe 5476 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe 5256 taskmgr.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 6020 MicrosoftEdge.exe 1420 MicrosoftEdgeCP.exe 1604 MicrosoftEdgeCP.exe 1420 MicrosoftEdgeCP.exe 3392 MicrosoftEdge.exe 1668 MicrosoftEdgeCP.exe 1668 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 1536 4764 chrome.exe 73 PID 4764 wrote to memory of 1536 4764 chrome.exe 73 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 1488 4764 chrome.exe 75 PID 4764 wrote to memory of 3508 4764 chrome.exe 76 PID 4764 wrote to memory of 3508 4764 chrome.exe 76 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 PID 4764 wrote to memory of 4600 4764 chrome.exe 77 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:3128
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1258666032768356383/1265308732326416424/Solara_roblox.zip?ex=66a455d6&is=66a30456&hm=e04fe7b9c80ba0738c06d069c525a07e26b3d2b572035c42a3feb23b5b71f282&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8074b9758,0x7ff8074b9768,0x7ff8074b97782⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:22⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:82⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:82⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=856 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3868 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5108 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5604 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5880 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5820 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5936 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3916 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5744 --field-trial-handle=1788,i,6015652107495881632,2621632699735664553,131072 /prefetch:12⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1500
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Solara_roblox.zip\setup.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Solara_roblox.zip\setup.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:660 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeC:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Program Files (x86)\Microsoft\Temp\EUB60.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUB60.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4436
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:204 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4140
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:68
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4336
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezRDRUEzQkZFLUYwNTMtNDIwNy05OUU3LUJEMTg4MTU0MzRBQX0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9IntCQzA1ODY5Mi03MjQ5LTQ5RTEtODA2My1BOTI1MkYzQzdEMkJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE1MDYzLjAiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iUUVNVSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxLjMuMTkzLjUiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU3Mzk0NzQ5ODQiIGluc3RhbGxfdGltZV9tcz0iNTYyIi8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:352
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{4CEA3BFE-F053-4207-99E7-BD18815434AA}"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4916
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=660.2552.179140215547615498392⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:4544 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.73 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.74 --initial-client-data=0x12c,0x130,0x134,0x108,0xb4,0x7ffff143d198,0x7ffff143d1a4,0x7ffff143d1b03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1704,i,17405879563698587066,11039022984826744261,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1700 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4144
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1508,i,17405879563698587066,11039022984826744261,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1928 /prefetch:33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3188
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1240,i,17405879563698587066,11039022984826744261,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2064 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3200,i,17405879563698587066,11039022984826744261,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3224 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1800
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
PID:1072
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:2244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\Temp1_Solara_roblox.zip\setup.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\Temp1_Solara_roblox.zip\setup.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵PID:5220
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5360 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 5164⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 5084⤵
- Program crash
PID:4536
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM2⤵
- Scheduled Task/Job: Scheduled Task
PID:5616
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2052 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTUwNjMuMCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSJRRU1VIiBwcm9kdWN0X25hbWU9IlN0YW5kYXJkIFBDIChRMzUgKyBJQ0g5LCAyMDA5KSIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxMTIiIGluc3RhbGxkYXRldGltZT0iMTcxMjIzMzc0MyIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzU2NzA2NTUyMzI0MzE2OCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxMTQzMjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU3NDM5ODYwODAiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies data under HKEY_USERS
PID:2948
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{944DCBC3-0449-4B09-9F8F-BAB828271863}\MicrosoftEdge_X64_127.0.2651.74.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{944DCBC3-0449-4B09-9F8F-BAB828271863}\MicrosoftEdge_X64_127.0.2651.74.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:3516 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{944DCBC3-0449-4B09-9F8F-BAB828271863}\EDGEMITMP_E118A.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{944DCBC3-0449-4B09-9F8F-BAB828271863}\EDGEMITMP_E118A.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{944DCBC3-0449-4B09-9F8F-BAB828271863}\MicrosoftEdge_X64_127.0.2651.74.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2976 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{944DCBC3-0449-4B09-9F8F-BAB828271863}\EDGEMITMP_E118A.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{944DCBC3-0449-4B09-9F8F-BAB828271863}\EDGEMITMP_E118A.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.73 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{944DCBC3-0449-4B09-9F8F-BAB828271863}\EDGEMITMP_E118A.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.74 --initial-client-data=0x210,0x214,0x218,0x1ec,0x21c,0x7ff616d5b7d0,0x7ff616d5b7dc,0x7ff616d5b7e84⤵
- Executes dropped EXE
PID:352
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezRDRUEzQkZFLUYwNTMtNDIwNy05OUU3LUJEMTg4MTU0MzRBQX0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9Ins4OTUzMURENi01MTRDLTQxNzEtOUY2MC1FMjUxMTFDQzExQjB9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE1MDYzLjAiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iUUVNVSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-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-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjAxNDQyNjYzNCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vbXNlZGdlLmYudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvZTNhZDA1NTgtODQzYS00YzBmLWJhOTAtN2JmZTA0ZTg5OTc2P1AxPTE3MjI1OTEwMTgmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9YkRrSVNhbmdTWldKJTJianE3aiUyYjJSRHNYRzN2SXRjbXQ3ejFoOVpjQlhuV3YwQURNWHc0Y01zRWx3Tmx5dGdvb0liQWFia3kwc09vZG5ZeUNLYWJBNUpnJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMTcyNTc2ODI0IiB0b3RhbD0iMTcyNTc2ODI0IiBkb3dubG9hZF90aW1lX21zPSIxNzAwMiIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjYwMTQ0OTY1OTAiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI2IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2MDI5ODA0NTU5IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2NDcwODI4OTM1IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMTA0NiIgZG93bmxvYWRfdGltZV9tcz0iMjE1OTYiIGRvd25sb2FkZWQ9IjE3MjU3NjgyNCIgdG90YWw9IjE3MjU3NjgyNCIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iNDQwODciLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies data under HKEY_USERS
PID:1836
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5256
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Solara_roblox.zip\setup.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Solara_roblox.zip\setup.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:5436 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5436.5480.20481613840731181902⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:5476 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.73 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.74 --initial-client-data=0x118,0x11c,0x120,0xf4,0x4c,0x7ffff143d198,0x7ffff143d1a4,0x7ffff143d1b03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5516
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1668,i,4049166935033273729,14122788869771470988,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1660 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1612,i,4049166935033273729,14122788869771470988,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1720 /prefetch:33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4880
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1696,i,4049166935033273729,14122788869771470988,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1912 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:312
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3144,i,4049166935033273729,14122788869771470988,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3188 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5796
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4124,i,4049166935033273729,14122788869771470988,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3876
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
PID:6032
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:5908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\Temp1_Solara_roblox.zip\setup.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:700 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\Temp1_Solara_roblox.zip\setup.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵PID:5680
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3136 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 1844⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 1764⤵
- Program crash
PID:5584
-
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Solara_roblox\" -spe -an -ai#7zMap20880:88:7zEvent206821⤵PID:5784
-
C:\Users\Admin\Downloads\Solara_roblox\setup.exe"C:\Users\Admin\Downloads\Solara_roblox\setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2784 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=2784.5888.116137843785407144052⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5880 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.73 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.74\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.74 --initial-client-data=0x124,0x128,0x12c,0x100,0x4c,0x7ffff143d198,0x7ffff143d1a4,0x7ffff143d1b03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:380
-
-
-
C:\Windows\system32\LaunchWinApp.exe"C:\Windows\system32\LaunchWinApp.exe" "http://www.bing.com/search?q=p6rbzy.exe p6rbzy.exe"1⤵PID:6044
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6020
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:5176
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1420
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1604
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2264
-
C:\Windows\system32\LaunchWinApp.exe"C:\Windows\system32\LaunchWinApp.exe" "http://www.bing.com/search?q=conhost.exe Conhost"1⤵PID:4288
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3392
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:168
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1668
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5408
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
7System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5afb23e25f9dc571a1601a3942e136bef
SHA1ae270fd05a86e0bdc2af5b48708b4dbb9371bfd4
SHA25629f302b439f266a8d6c747434c232f6b98aa6e407fba5cef1f41724a0878e7e8
SHA512571a0a350374f54310e4b39bbde49ae2089ff2c942df8c7adcbcb674d27a7422c156b4a8f474ac8ff257a593e060776b55cd3dfa8fb637bfebaaa7941862dacb
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
181KB
MD55679308b2e276bd371798ac8d579b1f9
SHA1eb01158489726d54ff605a884d77931df40098e4
SHA256c9aef2d24f1c77a366b327b869e4103ed8276ea83b2b40942718cc134a1e122f
SHA5129eb5ef48b47444909b10bf7d96d55c47c02814524df6a479e448e9ff50b9a462ac03c99f57258d0ed8fe3665fb286dde0d9be5a47019fb4d9c68da2b2589e898
-
Filesize
200KB
MD5090901ebefc233cc46d016af98be6d53
SHA13c78e621f9921642dbbd0502b56538d4b037d0cd
SHA2567864bb95eb14e0ae1c249759cb44ad746e448007563b7430911755cf17ea5a77
SHA5125e415dc06689f65155a7ea13c013088808a65afff12fef664178b2ea37e48b4736261564d72e02b898ced58bfb5b3a1fcdd2c7136c0d841868ec7f4f1c32e883
-
Filesize
214KB
MD58428e306e866fe7972f05b6be814c1cf
SHA184ea90405d8d797a6deba68fd6a8efae5a461ce1
SHA256855e2f2fab4968261704cab9bae294fb7ec8b9c26e4d1708e29e26c454c7b0af
SHA512bd40fc5fb4eeca9e1671d0a99a7ccd1d1ab3f84abf62e996827a60e471adecf655b5ed146cdaefcb82d29c563e4eeba7c1b2da243218cbca55009064dcad1f21
-
Filesize
260KB
MD564f7ff56af334d91a50068271bed5043
SHA1108209fde87705b03d56759fd41486d22a3e24df
SHA256a98505367c850b6ef6d2df68d24d83643767a6fab8f0dd22cc60509b3363ce51
SHA512b70c1d2a26f59e94b31beb3151f69d7eb9de8841399b618730d94263cc5402f391cd5cfc6621c8666e5e073e6f8c340d6fd3511f1cb1cbbf6ee75312598f56d7
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD5d1175f877ab160902113b3a2250d0d78
SHA17fc668cd9ed31d093f7c88dc4803ce3f3f833796
SHA2565ccf3eedf6f1f57d386cef188f070c72583d9a96ff674ce91e8776ced8e989b5
SHA512ba1fa4f61c3ed3766e6bd0ae95e36d7505774c463ff81b989e64acaf878cfd59fa41109c696ed16a122e68edc2e0c9f96afd9cfbe92bd7351583719b028c1604
-
Filesize
29KB
MD53cd709bc031a8d68c10aaa086406a385
SHA1673fbf3172ec1cee21688423ad49ec3848639d02
SHA25654dc23402365407bff46318ac0c8cb60c165988f4159a654b5d6013e289f888e
SHA51204e51aeed7c535616f1db7f92841bcda2bc22f85eb06a7ffc5b626f9f69be0219a042e8ae4a486a2f753b7f65901a082b81f5ba72113d9df9ef123b32367d7d6
-
Filesize
24KB
MD515abb596e500038ffdf8a1d7d853d979
SHA16f8239859ff806c6ad682639ff43cedb6799e6a6
SHA25619509364513e1849ddc46824c8b3bbc354bfc4b540158e28e18abb10b8537dda
SHA512c4642146979700898ad3adeb0160c8e9d7bb56c1e224a778d400764750c9d9cbd7c4ee52bec0853cc0e577884515bd40a1b0fd643cc0b66b56d472e0bbb1c23e
-
Filesize
26KB
MD561c48f913b2502e56168cdf475d4766a
SHA12bf4c5ffbfa6d5c5eaf84de074f3ad7555b56d5d
SHA2568fd703a50d9cb19e9249cf4a4409da71104c6a16475b9725306cd13c260cefd1
SHA512d8ba17df865bff6e2785986d9a8310ec7b0e530e389bf7baa719e95b7effa84b58c7102d5f9711fbaebdd2bbcb3cd66760f9eeed92c1aeef06b85d3724028d2f
-
Filesize
29KB
MD52ba6aaea03cf5f98f63a400a9ca127ab
SHA1807c98ab6fe2f45fa43a8817f0adf8abeec75641
SHA256509cb950d7f5d8f99adff84e6e381001f14571529571419fd5452b48e24c7291
SHA512d4b91512b586dbc1cd0c63aaa7bf82900ba80de2b3e265b0200f0a4e2bf0c0a3916675fb72f9bc0b4eaa5d9cc07ade94c8210ad2156fea6d3d2416a5cbf98c24
-
Filesize
29KB
MD5d624c5abfca9e775c6d27b636ca460c4
SHA18726c57cf5887367c8aa32a1de5298521d5fe273
SHA2567023866e9644a1edb50f0f388bc3f2aeaab561822e6b7d75ec5c66b151f126c0
SHA51292d0d5605336c329359f7c4aa7eeaf972f21877ac61f377e7a2f3c6d66f5d6882be649b765e4122043212381034b4131d44ae996dfc1df4a2e248babcb076c30
-
Filesize
29KB
MD56ff52c5cdc434e4513c4d4b8ec23e02d
SHA156b7b73e3cf2cf13fa509593f7c5aebb73639b83
SHA256414269530f9ecb045e2049266ee0b58df99ac37de75e0e127899eb3218371555
SHA512adc3b5593a69dcd0a894ed6bc1160fdbb0d0e9e96e83ca4430ef28e9115d6023f54f3e3fac3cba1ff4497e486991dc4e7e40c7b75ce7796a5044f1ccc5411371
-
Filesize
29KB
MD5c52c76a02dbfbadd6d409fcc9df8dd16
SHA1d406010ac12ed41e6cdc75eaa2daa231a1d6df6a
SHA25691843e7eb2f1a9e14f51f2b552d8390cf7846b4406b97ca98b105beb40fc461a
SHA51228b24bbe03f79a7e4ad51e0e15a664cd783b527255ff0952d43086071e494e7e45ae50d8c378f69abb22942eda2e8dcf8421e2922dcff9ff9cb851745750d2ee
-
Filesize
29KB
MD5eea17b09a2a3420ee57db365d5a7afae
SHA1dc43580f87f67a28c6fa0b056f41c2c0c98a054e
SHA256b86d6df0b608cbab18ea53c31a9a17c09c86e90e8592f3269af0517c9756c07d
SHA51253a199b1bd82ddde65fd6c9bb007867bfa3b2c39e07817a7aff39b7596f00a76bc5dc23687c7fb41b75b00b30ddfdb38a76c740c38bfe41dc21e1fa2d698469f
-
Filesize
28KB
MD51a3815be8fc2a375042e271da63aaa8d
SHA1a831ce72e5fe3c9477dee3defc1e8f1d3a11aaa1
SHA256e753e2315e26bc7b8334077846dc91a85fd89f1e483b305af8aaac5b596585db
SHA5129642fdc3cb49c6d0e4b1c4e1d636007234b126f48da1fe77f586cb8f9403bdc786b54d4bcdbc6175214b7d06a1879f2c809d3fb7e1b920ab36b29a12afe92fb4
-
Filesize
30KB
MD5253afd1816718afa7fd3af5b7ecf430d
SHA136e9d69eb57331a676b0cb71492ab35486b68d95
SHA25653325e46247a616a84442abbc914b8fa08b67800ab55d5625e43a58b19d44767
SHA512649b292b80dde95c195b968b51dd168f6f5513b179a35832b5e759795f04e6e6f326a34f6f7db37d12b8c322ccae197455565491c2484b8237c82e1bb2e77ad6
-
Filesize
29KB
MD57653243e1a6fbb6c643dbc5b32701c74
SHA1fc537eccc1da0775d145b21db9474ef2996e383d
SHA2569df1383dfa81c5064acd9130555dbaf2e7413b6e2bc72b1d2340a6013387061c
SHA512d7834c02a3891afbba040c943ed4255041a6c241d76ac138ad0c04baf589aaa355067395c606e910ef6b91d64042bf9f5c39bd01320d9eaf4ef850a24c17d1d8
-
Filesize
28KB
MD5a2c7099965d93899ff0373786c8aad20
SHA1cfb9420e99cc61fb859ccb5d6da9c03332777591
SHA2561343867f317fe3fc5a2328d427737d41964188aba50a9739fd0ec98319fec192
SHA512d2d1cd41bc425a1aa4c491d65ba9c4ced9dcb600f1d60af76151216f8eda310049002e5ca360d1df8f59d6334ad87b950c67a20a6d1c7f8a2ea322c9980b6a8f
-
Filesize
28KB
MD58fc86afdc203086ba9be1286e597881c
SHA16515d925fbfb655465061d8ee9d8914cc4f50f63
SHA256e8dfc22e5a028ad5d423634bf4ed96b90841fda6ff69c35469509f9a988a3269
SHA512cbfcdea1b4cb5f404553ada87de1240a3746306563f5f200582a21be656b43c0a0e5dcf25cd5ac49bbbe72abcf8147e62aa8a5e0a810bd6fbc7a1eab3e6029eb
-
Filesize
29KB
MD5414adfaec51543500e86dec02ee0f88c
SHA10ad5efb3e8b6213a11e71187023193fafc4c3c26
SHA25632684d2337a351ba37411962710983538341012e6526a9129161507aea0a72bd
SHA512fddc2123237a9357667bbe6b91f93b5a9ba276533b9c16d98adfa01045fca375a7aef5cf83e175c55382a387a16062661a4797da81f39881ab379c7863e2b054
-
Filesize
30KB
MD5d263b293ee07e95487f63e7190fb6125
SHA148020bb9e9f49408c1ce280711aa8f7aaa600fe2
SHA256c4a3198c15489ed873dde5f8a6df708cfc4a6d8722f3f1f63793863098509af3
SHA51269a851e77124e55f3ee4e3fde169f647731a514dfd16a22013a0ea520b9d6eb9f2aacc9c48a2a812eb8285f46db1a27d196c409587f4549f4e122fdb59ffe1b6
-
Filesize
31KB
MD58708b47ba556853c927de474534da5d4
SHA1a60c932bef60bef01e7015d889e325524666aeff
SHA256720074fb92fc405dc7a5305e802e2ecb7d948de58c814b0ebb2c02a0052a6894
SHA51258d7f419b26a95c986009af9e235fbaca67bf6b1883d8c586c802262fd9fbeaff56b051bf8de8e26f2e4ddeb803bbd4f87c84b1e02f5a43b6614231c59ab258a
-
Filesize
27KB
MD5511646c2809c41bcea4431e372bc91fb
SHA15b83f1c9de6bfa6f18ccfecf3190a80af310d681
SHA256719a5c47d3452e3dfda300788aafeba963c588cfea31d1fb1021f846bd6742cc
SHA5120b45cadd82dd534ba9d4556498817c712bd608b645faee74034c8c48cc39c13c0a8530826690a5c5ef42eb36e3f15f3b97e75625eea8902f12c21291df4cd211
-
Filesize
27KB
MD5ec991a4becce773db11c6f4e640abacc
SHA1298b5289e2712ab77cecfb727c9c8d47740f6fd3
SHA256800fc7987f7ac32267e84122eb94d8a21b83c481c2a34b03d832d57debc2b930
SHA5123e6066cb89abafe963337bbdc371b941ac21b69ceaa19f394512c84c0c06ce9d03141a146144d24172ab6e94f5900071b5b3f38c49f3a079c03bec24bd0418ec
-
Filesize
29KB
MD59309baaa10c227af2773000a793a3540
SHA155032c43f7a7eafb19bca097e3de430aad3913a4
SHA256a35fa7145fd3bfbc0d71cfe1bdefcb506cd02f0939dbeca83644978af8f896ac
SHA51221a05fe75d6115a7a49e779c9156ec25880393b30f69fdb80dc0dbe1c3bb401790c8e62525c0e6625b141cecb970b8d650527d73d2d86afa5056177957c44c24
-
Filesize
29KB
MD51c48f6a58fabc2b115dab7dccfae763a
SHA1c60db12b55074013293dd332d2736d251beaeb8e
SHA2560f6775450c40baea4e72d1eb45cff7c1daf2ac1210006bf7afcc91975467c086
SHA512a84a0ffba4f389698941a497ca6e63c6c632d2eeca788bcf970ea35f1083076950b59b9baeecab7ae17d06847f4675f748cc25b904b03f679801dfb3e2755c13
-
Filesize
28KB
MD5d591a3987492132f6ccd7968a8176290
SHA178a79e0e3935dee509938c9a3b095ef486283793
SHA25602380099a6a942004b0b0042f071108f4896884d19ec7c4cc1264200a8e0aa6f
SHA5127487a0e63a17cca85a127c8880e33c30fb192fb83bd05dad67cb4a3b9ad6ba84b594194f7126acbfb22ead2c00d3bb776557a0fa012ee1b7d43d88de2c7eabb1
-
Filesize
28KB
MD567624d2a8017a9c5fbaa22c02fb6d1b4
SHA1b39c26cb632d6e9cbdbe6f0490e80c11a94782e4
SHA256eb0033a91d64a80aaa66bd088692a8d089169524253b6286b5604ea1aaf0bc8f
SHA512f2fb8edb244d781a77c67ab85c40f0521ee80f0349ce897860542b6f32e134043afdccd50cd17e86c234000493f5c3b1b75950d1eb12e4d088b9fc7e012f06d0
-
Filesize
27KB
MD50b3cbfb6bc674960c6da5c47689e45d0
SHA1f91aa435a0bb4fefa3f7568d8f7b0e2022fc95f4
SHA256eca2354e58a321a78bcb21c24beefa050758c08e86218c55c12434c8ce715942
SHA5123a0e819ec96ec05bf0eb7119687be1a408330703a3c888e49a19fc0bb8ee62f45b1c9a9f24d7593e0355177445e566d6cba62d0b7d437b139eb08b274d3bf13e
-
Filesize
28KB
MD573650ec3b5bf0ac418d06ff2cad961c5
SHA15580915cc24402c72c49834cd9bfbd7c845de468
SHA2566817e994def058448407b6320f325f75dea6e2e561ffc747d0486a716d08384d
SHA512c08b069993790440f1baed5fbfc07368e9564d9bf0c16007968569b433b0b18ae6e8184f3073d522e92b6a7b4454ac21998b8f4fe80946273710097c659e2639
-
Filesize
29KB
MD56f2865bdc505a8216aadea20c0a0c6a6
SHA1a93b8db9aa8f2b2887ad43fa050f98584e3db06b
SHA25695b158fd84806d0dadb3d9a90f7b8a78040c1ecee5ff4dd266d407848c9f3a77
SHA512fc9ccad02d6c04e6d2e76b06d5cd60c486b4a2ffcca1cdc638cbeceabfeaf258c8dbcd5ea7fd3f7e2d288577c90565de7005c88638531ff24bfbaf2fba704c69
-
Filesize
30KB
MD593aa56aa0165d137e497c4b77965a6b5
SHA15e1396c24c76dcf8dad5d97e57cfed7372e7b8be
SHA256aaeaff8fae26262cdb2ccf1faf84bd202ff2a90d9fc95575770bc53bccee2c54
SHA512adb8e9aaf493a62a930398682522b8e9411a645d85493ba4e601d6f4eebd48fba982c6df8c5d01a78cc135d03bd3aa912fb71c3c8e26d1d99feb898e0a422a42
-
Filesize
30KB
MD5a4aa60f4891441bd2522d577f14164f9
SHA119f8a517c449b65967a1ae8b1b6a7f492ad0199e
SHA2567768c2b03810cdb491986f349992d32717c4c14df6266d5f70fa89aeb01c5a60
SHA5120a26fc4bddbcb0078f9ad0c5c9417b74f7c30c6a20e1272edbc20a3b0db29ea17dbc3c9224d2f131570444ce4fbf6f20b0b96e720d2b53c882b8735f444091c5
-
Filesize
29KB
MD5302403f155be43251104dadaf07f1c1a
SHA12f4a21b1e7aed5792b269ebe7a81dd29c3a6182f
SHA2563b6dd91cdb5cd4abedff8940c8a9e0f38cb3f8c49084ecbfcd59b788229f3230
SHA512742c2bd0cd9bc7fb75ee1fea45e434fcb40aed839f2854e17267382278269dcca640b3599823b0e4d04350bef0a0450bfad627586ee49f031d1922d73bc74fd9
-
Filesize
30KB
MD547fcec572a8eea3510596c079c431412
SHA1732395d8698191610bfb751e1466a868bca9b839
SHA2564a8c39680f188b75691e80ab5938e34aff83639c06a9722e30555c1cb8a927c7
SHA5121f18528128b6675f51a91c137e328ea06009636ef5c1970a8a4816437f445bdbf96428a3d310b04cfaf61d0a4adea7a4efd4f9bbd4dadb3f320366f39e40fc7e
-
Filesize
29KB
MD5492d2c11ad558129c9c687641bfafb33
SHA1c713926e13f062106937419975defd7e69228b35
SHA2560879c36a3c750ac9bdc4d73ed0ffb23d9c67e6d486291d56d3c5bb60073677c4
SHA51208d0e4664f07f05f3dea2dfa3d64815067b41cd63701b948b43016369a64151ae515f8c877460037b0f5306c8b080756321d2d6195fd392d86d0e9cc61bc1856
-
Filesize
28KB
MD5fae86d2dc9b09f0d8c0192e2bb53d929
SHA1e5d0dc95449d533785367d088ef5a357ebb7dc08
SHA2565d0f9f75e78fa5c0b0bd2406d6c671675492d92d3dc2515314bc79ba3132e540
SHA51201c7ae01172d98fc6cbc92510b2bafdc56f794f290139e3bf87952bc98b27b338e31899dafcd36f965e7240133183c5dfd6cf6085468fa779813121a27d7cbbe
-
Filesize
28KB
MD58d88faed698fbd4895ad6786acdea245
SHA188cea6fe82ac4970a2dafd971277d458b5aef61d
SHA256c1b2203965c8fb10f6faf65d591400a2da7443d0cba36aa8bde147e1ff6aa0a1
SHA5120a6eacb240a75135a7c651e524888462be350116ec19522c079fccca31a26904266e38add42eec5ef1036dcaa05ccdf9faf9d3b91923018d1aefbe8d63d1a27f
-
Filesize
29KB
MD5d9f0084ca7d58e6cbc12b7111b9f4be1
SHA1e96bd472daffd3569551f15eb602a7ce66da8935
SHA2562d45ff287b4dfe4db12cf83a88ddca14b560d991ef28dc6f5078b44d2603fd90
SHA512ba7e017b6cfb11a7e1f4a22c28ac8b4d4dc571a91c32ab6d63a87ef9dec334fee0062c5c764c662b6f8f89b80758a7dc1781858d0455ab3eba455c8d83134418
-
Filesize
29KB
MD5aace1b6afd05113ffe736206e32e8544
SHA148fe1f61e565f99ecf6365ddc6c2c24b2f38db5d
SHA256e395b29108a3a93fcf7411311d4f478f847f0d8337d4a2cefd64ae6bbfd21110
SHA512be7ae77ce69e6ada5a6169a0efb858723428084f9b7818482f2eaf7d5243d24b9c8131ea01e3f94cc9766d7462e5dae0ce5437247907f764ecff011c866bfd81
-
Filesize
28KB
MD5469423bc5ecca0db996ad9fe789fd58e
SHA1dc68d62d25ed917f836036911efd5067f9062c18
SHA256a25d798ed22ad51682aa90f66e5cca638ae095f4141eba6ef7ca45eb1ef217f6
SHA512360717c97b2f582843de19d819a5dda2cb2f8090c6542c0d87ae1a27cbf154cfd0b845d7f816ca236e65ce17013bb8ca640a5af2c9e5fe4fef05e94405491df7
-
Filesize
28KB
MD55dbbd22cda9cd2e19aae769dc7b083b0
SHA153fd1812647e5e413531d8e67e7970d3e22dac03
SHA256973c96fdecc4a157782414eebb1b17a94b146efe1a97b707043953d0ff1d03aa
SHA512774a5873117c98096e8826f7b03a8ddfd2cd7a1f815ee855a591f86f68bfd6bdf537ed49c9d4094fe931aa592da3eeefe0ded3625a9b811aa2a55a129dd7d9ec
-
Filesize
30KB
MD52f7b11cd7db9f173d040519ef0336ac3
SHA195e753d8bf61ef56dba6807bf730a42d390da401
SHA2568f7b44e60f4450655d963cec393fff3fab4f283672a8dbc8109d1ad967671171
SHA512ea60bff57fd53ab2cad475d753066d108c2108e41e7e4abb6b1bca153d04e07dfbba386ba73efe9b8a84032c9bb4b35b3c655280b43ee93637c5b388d1dd187f
-
Filesize
25KB
MD554519f24fcf06916c6386f642ebaf8a5
SHA12a33c7770c49bb3046a2a78a0457d6dcb3a23f02
SHA2561b0adf22a09097ce9ac5d102e0f102e6d3f2238c21b6d38fbec3c269bbf87c44
SHA512704684c706c9a40cdae8a68615a8a9782b29d177bb5c58e8c01e37c139296d6f1d48a446ec211d746aaf341b06a9148e246dd79b0a8a9098de0f66c68ae74eef
-
Filesize
24KB
MD512de274382418dd99d1125101d1d63b6
SHA14a9b0be76a7136f3b64c7bc53724dc2acc798c23
SHA2567e4f333b20f272bd86182fb3fa191e8ac6bc84c301e28886edbcb92e6e5e1eb2
SHA5129b05f97ca079d30560b09ca22efdb314dc7e36cf601d672a260f4c064d7841776891374a18d8ba1fcb4238fb854187b95c2d5643f428277e076b734ff477267c
-
Filesize
29KB
MD5e0eacb57da5404523e0351b0cc24c648
SHA149ce11a94c2751b7c44914ceda1627fb63651199
SHA2561a269d41990cc81b01b77f0981ff4e9ee31fab50cbe9f0ef437044b40ff72c79
SHA512735c37d267091491f55d80837bc4879a7a2d6dfaec6c3d2873770cd7706a39f29672eefa2f8a27c6038f84069517a8172cf929f48e637a9c65803e5f49525d54
-
Filesize
28KB
MD5f1c5f5604f5c2c0cfdc696866f60c6c3
SHA125643fc3eef898f4288205c711b693daaf8e78ee
SHA256e46eb23160f9e87a0d5aab8fee0e1d1aafe7299964864a2c59e9b9f718105406
SHA5120b562af8b178af10af225649e6c043bb848cfff81a5fa19cac9614eb8f793a97de25aab302bba69c7c35353dfd62baa0cadcc3635c773be1fc10d180241dab44
-
Filesize
27KB
MD564ad801a1ae3d24396147603cd5e8b41
SHA1e9bade01b12321017c450990294b40232c3f7e92
SHA25643dc5c7067bf4af7e8b67b472ee73143b74f4e65efa51e9049476b5bec568645
SHA51237c761400fbade30b06cbb036a288fa9585ed2e067834ff62230097151a4c923118811a79b126a775a15f08238fc957582b3ac41c30d2834d2a7d2ca6dd449a1
-
Filesize
29KB
MD5b772db9d925f936765055000bb2a4467
SHA13c85a28a6dc67e376cb72e25064a5e775b8fef87
SHA256df7dc4e535280090722edfea9f3de3197d1e35d3c8913ecc33285aeb00977e5b
SHA51200c732875c30a4d8dab0582fd9255d9963fdeb0e334f75394b6992c9a0620a7a549ef58076f75bc13b41855b356db08b49959d65695ae859b64f4c3caf6c4b0a
-
Filesize
23KB
MD5149ebf8a4922f050b73f3fb40519d0d3
SHA1141e3cff4b20cce5e3d667d9b56826a5947b040d
SHA2566d42d10a0e2f8cdfcc5fedeb52ac351c2a28e80d2e9e4c59b5a68ff5c258f418
SHA51265b5488070c58b5593ba8415c3d6834a6aa7bd17f39fe8120b509762860a5386a1a2a975b740bbdd9abcd3477e6ca9bc98eb35ea46cb148eed0527f504f1e737
-
Filesize
28KB
MD5b618d09cdf4473a17d9041fdf3309682
SHA17a36cee82849e2beadc82b88640ad25bf6eeb0f6
SHA256cf5af46c9f3f5103c291b80754703d7c4f90a34b5a178631b6b018ae737608c7
SHA512788adae6cebf5cbb8502453655f4e09ed22b8176bc071e4af5e82cc52ba34cc11fc6a60e1e5085a6ddeb7d16e4f342c991125c08dc6b1e7b630f65b4a567d346
-
Filesize
280B
MD5017c967cf9f0d65deaf2997cbdddcc3a
SHA1fbfd0e63fa46163026639e68e57daf4941132ff0
SHA2561b31a2c03f55ece4c1970dd372c017b0a435ee7c3862796b9884566eeb583581
SHA5128ce464981df0b1a5d4ecc7399bd6b3aba2552e69abbb76ed39e013b771da9129af360cad587883761b5ba2333c20dd4c8ebd2b005d9d59e1ff1c6f667a843a57
-
Filesize
15KB
MD5f769b56dd6394d6c935655d2605b700e
SHA12113bfff73d061a9e9c2d0072fa337bf132b666b
SHA25646759d7323818723efa38165f490de9833f143870ec87d7adba6795c478a6cf1
SHA512931225a9e83eaf71fe0f487743776e695fe120b780cffa3dc934a038cdb86d1e7aa51522b82c5c8dbf0d4d9ed3cc3913aa6de55b6b7c3ff573ea75d7ede3f8a8
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
Filesize
168B
MD5eb8ab27a7c7655705b341df0d6639ab5
SHA18ae9587c75e719596748274ce35402a2fa28b992
SHA256d44e5010b7a98deb51c16d20774d23966cd367ce6a7ce9a21e33695d584a1bd7
SHA512a9739ab260330c0965d5c6f47b5fcd37341fa371855dc6a99e42c5b1f69580efe38725aab536dd1ed45fab6f9386d582540fd5026893948c930c637fa2f9c510
-
Filesize
168B
MD5b9dcba9ee6bb3b99ab0c607799ba3980
SHA1312b4c1f2448607aa27dbf2be3aea9476eed2d00
SHA256090612b591dd8ee052e6a4911899711aa7e827906d6ca35fe0b7434248413209
SHA512c357222187338fdd56d359b34cd3d792e0ed2c9b961563b65c1aacddf4bbf72098aead9394f5bd732442a3ec05a9fa94eca0e4be08219fbb8e562508c22a6580
-
Filesize
678B
MD57aee7c75d2711a0f19f267be1fef89e5
SHA13661d37046c17c2eb776a8de28344b972d8b79b1
SHA256123f85539e7416488bce2a046e14de485e25360a425e1abe50f31215f9b7621c
SHA51294e5f4eb04de6a0a4499d3f2267cfb63ee3607bb35e81f53765f03cb7bd89d077d03869aff78602c25788b9fdbd1c9175043d892916053475e4fd19151e40116
-
Filesize
1KB
MD5fb1151b87338e58c163d67758dda5234
SHA1d93b4f1d1f003e9c3695dc4e5b921b177dd2788e
SHA256b5393c11056b3a92a1ebd00659035e63c2c92d35d2850bfdb1c22e5f8e5cfe7e
SHA512effeb488a528a49d9760f0035edeff94c00b0a05a15a388fa48bfa6bb3b27909b59c51d27966ceb40898cd2074af487ff3630de0e4df4bce8500e191617de389
-
Filesize
1KB
MD5bc3576e1a18e99ae596c8ff80acf7caa
SHA1c8c7812b6273fc541692c63bea15b3a561d3dfed
SHA2569e439047270d7409ffa788cf50f3269282372e4a8f63fddd7c46250babb06342
SHA5122b47a57befe104dde156ecb7da76b82abbfad42021a1ceeee8370c1761f04b373be55252ee42589c1e5c21f2ffd88e99caa61b9d8f0f17d040c712ad1bcdbfe6
-
Filesize
371B
MD5860acbe3d5d498fc2953bb0b198c5a1a
SHA11f6d73fdc0498499a8f13915b38490cc272d559b
SHA256201c718830174cf5ee95ee15931b5bdcee51d71f46f53e198d88ce84e1192581
SHA51260f346293d35ee87a41a9edc0792a4d6df125cbd0f59b44764ac30acb687bec07a4e1c31695e3ed567e66ffd0da7559b37545b4d0bffc15d9209ee6dcd540918
-
Filesize
371B
MD5b226921bd4432c2a4f655f3549842721
SHA1e61c9f0bd496fb7e3cfcba09e6d0fcad90397d9e
SHA256698572aade98be0f0df1564d6611b6409c72b96dc609316872bcab3309943fc2
SHA512e44352a4065c93430cbc25f564569ba4f912a0ce2935816dc49c40e66cc0642f4172f91e0a8f47d5abf36b855d96a64cedc72af365c33b73abfb520cdba5e160
-
Filesize
6KB
MD5865a520b4231b00016658cfabcb17408
SHA18fdee9db3e725ce00ff138064f7071c792999f5c
SHA2562aceccbc9f4dc418408737a1b585a747ea670a6bddc9a4a9a9b4b285976e02d0
SHA5129450355bcbdb3d01feadc42722ee96276159bba3585dbc844c4a5fcf087c1510f05c2b76bc9330403b71137a55a79c5e47689ce8e35dda05f6dc9beb0686c6e6
-
Filesize
5KB
MD51694fec94d9b7a767740f545822e4c9a
SHA1e8cbf580157293c3ca8dca364041e4b005d247a5
SHA2566926c6f158f5bf762005278d86624f1e64508879b00220fbb34746afb84c2940
SHA5123d1e2bb786ca1e06f1fdb8af6f51d62ca869776fbe7aaa36918193fd9af62a40b910c81b29bba1a059ca22c0f0ca5a9104eb013ab6ae6daac3d0a4cc22cc3dfc
-
Filesize
5KB
MD5e12023e118e5a370449cda3fd3ceccc2
SHA1711f3ca24c8aa13db36468be1a772aab516595b0
SHA25616466259e4202e77cb01b9d94a8b1f0de96f9433aa741a89fdeb316f3d618710
SHA51249f912439655c83529f0bf7c9e0aa7e445ba47db9c20f547d86fc6bed8ba04124ef5e573e479a737ecc30d9b694f22e1e6ea21afa1d8463079e5755a635b0a9f
-
Filesize
6KB
MD5e0b2f0cbd49a26070c4ad656ba121904
SHA112b6be0c85100024dc12f4a3e9b6ebf679e9ba30
SHA2567664ae7287224933b6e0d0c2b254429e3090895207745c7371829ae6572d93e4
SHA512df01a7a4a72752b4d89a1cc1b9fd3e765bfab02c00936d5c24887dd5c44e3c7ad5cf35658f1340aefa960c549eafa0c2803f562a71d7648ebc69f6cdb1390823
-
Filesize
6KB
MD5048a035f40d5cf8d1fcf430b005ce09a
SHA179701ef7c7252a90e186beb38a16f6b223b1558d
SHA256db3f45c1a690774133e02e3ab5b5b4a31bcb1da71d75557ebd0b6b16cea1595d
SHA512fd0f52b046379b8a82f73dd5ef92efa97659c8cf9c9849240ecfaeeaeff5776af6cc240239ade7d057660cff5a65dafb3641e000d63ee086f5a23aa729364742
-
Filesize
6KB
MD5260bb0e0b2c906250e92364ee40f7dce
SHA10d9ff65c86ac0c1be80f1a741aeea8654dc69db4
SHA256b617bd9098ccc13bf17a04b78ab0877e2361300467600705977d670e46db67ce
SHA51203d5a3d2f3a065ca2ee5bf6442a7bcf1a4398837876c15eb11440c2bb1a36b2903a0f65c145ac94789a795c25941f42abce58a535025ce07f9891c18b7c4eeb9
-
Filesize
6KB
MD5d163bf5f6fad184b8738bf6ba4f5af5e
SHA1e7e124dff411595138d686781085993d2f0f7876
SHA256d8fc4f0ce872fbc37e0accff0903ef48958e57a0f109c61e0f6af33080fbe202
SHA5126c1902a8db9564b1ae14c6ec43c144940cb2716bada4c5feb8b96daeba5714a4ea5cd0adfe3d9db262fc1bd981da951d9554139f84a8a665e1f230508f736dec
-
Filesize
136KB
MD5fc13180e6f3d0dc1dc73036cc440b141
SHA1acfd010e01b829b90f2cd1230db1707f57ccf4a5
SHA256dc09f36baa3ffd96b8ea6851fccab0e9aa439c7e7fb6c83ad0e1f81c11c6c327
SHA512c85573a6d7bfa8b7b661bd7edbbeefccdf0794b4f0a915b97b3642fe403a24dec4f1a7fd5a18ce4d788fce04b3e7e80b09185f342bd0bbccd00599c0aed15bc9
-
Filesize
136KB
MD561b9cb2a09ae1e02b7359d5e81476c3e
SHA188c5fe2b8152c841e786f939d822d1bb9f716398
SHA256499272ccda9806ced0128d04aaedc0bc96af0070df91f30a2fb20980968ea08a
SHA51236865047dfbe5ddd81eab4019dee4815d3c36d3d1b61057f81eb1b7c8eed0cd4d87d1191aab0e5dde33e10d3f815d0662b24fccc8a74da0c81bcebaa81d976c5
-
Filesize
109KB
MD5bd73933d963a49dfd23893ac4e26be1b
SHA126a2a7e4f9e248691e92c669e139a1b0ba4f69ac
SHA25685947ebb5f2004bca690b937c9cf8b502ccb3bca620a44d7fa67ce4bceee578d
SHA51264f5b9f776db17138c24d737f8ac2c5486aca19b648fa5b9137474802e16e1e1c909339b52806aa1c49c653610a5465c6d81c91ea84a78d13354547cbb8b5679
-
Filesize
105KB
MD5c0d9aad896b8b58294753cc073b456d9
SHA15c946f5fe9768b957ba4de7454164612df5fb10b
SHA256b58a64607fd87369312611cb2593ac3e2a4549d66f8ac43fe5b678dc73df6d78
SHA512d7d4b5a679d5dc500821627bb23b26863fd47101bb65363c413735bec0ffd3baba8f4869775dce0100724a2090545e3e6abbc90100482cc4886d8bec1794c570
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\40X7QXR5\favicon-trans-bg-blue-mg[1].ico
Filesize4KB
MD530967b1b52cb6df18a8af8fcc04f83c9
SHA1aaf67cd84fcd64fb2d8974d7135d6f1e4fc03588
SHA256439b6089e45ef1e0c37ef88764d5c99a3b2752609c4e2af3376480d7ffcfaf2e
SHA5127cb3c09a81fbd301741e7cf5296c406baf1c76685d354c54457c87f6471867390a1aeed9f95701eb9361d7dfacce31afd1d240841037fc1de4a120c66c1b088c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFC9ED9F867FB0041C.TMP
Filesize20KB
MD5f406f43059f996fc2b1d32a4b98f5dc8
SHA1f5620abf8a4805225f8ae222391ce74930ccc5d5
SHA256667c703df4d9e127befb4635b83ec7bff09d4c16d959a19ce56483991bc9b62d
SHA512abc258c03bfe71416a66bcbe3b9edd986a1904f11f755d00b0f7a0881bf01f37d398310fb3c24605f74d1c5207fc7f0e9fbbb23c2bd33510cbde16860e76bcf9
-
Filesize
1.6MB
MD52aeb55b75f68b4ea3f949cae0ceba066
SHA1daf6fe3b0cb87b4e0ad28d650fc9a190ad192b1c
SHA25622484fdf3008a593e7ca188863d423b8b2a345391120ed296ce8b156cfa983ab
SHA5123b6a6d6c87b8d9ab06fac72fa38067df4c7d4385d37d391d7ad58a623215681fc0366621ce3ce5c08af25e11cc468b18844ea5f7c8ccb71473c956c29d20188c
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
280B
MD5e2f805bfd6ea4da0701bf65f655c7c02
SHA1d6adefef317d9fe22d332b386339afe5242bced5
SHA2563442d7758143523e8a9a219123fad0d822bb4dc0ebf4ced85542461d3df5b9ec
SHA512ea42d79977061cfc0391109b5f1a2e6488837f6e37911836f5c2160fcd840cafa5f4531109e7e9312ab25c6b466b7613de50fff948f3fde1d94afc31b55d9d39
-
Filesize
280B
MD578e5c1e89446e9712dc786be41179cb2
SHA1a206a004d1c086fa314d0cbb735a37c29a737dc6
SHA256268846791cff0ff580ae42134931fc17e0c982b9c8232b26f90e7521367d49e8
SHA512ebcea5de208c879b4b01869029b96e32c11e158f34ac0eb21a7f85f8726d43fd8221edd940dff761da7488c61b8b7f0e08eb18c4d14ef1e83f23f6a6d42e7ca8
-
Filesize
280B
MD50f99b59b1501c7e1f40471617f8ed18e
SHA1afdcb4ad884632bfaec817359e0795469059be47
SHA256d5bc7847f3a1b5c8883667df9af5ab66d59498a2d96e747731045d2489de6fef
SHA512a1394ba0db79e4e675c963a56884f48086cf1b87d20a0367c48c995f102a62e47bab80de50f1e19184324d210717530e64be020506b495fa6efa3f3476757e94
-
Filesize
280B
MD5cf2f13491b7e1e72a0d82e37c6cc1754
SHA1860832df63daa83a67283284b0a7f3657dfca2c0
SHA2561e47c95a214483fabb80d8a85bb7fd25a649905fbe09cdca608dd417de55f62c
SHA512f4206c8ce56e15e09cebad72e44ef5d1fe049a2a69f336ef925b28c72831ecf9a619e38b6b51ec4ac879738554e668f1897800cb6c7955717e276be97e0e76f1
-
Filesize
120B
MD5a7f8b5bd1592576202aceb8f0f952491
SHA173efe442f0e44b634fc3139109e609cf8583b8dd
SHA25625abae4ed834835e49a15e6770fbc18cdc442e9a99f9b8244f0c668b7ebe94c8
SHA512e3d86c503ebac4416bde59ba8427b63dbc5ba375981acced9162b4bd7e082457069689995cd7564b10d794368e71c107f76e248339f5fe0bdb285e2e4e722299
-
Filesize
96B
MD5124f4deb7259bd7a1003026f7587366a
SHA199abc77cf0322409795115def5bc9bea803446f9
SHA2564ad9e2a113c01993fd235645396a0c02bd00e089ae7d3944c87be3d4e49aebee
SHA51235e5ab5c8e6d9012247c07c651fe5a725e2cdc05bb28500490d4a0af84f43788104d5a4e3e6a4b541323324becd023f077140c92875bbad7d0105908ee25a9b5
-
Filesize
120B
MD5bbbc35cc43641773d67c357ff0a45de8
SHA10c2756ec45d8864ba18805d6fa420f9986e93de0
SHA25639f3926d0cdcc6251bac2f3c02da971dd52697d82fc500615070b0652de2eb17
SHA51272afa5ee70f19652e3db133582bd338fbc272f6f4ae9c74b633d9fc9ed4db88bac809bace25c333797110a01eda2ce38405f731ae8ba866376ef8819dc3bdc20
-
C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe5a6fe2.TMP
Filesize48B
MD5c34f1bdb867a2757e0688fdbc0a501c1
SHA1783b85825fadd320a27634f2a63423a1d8cd2fcd
SHA256d222f580bcf16341fba75d52b56b22939d06ccb55d290c0aa0352d230a6315f9
SHA51299da0d9df1360acffa9c45a6bf27520e8dc09c91a134ff6357d8468bd7d3db4e64422135c3bd4df343ffadfe1253de23fa2aa0020610796be2af95cd055e1799
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Network\Network Persistent State~RFe5a7011.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
188B
MD539639cbc79487a332c757c3d3873468c
SHA1a9a5142e1330243e80c2786bab21f51d158824b8
SHA2567ffb1b30d5060f8fea0b434cfbde5730b9fce9d230e007b3ce26b6c7898a86b5
SHA5121d56f19468f36b9e30560c0c0027773f6b03229ae1fce701c1a7ae671324e7ff050dbc578557641d82cf5dbf7ce04fcea23051102896f37dd03452e97b90b2ea
-
C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Network\a3b42689-fc60-4f7c-89bd-f0f80e0cbf83.tmp
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
6KB
MD52dd0c183af8f049d2eb4317e65c22c76
SHA1b86992e125b5fd706ace7bd47b548238f74b7871
SHA25672403bd23f251331b162d0edf242e793b25f92d15135c453f2597ab461739750
SHA512dd940476ee1ec87afc3db7fda488f39c00e6029ba3ba85a2df68714efe86d556c8ffb9fdcb7e336beec088f037bcb634df540f7542783e13a00b5e2aaace255f
-
Filesize
6KB
MD55df87f15461434239836f069cd9fd83d
SHA1145ae76c1918ba6d88c74a5087c9dc3a8aa11f82
SHA25672821043fe0403e124585f0a22ed7df26454d9331aa53a96d57ecbbb1e241b3b
SHA512bbf083aed9330393e0a29031411d5e28d1d5e34f9779daf0050bcf3c29c8293aa6a6499efdec86455381ed4b8bba4168723f46614671d0b4c31d99660000ac1c
-
Filesize
6KB
MD5f0914a7303dd57753de0f78452ca6801
SHA14502dfd2e98e16abfd27daf065ba138faa4bd8af
SHA256dc6d5c285bf837873b67790cedcafe6faadefb66dea0cce98a18963fd20e3640
SHA512978885d8d462430163cb40aa6f9470168737561f8ef332bdb19ccbeb22a283f2eeb3174f49acc7f1241e83be0dfe31c13de2bff770ea24c703916cf7c9812102
-
Filesize
6KB
MD5b44d9b5908c1a4a454cb2fef94360532
SHA1f326f6f68d99a0fd954db170ff931b33606591bb
SHA256f4f08b40aeb98cecb2b0b94ea267ff0be3a0ed99036a1a3001f12d2fbb0135bf
SHA512b8ff45125fe60d854aa147327028fa10c5d6e96dcae7038161d25283fcb72e83a50dc5f5533409275f7ee19675fcee933705cc0a4cea05be677598488d27e7ec
-
Filesize
6KB
MD53e22790757237913b6235c75fbade6ff
SHA17e9898e6d995863206ac3ef773fd5d161792f591
SHA25682ecfe3a8a1318d6e842a82ce514582ea9537e95abec31c0adf4d6e8d642b26c
SHA512592c008bd956a1d0bd83ce38ca730051a8ae6f790d1528f00ac83dd9958147af8758403f62fc6737cb0eb2967eb3166ef9d97bdac70f327a9c22e9d8c464bca2
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
1KB
MD569cb6eb9b130685f258ec2c0d3e79c8f
SHA137094b31a35fad55417ab6ef86d8cc8fa16dbc33
SHA256f3e008e215456d994f516a0f3e4296e87cb4ec1ddba6f0ebb210d6faa4342399
SHA512ce682f0792669410118a167cc10e6b387c434006c3a5f57db11e4d8fb5d30ffb1b143b7742808ce8aa4bc8d8a1f2f0e85f9b807fdbe0323e533f1032ae3f0ee9
-
Filesize
3KB
MD59977218cb20d7b57e13a2a971327866d
SHA12e4b5cdb729b56444a2068ae17a3de04f4304a12
SHA2564707d3a7a8fb724c7f4b8bdb6fc5c5e2a94237068ceab0d11fe43886715d5a1d
SHA5121f310250fd42c777d08b2281ff55844b059922caaad6e26dc20a37f0c45a8d82dd143ad9fc692b9918bd1d1d56727aab54c2721eb274bf6c19b86ffd41a24c97
-
Filesize
4KB
MD5dda1fb0459ee44f142b69dd763401558
SHA1fe4f6a8ba7823780041074785b539c718ac5b922
SHA2569bca861890fa507caa9113da2014705d207971cec4b8961727c919d5c4c40ae2
SHA512c9d4355ed00e5e246ebabc5cc0157960e2b31869f266f10e2eb4a9f939ebb563cc4c53d5b4276386b97840e811381181f46683f5ec3643b1e9ccbe0bc6de5bdc
-
Filesize
16KB
MD5fbb3c489ede8c3ff8252823377e4637f
SHA1c9e215172289b37e064121f85a4050d519d9964b
SHA2562b44a3efa1b7513bd1f64d6c5da2d3ce1f0dbb0c5e8faba5432a4d168968f0c9
SHA512b5fb0132423926e3c005cbb7f2c5b391a6c52037a2e7f1522d8bd13f5c8eafe8f41a016b91dcca826396ed19d6587e8e62d4207d12625badc124caccc401cedb
-
Filesize
17KB
MD50f9173b98c8d1a1fe912442570e2cd30
SHA1a7c766e85d947c68d11e5a5d8e9790145c55744a
SHA256496ef30251c479ccdc37d42fd2f07f02029f63712f46f30e529bd712c8f0c3a2
SHA512f9cc9e2c1b956945788f2141520f927b11b4caa69b68b661e31a4205c4c507ea02147b605bb9141d3f2b76e1b6e359bb861ac1c7c78341f76853ac436099f6b9
-
Filesize
18KB
MD5bac432380880de8db06297a3defc3a67
SHA18bace7b4b0eb1c3d5c93059d76d436481a7989a4
SHA2565bd2ccdd455c828fc088da218af36b33d4d0f1dc94ea37fa285cd1039b45d62d
SHA512d2d3b164e4afa6c8b68f8fa3aa6f2a7b96e8c0d2216de11b4c9e881231f38af9d6ce988ae2465cf7967ca56f6beee8b7a9f5922ac4f2fba1dac4e65a1ce8226f
-
Filesize
18KB
MD5bfe4d4bca35ed259efd764dba951dfc5
SHA14c42424650f56b9d439545894bd30c0248f1f77f
SHA25647e146a6dbf9aa86aff411caf0fd231e04f1c0c6b691dd1447f4ca1cb8cf3f5b
SHA51262cd837a3b4471b2560fecda13848a91e0b191916e15ffbe2f16e838833c6b33da956e8bcf1987e415581d36740ba16b880a4a9ce650c02867d1441de228ed05
-
Filesize
1KB
MD5c3e6b1f7a343b728e6d33e969fa66939
SHA1f375b7a3d22a93ce53503525bcb3382c5ed2f585
SHA2567126ff87f0f2689fccf6c0be30443fcd5b98d641b7354b7c4c8cba97dbafecd6
SHA512409065cc474fc0d6c2fca7f7909543d7c68c7e705926dc7636b4dbb8df9c6a80df45c16597fc7f3800dd2224194058a36072296b3916bfe31d3a5c98b071497a
-
Filesize
15.2MB
MD5325eaa719d119aa8a559410b7af339fd
SHA13fcad09ac80ab0e9c056eab70b55887ea4245df3
SHA2563f767ffe96383bc3850ccecde867a3d4395b647947c9a3f004fbbc4894302136
SHA512d76e0fd995621f9267aa5dd25e23bdcd2247fd3732f268f8afc2e382f703e009e97fbfa1022f3d69aa851a1e261267614d923ae2a311fe1177ea3b4036f77e35