Analysis
-
max time kernel
844s -
max time network
844s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/08/2024, 18:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://goo.su/OJUna
Resource
win11-20240730-en
General
-
Target
https://goo.su/OJUna
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 2688 created 2852 2688 BitLockerToGo.exe 49 PID 5920 created 2852 5920 openwith.exe 49 PID 5236 created 2852 5236 BitLockerToGo.exe 49 PID 4320 created 2852 4320 openwith.exe 49 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\127.0.2651.74\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4748 powershell.exe 2772 powershell.exe 6140 powershell.exe 3736 powershell.exe 4276 powershell.exe 1064 powershell.exe 3736 powershell.exe 4276 powershell.exe 1064 powershell.exe 4748 powershell.exe 2772 powershell.exe 6140 powershell.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 45 IoCs
pid Process 1608 MicrosoftEdgeWebview2Setup.exe 1880 MicrosoftEdgeUpdate.exe 1440 MicrosoftEdgeUpdate.exe 2280 MicrosoftEdgeUpdate.exe 1212 MicrosoftEdgeUpdateComRegisterShell64.exe 3024 MicrosoftEdgeUpdateComRegisterShell64.exe 4572 MicrosoftEdgeUpdateComRegisterShell64.exe 4808 MicrosoftEdgeUpdate.exe 4000 MicrosoftEdgeUpdate.exe 2432 MicrosoftEdgeUpdate.exe 4896 MicrosoftEdgeUpdate.exe 5728 MicrosoftEdge_X64_126.0.2592.113.exe 5780 setup.exe 5804 setup.exe 5504 MicrosoftEdgeUpdate.exe 5560 msedgewebview2.exe 1992 msedgewebview2.exe 1208 msedgewebview2.exe 3832 msedgewebview2.exe 5628 msedgewebview2.exe 2252 msedgewebview2.exe 3056 driver1.exe 2648 msedgewebview2.exe 2252 msedgewebview2.exe 5848 msedgewebview2.exe 5124 msedgewebview2.exe 3544 msedgewebview2.exe 2848 msedgewebview2.exe 1892 driver1.exe 4780 MicrosoftEdgeUpdate.exe 852 MicrosoftEdgeUpdate.exe 3520 MicrosoftEdge_X64_127.0.2651.74.exe 3016 setup.exe 5552 setup.exe 4544 setup.exe 5316 setup.exe 4960 setup.exe 3508 setup.exe 3408 MicrosoftEdgeUpdate.exe 4932 msedgewebview2.exe 3012 msedgewebview2.exe 5836 msedgewebview2.exe 5748 msedgewebview2.exe 5676 msedgewebview2.exe 2676 msedgewebview2.exe -
Loads dropped DLL 64 IoCs
pid Process 1880 MicrosoftEdgeUpdate.exe 1440 MicrosoftEdgeUpdate.exe 2280 MicrosoftEdgeUpdate.exe 1212 MicrosoftEdgeUpdateComRegisterShell64.exe 2280 MicrosoftEdgeUpdate.exe 3024 MicrosoftEdgeUpdateComRegisterShell64.exe 2280 MicrosoftEdgeUpdate.exe 4572 MicrosoftEdgeUpdateComRegisterShell64.exe 2280 MicrosoftEdgeUpdate.exe 4808 MicrosoftEdgeUpdate.exe 4000 MicrosoftEdgeUpdate.exe 2432 MicrosoftEdgeUpdate.exe 2432 MicrosoftEdgeUpdate.exe 4000 MicrosoftEdgeUpdate.exe 4896 MicrosoftEdgeUpdate.exe 5504 MicrosoftEdgeUpdate.exe 2436 SetupV4.4.exe 5560 msedgewebview2.exe 1992 msedgewebview2.exe 5560 msedgewebview2.exe 5560 msedgewebview2.exe 5560 msedgewebview2.exe 1208 msedgewebview2.exe 1208 msedgewebview2.exe 3832 msedgewebview2.exe 5628 msedgewebview2.exe 3832 msedgewebview2.exe 5628 msedgewebview2.exe 1208 msedgewebview2.exe 1208 msedgewebview2.exe 1208 msedgewebview2.exe 1208 msedgewebview2.exe 2252 msedgewebview2.exe 2252 msedgewebview2.exe 2252 msedgewebview2.exe 5560 msedgewebview2.exe 6064 SetupV4.4.exe 2648 msedgewebview2.exe 2252 msedgewebview2.exe 2648 msedgewebview2.exe 2648 msedgewebview2.exe 2648 msedgewebview2.exe 5848 msedgewebview2.exe 5124 msedgewebview2.exe 5848 msedgewebview2.exe 3544 msedgewebview2.exe 5124 msedgewebview2.exe 3544 msedgewebview2.exe 5848 msedgewebview2.exe 5848 msedgewebview2.exe 5848 msedgewebview2.exe 5848 msedgewebview2.exe 2848 msedgewebview2.exe 2848 msedgewebview2.exe 2848 msedgewebview2.exe 2648 msedgewebview2.exe 4780 MicrosoftEdgeUpdate.exe 852 MicrosoftEdgeUpdate.exe 852 MicrosoftEdgeUpdate.exe 4780 MicrosoftEdgeUpdate.exe 3408 MicrosoftEdgeUpdate.exe 3840 SetupV4.4.exe 4932 msedgewebview2.exe 3012 msedgewebview2.exe -
Accesses Microsoft Outlook profiles 1 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook openwith.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\U: mstsc.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SetupV4.4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 SetupV4.4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SetupV4.4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 SetupV4.4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SetupV4.4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 SetupV4.4.exe -
Checks system information in the registry 2 TTPs 20 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\azman.msc mmc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 4700 tasklist.exe 5032 tasklist.exe 4572 tasklist.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3056 set thread context of 2688 3056 driver1.exe 155 PID 1892 set thread context of 5236 1892 driver1.exe 198 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\is.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\hr.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\nl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Trust Protection Lists\Sigma\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\gd.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Locales\nl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\msedgewebview2.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\resources.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\fr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\sr-Latn-RS.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\eu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\BHO\ie_to_edge_stub.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Locales\mk.pak setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\new_delegatedWebFeatures.sccd setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUFBD0.tmp\msedgeupdateres_cs.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\mt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Locales\is.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\nl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Locales\cs.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\identity_proxy\win11\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\vi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Sigma\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\hr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Mu\Advertising setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\msedge_pwa_launcher.exe setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUFBD0.tmp\msedgeupdateres_is.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\msedge_elf.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\wdag.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\webview2_integration.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\edge_feedback\mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\lv.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\te.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Sigma\Staging setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\msedge_proxy.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Locales\bn-IN.pak setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\1294db2b-aad0-403e-b581-53136cac8624.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\EdgeWebView.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\resources.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\show_third_party_software_licenses.bat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Trust Protection Lists\Mu\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\edge_feedback\mf_trace.wprp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\km.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedge.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\pt-BR.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\microsoft_shell_integration.dll setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUFBD0.tmp\msedgeupdateres_gl.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\uk.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUFBD0.tmp\msedgeupdateres_az.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\de.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\lb.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\new_pwahelper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\msedgewebview2.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\qu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\ta.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\ur.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\ca-Es-VALENCIA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.74\Locales\pa.pak setup.exe -
Drops file in Windows directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp msedgewebview2.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml MuiUnattend.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log MuiUnattend.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml netbtugc.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml MuiUnattend.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml MuiUnattend.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log MuiUnattend.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log MuiUnattend.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log MuiUnattend.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log netbtugc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml netbtugc.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File created C:\Windows\pss\boot.backup msconfig.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml MuiUnattend.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log netbtugc.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2948 2688 WerFault.exe 155 5196 2688 WerFault.exe 155 5740 5236 WerFault.exe 198 5084 5236 WerFault.exe 198 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3408 MicrosoftEdgeUpdate.exe 5952 NDKPing.exe 4808 MicrosoftEdgeUpdate.exe 4896 MicrosoftEdgeUpdate.exe 5504 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 54 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\Device Parameters mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID msinfo32.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString openwith.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 openwith.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotificationUx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotification.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 openwith.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString openwith.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotificationUx.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotification.exe -
Detects videocard installed 1 TTPs 3 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 404 wmic.exe 380 wmic.exe 4200 wmic.exe -
Enumerates system info in registry 2 TTPs 17 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msinfo32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
GoLang User-Agent 4 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 56 Go-http-client/1.1 HTTP User-Agent header 66 Go-http-client/1.1 HTTP User-Agent header 128 Go-http-client/1.1 HTTP User-Agent header 229 Go-http-client/1.1 -
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge\WarnOnOpen = "0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge\WarnOnOpen = "0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\127.0.2651.74\\BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\127.0.2651.74\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133670117846149935" msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\ProgID MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2167" SearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\runas\ProgrammaticAccessOnly setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.pdf setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc.1.0\ = "Microsoft Edge Update Update3Web" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.15\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{375D3B39-152A-41E1-BF1B-B648933F26D0}\InprocHandler32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.15\\psmachine.dll" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService.1.0\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ = "IGoogleUpdate3WebSecurity" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13}\ = "ie_to_edge_bho" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\LocalServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1077" SearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.webp\OpenWithProgids\MSEdgeHTM setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.15\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.xhtml\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "33639" SearchHost.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\LocalServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass.1 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{375D3B39-152A-41E1-BF1B-B648933F26D0}\InprocHandler32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebSvc.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ = "IGoogleUpdate3" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ = "IAppVersionWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\CLSID\ = "{77857D02-7A25-4B67-9266-3E122A8F39E4}" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "17088" SearchHost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\LoaderV8.zip:Zone.Identifier msedge.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5484 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 4788 wmprph.exe 3432 wmpshare.exe 3308 setup_wm.exe 2860 wmpshare.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 4548 msedge.exe 4548 msedge.exe 2740 msedge.exe 2740 msedge.exe 4900 identity_helper.exe 4900 identity_helper.exe 4524 msedge.exe 4524 msedge.exe 2436 SetupV4.4.exe 1880 MicrosoftEdgeUpdate.exe 1880 MicrosoftEdgeUpdate.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 1880 MicrosoftEdgeUpdate.exe 1880 MicrosoftEdgeUpdate.exe 1880 MicrosoftEdgeUpdate.exe 1880 MicrosoftEdgeUpdate.exe 4748 powershell.exe 4748 powershell.exe 4748 powershell.exe 2772 powershell.exe 2772 powershell.exe 2772 powershell.exe 2688 BitLockerToGo.exe 2688 BitLockerToGo.exe 5920 openwith.exe 5920 openwith.exe 5920 openwith.exe 5920 openwith.exe 6048 openwith.exe 6048 openwith.exe 6048 openwith.exe 6048 openwith.exe 6048 openwith.exe 6048 openwith.exe 6048 openwith.exe 6048 openwith.exe 4788 wmprph.exe 4788 wmprph.exe 4788 wmprph.exe 4788 wmprph.exe 3432 wmpshare.exe 3432 wmpshare.exe 4788 wmprph.exe 4788 wmprph.exe 3308 setup_wm.exe 3308 setup_wm.exe 4788 wmprph.exe 4788 wmprph.exe 4788 wmprph.exe 4788 wmprph.exe 2344 msedge.exe 2344 msedge.exe 4788 wmprph.exe 4788 wmprph.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 4788 wmprph.exe 4788 wmprph.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 6092 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 5560 msedgewebview2.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 2648 msedgewebview2.exe 4932 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1880 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1880 MicrosoftEdgeUpdate.exe Token: SeIncreaseQuotaPrivilege 404 wmic.exe Token: SeSecurityPrivilege 404 wmic.exe Token: SeTakeOwnershipPrivilege 404 wmic.exe Token: SeLoadDriverPrivilege 404 wmic.exe Token: SeSystemProfilePrivilege 404 wmic.exe Token: SeSystemtimePrivilege 404 wmic.exe Token: SeProfSingleProcessPrivilege 404 wmic.exe Token: SeIncBasePriorityPrivilege 404 wmic.exe Token: SeCreatePagefilePrivilege 404 wmic.exe Token: SeBackupPrivilege 404 wmic.exe Token: SeRestorePrivilege 404 wmic.exe Token: SeShutdownPrivilege 404 wmic.exe Token: SeDebugPrivilege 404 wmic.exe Token: SeSystemEnvironmentPrivilege 404 wmic.exe Token: SeRemoteShutdownPrivilege 404 wmic.exe Token: SeUndockPrivilege 404 wmic.exe Token: SeManageVolumePrivilege 404 wmic.exe Token: 33 404 wmic.exe Token: 34 404 wmic.exe Token: 35 404 wmic.exe Token: 36 404 wmic.exe Token: SeIncreaseQuotaPrivilege 404 wmic.exe Token: SeSecurityPrivilege 404 wmic.exe Token: SeTakeOwnershipPrivilege 404 wmic.exe Token: SeLoadDriverPrivilege 404 wmic.exe Token: SeSystemProfilePrivilege 404 wmic.exe Token: SeSystemtimePrivilege 404 wmic.exe Token: SeProfSingleProcessPrivilege 404 wmic.exe Token: SeIncBasePriorityPrivilege 404 wmic.exe Token: SeCreatePagefilePrivilege 404 wmic.exe Token: SeBackupPrivilege 404 wmic.exe Token: SeRestorePrivilege 404 wmic.exe Token: SeShutdownPrivilege 404 wmic.exe Token: SeDebugPrivilege 404 wmic.exe Token: SeSystemEnvironmentPrivilege 404 wmic.exe Token: SeRemoteShutdownPrivilege 404 wmic.exe Token: SeUndockPrivilege 404 wmic.exe Token: SeManageVolumePrivilege 404 wmic.exe Token: 33 404 wmic.exe Token: 34 404 wmic.exe Token: 35 404 wmic.exe Token: 36 404 wmic.exe Token: SeDebugPrivilege 4700 tasklist.exe Token: SeDebugPrivilege 4748 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeIncreaseQuotaPrivilege 4704 wmic.exe Token: SeSecurityPrivilege 4704 wmic.exe Token: SeTakeOwnershipPrivilege 4704 wmic.exe Token: SeLoadDriverPrivilege 4704 wmic.exe Token: SeSystemProfilePrivilege 4704 wmic.exe Token: SeSystemtimePrivilege 4704 wmic.exe Token: SeProfSingleProcessPrivilege 4704 wmic.exe Token: SeIncBasePriorityPrivilege 4704 wmic.exe Token: SeCreatePagefilePrivilege 4704 wmic.exe Token: SeBackupPrivilege 4704 wmic.exe Token: SeRestorePrivilege 4704 wmic.exe Token: SeShutdownPrivilege 4704 wmic.exe Token: SeDebugPrivilege 4704 wmic.exe Token: SeSystemEnvironmentPrivilege 4704 wmic.exe Token: SeRemoteShutdownPrivilege 4704 wmic.exe Token: SeUndockPrivilege 4704 wmic.exe Token: SeManageVolumePrivilege 4704 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 5388 taskmgr.exe 6092 taskmgr.exe 6092 taskmgr.exe 6092 taskmgr.exe 6092 taskmgr.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 6076 MiniSearchHost.exe 1400 SearchHost.exe 1400 SearchHost.exe 1400 SearchHost.exe 1400 SearchHost.exe 3940 OpenWith.exe 2184 mmc.exe 2184 mmc.exe 4628 msconfig.exe 4628 msconfig.exe 1172 mstsc.exe 1172 mstsc.exe 740 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4548 wrote to memory of 4032 4548 msedge.exe 79 PID 4548 wrote to memory of 4032 4548 msedge.exe 79 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2712 4548 msedge.exe 80 PID 4548 wrote to memory of 2088 4548 msedge.exe 81 PID 4548 wrote to memory of 2088 4548 msedge.exe 81 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 PID 4548 wrote to memory of 2152 4548 msedge.exe 82 -
System policy modification 1 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 244 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook openwith.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2326217578-3761199233-1872589011-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2852
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5920
-
-
C:\Windows\system32\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:6048 -
C:\Program Files\Windows Media Player\wmprph.exe"C:\Program Files\Windows Media Player\wmprph.exe"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files\Windows Media Player\wmpshare.exe"C:\Program Files\Windows Media Player\wmpshare.exe"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:3432 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵PID:3812
-
-
-
C:\Program Files\Windows Media Player\setup_wm.exe"C:\Program Files\Windows Media Player\setup_wm.exe"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\system32\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:4004 -
C:\Program Files\Windows Media Player\wmpshare.exe"C:\Program Files\Windows Media Player\wmpshare.exe"3⤵
- Suspicious behavior: AddClipboardFormatListener
PID:2860 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵PID:408
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://goo.su/OJUna1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa561d3cb8,0x7ffa561d3cc8,0x7ffa561d3cd82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4528 /prefetch:82⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:5868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16514217447175541579,15549084383669461673,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6692 /prefetch:12⤵PID:5276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2312
-
C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe"C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeC:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Program Files (x86)\Microsoft\Temp\EUFBD0.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUFBD0.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1440
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2280 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1212
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3024
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4572
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuMTUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MDgyODQ4NjEtRTlENC00Njg1LThEMjAtM0JCNEM1Q0VBOUFEfSIgdXNlcmlkPSJ7RDUyMjRFRjEtQ0Y4OS00OUU3LUFERTYtM0EzOEVEMTFBMUFGfSIgaW5zdGFsbHNvdXJjZT0idGFnZ2VkbWkiIHJlcXVlc3RpZD0iezI4NjEyODE0LUMxMzgtNEMyOC1CRkUxLTdBRTBFREMxRTZDQn0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgbG9naWNhbF9jcHVzPSI4IiBwaHlzbWVtb3J5PSI4IiBkaXNrX3R5cGU9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTQzLjU3IiBuZXh0dmVyc2lvbj0iMS4zLjE5NS4xNSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTU5NzYxNTk5NCIgaW5zdGFsbF90aW1lX21zPSI1NjIiLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4808
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{08284861-E9D4-4685-8D20-3BB4C5CEA9AD}"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4000
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=SetupV4.4.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=2436.5544.116818011176193621932⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:5560 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x17c,0x180,0x184,0x158,0x190,0x7ffa419b0148,0x7ffa419b0154,0x7ffa419b01603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1712,i,6709794271716485343,12290551810724161230,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1696 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2016,i,6709794271716485343,12290551810724161230,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2024 /prefetch:113⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3832
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2216,i,6709794271716485343,12290551810724161230,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:133⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5628
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=2020,i,6709794271716485343,12290551810724161230,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3056 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 4844⤵
- Program crash
PID:2948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 3804⤵
- Program crash
PID:5196
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM2⤵
- Scheduled Task/Job: Scheduled Task
PID:5484
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2432 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7aFZmRGpNZEZHNkZnS3MwTno2ZW1yWUNTZzZUUXZEUG9tb2xSYXlRWEJLND0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMDYiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjIiIGluc3RhbGxkYXRldGltZT0iMTcyMjM2MjY2OCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzY2ODM1Mzk4ODM0MDM3MCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxMTQzMjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU2MDMyNDExNzAiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4896
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3CE94DC-D61E-475B-802F-AA2FA3B5B891}\MicrosoftEdge_X64_126.0.2592.113.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3CE94DC-D61E-475B-802F-AA2FA3B5B891}\MicrosoftEdge_X64_126.0.2592.113.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:5728 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3CE94DC-D61E-475B-802F-AA2FA3B5B891}\EDGEMITMP_616C9.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3CE94DC-D61E-475B-802F-AA2FA3B5B891}\EDGEMITMP_616C9.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3CE94DC-D61E-475B-802F-AA2FA3B5B891}\MicrosoftEdge_X64_126.0.2592.113.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:5780 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3CE94DC-D61E-475B-802F-AA2FA3B5B891}\EDGEMITMP_616C9.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3CE94DC-D61E-475B-802F-AA2FA3B5B891}\EDGEMITMP_616C9.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3CE94DC-D61E-475B-802F-AA2FA3B5B891}\EDGEMITMP_616C9.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.113 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff7dafeaa40,0x7ff7dafeaa4c,0x7ff7dafeaa584⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5804
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEyNi4wLjI1OTIuMTEzIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NjA5MTc4NDU4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTk2NTI3MjI4MCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjYiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU5ODg3MDk4NTkiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIxOTY3NTciIHN5c3RlbV91cHRpbWVfdGlja3M9IjY0MjkwMjQ4MTIiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSIyODEiIGRvd25sb2FkX3RpbWVfbXM9IjM1NTc4IiBkb3dubG9hZGVkPSIxNzMxNDg2MTYiIHRvdGFsPSIxNzMxNDg2MTYiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjQ0MDE2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5504
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:128
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:240
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:4228
-
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\Desktop\UseResolve.ttc1⤵PID:5444
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2688 -ip 26881⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2688 -ip 26881⤵PID:2284
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:5388
-
C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe"C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
PID:6064 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=SetupV4.4.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=6064.2608.29160455602877688852⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:2648 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x170,0x174,0x178,0x14c,0x1ac,0x7ffa419b0148,0x7ffa419b0154,0x7ffa419b01603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1712,i,3325092103915091376,13630900063321496145,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1708 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5848
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1780,i,3325092103915091376,13630900063321496145,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1772 /prefetch:113⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5124
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1632,i,3325092103915091376,13630900063321496145,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2132 /prefetch:133⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3544
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3356,i,3325092103915091376,13630900063321496145,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2848
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
PID:380
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:5032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
PID:6140 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe3⤵
- Command and Scripting Interpreter: PowerShell
PID:3736
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵PID:5408
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1892 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:5236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 3524⤵
- Program crash
PID:5740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 4564⤵
- Program crash
PID:5084
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5236 -ip 52361⤵PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5236 -ip 52361⤵PID:4932
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4780
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:6092
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:852 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\MicrosoftEdge_X64_127.0.2651.74.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\MicrosoftEdge_X64_127.0.2651.74.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
PID:3520 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\MicrosoftEdge_X64_127.0.2651.74.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
PID:3016 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.73 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.74 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff77fbdb7d0,0x7ff77fbdb7dc,0x7ff77fbdb7e84⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5552
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4544 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.73 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F4F54302-E38B-474E-949D-F956422E2FAB}\EDGEMITMP_6E11C.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.74 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff77fbdb7d0,0x7ff77fbdb7dc,0x7ff77fbdb7e85⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5316
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4960 -
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.73 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.74\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.74 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff64d39b7d0,0x7ff64d39b7dc,0x7ff64d39b7e85⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3508
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuMTUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjYzQzg2QkUtNTc0MS00MkRBLUEwMjgtQTk0QjY3N0E1QzY5fSIgdXNlcmlkPSJ7RDUyMjRFRjEtQ0Y4OS00OUU3LUFERTYtM0EzOEVEMTFBMUFGfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntCNEUxNzQwMi01RTkzLTRGNzUtQjQ1QS0zNzJGMzYyQTI1QkN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtoVmZEak1kRkc2RmdLczBOejZlbXJZQ1NnNlRRdkRQb21vbFJheVFYQks0PSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjE1IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9IklzT25JbnRlcnZhbENvbW1hbmRzQWxsb3dlZD0lNUIlMjItdGFyZ2V0X2RldiUyMiU1RCIgaW5zdGFsbGFnZT0iMCIgY29ob3J0PSJycmZAMC4zNiI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIi8-PC9hcHA-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-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3408
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1400
-
C:\Windows\System32\6i_kzm.exe"C:\Windows\System32\6i_kzm.exe"1⤵PID:6116
-
C:\Windows\System32\5rl3ex473rqfo.exe"C:\Windows\System32\5rl3ex473rqfo.exe"1⤵PID:5644
-
C:\Windows\System32\alg.exe"C:\Windows\System32\alg.exe"1⤵PID:4928
-
C:\Windows\System32\AgentService.exe"C:\Windows\System32\AgentService.exe"1⤵PID:5248
-
C:\Windows\System32\AgentService.exe"C:\Windows\System32\AgentService.exe"1⤵PID:4836
-
C:\Windows\System32\agentactivationruntimestarter.exe"C:\Windows\System32\agentactivationruntimestarter.exe"1⤵PID:652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc1⤵
- Checks SCSI registry key(s)
PID:2668
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004DC1⤵PID:1988
-
C:\Windows\System32\AppHostRegistrationVerifier.exe"C:\Windows\System32\AppHostRegistrationVerifier.exe"1⤵PID:3952
-
C:\Windows\System32\AppHostRegistrationVerifier.exe"C:\Windows\System32\AppHostRegistrationVerifier.exe"1⤵PID:3224
-
C:\Windows\System32\ApproveChildRequest.exe"C:\Windows\System32\ApproveChildRequest.exe"1⤵PID:2032
-
C:\Windows\System32\ApproveChildRequest.exe"C:\Windows\System32\ApproveChildRequest.exe"1⤵PID:3580
-
C:\Windows\System32\ApproveChildRequest.exe"C:\Windows\System32\ApproveChildRequest.exe"1⤵PID:2792
-
C:\Windows\System32\ApproveChildRequest.exe"C:\Windows\System32\ApproveChildRequest.exe"1⤵PID:416
-
C:\Windows\System32\ApproveChildRequest.exe"C:\Windows\System32\ApproveChildRequest.exe"1⤵PID:5316
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3940
-
C:\Windows\System32\AppVDllSurrogate.exe"C:\Windows\System32\AppVDllSurrogate.exe"1⤵PID:4216
-
C:\Windows\System32\AppVClient.exe"C:\Windows\System32\AppVClient.exe"1⤵PID:4820
-
C:\Windows\System32\AppVClient.exe"C:\Windows\System32\AppVClient.exe"1⤵PID:5924
-
C:\Windows\System32\AppVClient.exe"C:\Windows\System32\AppVClient.exe"1⤵PID:3876
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe"1⤵
- Views/modifies file attributes
PID:244
-
C:\Windows\System32\AxInstUI.exe"C:\Windows\System32\AxInstUI.exe"1⤵PID:5952
-
C:\Windows\System32\backgroundTaskHost.exe"C:\Windows\System32\backgroundTaskHost.exe"1⤵PID:4160
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\azman.msc"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2184
-
C:\Windows\System32\mfpmp.exe"C:\Windows\System32\mfpmp.exe"1⤵PID:2284
-
C:\Windows\System32\MicrosoftEdgeDevTools.exe"C:\Windows\System32\MicrosoftEdgeDevTools.exe"1⤵PID:5228
-
C:\Windows\System32\MicrosoftEdgeCP.exe"C:\Windows\System32\MicrosoftEdgeCP.exe"1⤵PID:4444
-
C:\Windows\System32\MicrosoftEdgeCP.exe"C:\Windows\System32\MicrosoftEdgeCP.exe"1⤵PID:4188
-
C:\Windows\System32\MicrosoftEdgeCP.exe"C:\Windows\System32\MicrosoftEdgeCP.exe"1⤵PID:4952
-
C:\Windows\System32\MicrosoftEdgeCP.exe"C:\Windows\System32\MicrosoftEdgeCP.exe"1⤵PID:2744
-
C:\Windows\System32\more.com"C:\Windows\System32\more.com"1⤵PID:1440
-
C:\Windows\System32\mode.com"C:\Windows\System32\mode.com"1⤵PID:5848
-
C:\Windows\System32\mode.com"C:\Windows\System32\mode.com"1⤵PID:2688
-
C:\Windows\System32\mpnotify.exe"C:\Windows\System32\mpnotify.exe"1⤵PID:3632
-
C:\Windows\System32\MSchedExe.exe"C:\Windows\System32\MSchedExe.exe"1⤵PID:6112
-
C:\Windows\System32\msconfig.exe"C:\Windows\System32\msconfig.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4628
-
C:\Windows\System32\msdtc.exe"C:\Windows\System32\msdtc.exe"1⤵PID:3936
-
C:\Windows\System32\msdtc.exe"C:\Windows\System32\msdtc.exe"1⤵PID:4620
-
C:\Windows\System32\msdt.exe"C:\Windows\System32\msdt.exe"1⤵PID:2100
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe"1⤵PID:428
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe"1⤵PID:5192
-
C:\Windows\System32\msinfo32.exe"C:\Windows\System32\msinfo32.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:5248
-
C:\Windows\System32\msra.exe"C:\Windows\System32\msra.exe"1⤵PID:4084
-
C:\Windows\System32\mstsc.exe"C:\Windows\System32\mstsc.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:1172
-
C:\Windows\System32\MsSpellCheckingHost.exe"C:\Windows\System32\MsSpellCheckingHost.exe"1⤵PID:4768
-
C:\Windows\System32\MusNotificationUx.exe"C:\Windows\System32\MusNotificationUx.exe"1⤵
- Checks processor information in registry
PID:2168
-
C:\Windows\System32\MusNotification.exe"C:\Windows\System32\MusNotification.exe"1⤵
- Checks processor information in registry
PID:1828
-
C:\Windows\System32\MultiDigiMon.exe"C:\Windows\System32\MultiDigiMon.exe"1⤵PID:5340
-
C:\Windows\System32\MuiUnattend.exe"C:\Windows\System32\MuiUnattend.exe"1⤵
- Drops file in Windows directory
PID:5884
-
C:\Windows\System32\MuiUnattend.exe"C:\Windows\System32\MuiUnattend.exe"1⤵
- Drops file in Windows directory
PID:5124
-
C:\Windows\System32\MultiDigiMon.exe"C:\Windows\System32\MultiDigiMon.exe"1⤵PID:5508
-
C:\Windows\System32\Mystify.scr"C:\Windows\System32\Mystify.scr" /S1⤵PID:5504
-
C:\Windows\System32\Mystify.scr"C:\Windows\System32\Mystify.scr" /S1⤵PID:2396
-
C:\Windows\System32\ndadmin.exe"C:\Windows\System32\ndadmin.exe"1⤵PID:1916
-
C:\Windows\System32\NDKPing.exe"C:\Windows\System32\NDKPing.exe"1⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5952
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe"1⤵PID:2160
-
C:\Windows\system32\net1.exeC:\Windows\system32\net12⤵PID:5380
-
-
C:\Windows\System32\net1.exe"C:\Windows\System32\net1.exe"1⤵PID:5484
-
C:\Windows\System32\netbtugc.exe"C:\Windows\System32\netbtugc.exe"1⤵
- Drops file in Windows directory
PID:6004
-
C:\Windows\System32\NetHost.exe"C:\Windows\System32\NetHost.exe"1⤵PID:720
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe"1⤵
- Event Triggered Execution: Netsh Helper DLL
PID:428
-
C:\Windows\System32\newdev.exe"C:\Windows\System32\newdev.exe"1⤵PID:5236
-
C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe"C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
PID:3840 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=SetupV4.4.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=3840.2060.170723219462971556472⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:4932 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x164,0x168,0x16c,0x140,0x178,0x7ffa419b0148,0x7ffa419b0154,0x7ffa419b01603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3012
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1768,i,3513091693635300677,230029553446733686,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1764 /prefetch:23⤵
- Executes dropped EXE
PID:5836
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1820,i,3513091693635300677,230029553446733686,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1804 /prefetch:113⤵
- Executes dropped EXE
PID:5748
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1544,i,3513091693635300677,230029553446733686,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2172 /prefetch:133⤵
- Executes dropped EXE
PID:5676
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView" --webview-exe-name=SetupV4.4.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3552,i,3513091693635300677,230029553446733686,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3716 /prefetch:13⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
PID:4200
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:4572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
PID:4276 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Desktop\LoaderV8\SetupV4.4\SetupV4.4.exe3⤵
- Command and Scripting Interpreter: PowerShell
PID:1064
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵PID:1884
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:740
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
3Process Discovery
1Query Registry
8System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD54dda37fd043902a07a4d46dd8b5bc4aa
SHA1aeecafae4cca3b4a1e592d93b045de19d09a328e
SHA256806500bb5e7a3e4a2a84d4d08e97d1872dc7ee8f8c255e3c6c2d39437c9779ac
SHA512903280cf47888fcd491b5aa70ffc4de60458fe8fce6e164a02118308cbd36ef0d2e6ecd418d19242d605f9c516598fe723908e28baf702c4c65a284fabc60111
-
Filesize
6.6MB
MD5afb23e25f9dc571a1601a3942e136bef
SHA1ae270fd05a86e0bdc2af5b48708b4dbb9371bfd4
SHA25629f302b439f266a8d6c747434c232f6b98aa6e407fba5cef1f41724a0878e7e8
SHA512571a0a350374f54310e4b39bbde49ae2089ff2c942df8c7adcbcb674d27a7422c156b4a8f474ac8ff257a593e060776b55cd3dfa8fb637bfebaaa7941862dacb
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
182KB
MD5b69894fc1c3f26c77b1826ef8b5a9fc5
SHA1cff7b4299253beda53fb015408dd840db59901a1
SHA256b91bad4c618eb6049b19364f62827470095e30519d07f4e0f2ccc387ddd5f1bf
SHA5128361e97d84082f8e888262d0657bac47c152bd72f972628f446f58cbeacf37c05f484dce3fb0d38c4f0da2a2dcbb0813639d201d127ec7f072b942d43b216755
-
Filesize
201KB
MD5136e8226d68856da40a4f60e70581b72
SHA16c1a09e12e3e07740feef7b209f673b06542ab62
SHA256b4b8a2f87ee9c5f731189fe9f622cb9cd18fa3d55b0e8e0ae3c3a44a0833709f
SHA5129a0215830e3f3a97e8b2cdcf1b98053ce266f0c6cb537942aec1f40e22627b60cb5bb499faece768481c41f7d851fcd5e10baa9534df25c419664407c6e5a399
-
Filesize
215KB
MD5205590d4fb4b1914d2853ab7a9839ccf
SHA1d9bbf8941df5993f72ffcf46beefcfcd88694ebd
SHA2565f82471d58b6e700248d9602ce4a0a5cda4d2e2863ef1eb9fee4effcc07f3767
SHA512bce1447d5d3210c22d52dec3b846db091b65ed03fd9d7cd11c6c4dbd2aa5a943d881360bc033c29abd61011581ff9354b35cbe421719d92568ed99997bfbbae8
-
Filesize
261KB
MD5b07ab49ee8453853021c7dac2b2131db
SHA1e1d87d6a6e7503d0d2b288ea5f034fe2f346196a
SHA256f8535d5d73ebebed15adc6ae2ced6bb4889aa23e6ffe55faeabd961bf77b05e4
SHA5125eaae533fbe71430ae2a717f7668fd0a26ec37624e198a32f09bfdbee7e3b6e93d64e4fbb78cbdb05c4fe390a864490ea997d11849ecd371f5153bc8bfafccc3
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD55d89123f9b96098d8fad74108bdd5f7e
SHA16309551b9656527563d2b2f3c335fd6805da0501
SHA25603c3c918886e58f096aa8e919b1e9f8dcd5a9f2a4765971049bf8da305476f44
SHA5129d8190e5374cd1b4adbbfb87c27fa40d4de529d7c0a20654e0ce189a4cb9a53d3708c4ce657a7a5469b015df7efbbff495fc844579d9cd363b329b7e007e85c8
-
Filesize
29KB
MD54f860d5995ab77e6efa8f589a758c6d2
SHA107536839ccfd3c654ec5dc2161020f729973196d
SHA2569841d787142dd54fea6b033bd897f05f3e617b48b051de0ee3cf5865b3393150
SHA5120b9a661b76360f1fb2eb3ee25c6bf2cbab7ec74e2363e0af321dc4d0afb3cad301dddd16ea367d588451a40a2c2ed41f21d7afae48307e1e4a4ec5b24165b378
-
Filesize
24KB
MD5f624de37750fd191eb29d4de36818f8b
SHA1b647dae9b9a3c673980afa651d73ce0a4985aae6
SHA256e284453cd512e446fcbf9440013f8cb2348ffd6b1acec5366f2511cdf88b1794
SHA512d1d65e29ed59e34d4ff66df11a2368f1a724730e32eb245022d4f3d1fadf16d445ba8532460afb0e6e91f8be60a7240d13577403193042d1e912a67e4bf23b1a
-
Filesize
26KB
MD55de3f4dabb5f033f24e29033142e7349
SHA15c446985de443501b545d75f6886a143c748b033
SHA2562533d443b68c5288468b0b20cc3a70dc05f0498369d5321368a97dd5bf3268c8
SHA512c96296e6f67edeff2be5dc03014a8eb65fc287fb899357d4608c36c07b4610827aa18cbec6ccd47b66230a12341af488aca8bd02632fa768f84ca7b1d9c9d065
-
Filesize
29KB
MD51fb14c6c4fee7bfabe41badb7c5acff8
SHA1953d94cd73951943db14c08cce37b2d3ac821b02
SHA256cd32339fd7e4a5959e93eb5bfd6e009e4137e15c5e6c2e861d7891487216da49
SHA512a93b081935fbe48fafa8071a9cd593ae7b19205c70eaf48c724397019a04161460c66d6d8c6ffd872f4d52a4a7aa25ba1cba04181b9ebaca04b76d111ea588d2
-
Filesize
29KB
MD5d3345579310f3bd080b406de47b2305f
SHA116aefb27ea6d81c684f041aa50ebb49fdd403d83
SHA256b4ea3c63fa0104093a2b2034f950428e66d2cf3d55f0fc5bd688483392d60d69
SHA51265e4aa8587bc579b5109d91e02745f6de96a23b6ac2962cdeb6d9d536b51abab12b2bbaeca72572c3ae1971dac5bd24430eb2ae5ccf44a7068427594e4afdd7a
-
Filesize
29KB
MD5ecf3405e9e712d685ef1e8a5377296ea
SHA19872cdf450adf4257d77282a39b75822ce1c8375
SHA256e400415638a7b7dcc28b14a257a28e93e423c396e89a02cba51623fdfbdc6b0b
SHA51237e5f1b3bdd97a4370718dc2a46d78ab5b66865d3cdb66a20a7dc20a9d423ccde954c08f97e574fbab24e8dfa905351cbfb94bd3e6692a9b6526097ea3dc911d
-
Filesize
29KB
MD5051c429fa2beec9c2842c403a86c0e7b
SHA10a06a45200a1f5c81c48fbd2d03549fc9fac3a58
SHA2561a8465922bbb05a97a24f6c2200fcc7afd8bd0ace245c2eda9d9d335d4fb9353
SHA512bb59b41804328f27ba8861af32824266ca69ddcfdaaa11551b1edd4e129dbba630da8070abedb28e180045f8d0ddc1209cd901919f6b9aa421c457188af795c6
-
Filesize
29KB
MD582711e45d2b0764997abc1e0678a73bb
SHA147908e8885c86477a6f52eea5fddb005ec5b3fa3
SHA2562bb7455999b8f53a2a0834588ca4da4703f4da362a127d01cc6bd60ca0303799
SHA5124b517796edc954ab7f5a26a5d6605925dc7e84b611bcf59352b3b95f719cedc72c77a465fb1e7bc2d2f422d596c97968dac5b57292c82967d5cfaff980128fc2
-
Filesize
28KB
MD5a0a1f791984f1de2f03a36171232d18d
SHA171f69d8fe47640ba9705725d7d627a05519c8016
SHA256d2c7da8f4745b81874a9666c7d10a779a9956b4de0ebdaa1647bf78d4e17d85a
SHA512a4267911846cd55eb91227b0117ccbfdf8ef6c4ed0b8935b08e5d41a91aeabd9259988c71da8606cfb2876c4d69df6ca5a246687440283f1625105624305eb33
-
Filesize
30KB
MD5897712b508931dab76d39b209611740c
SHA19d80e07c2dc744e2efce3b67aa9876949fb9edfe
SHA256ee64fdefdb3381ce61fc445190cc44b015e7b65a3a16d28f3477f68de6079f1b
SHA5123329e37318dd9b11f282301e453af106168d3d10beff1ed62ffdcda60c6b4edb6b9c69ac6b9bb8abce3c9a9686a0152404524012dbff025e571de2cfcb3b5d56
-
Filesize
30KB
MD5e90155442b28008992a7d899ca730222
SHA11d448e9709de0d301ded6d75caaeba4348a4793d
SHA2566ae98b5e2eda22a0236434b7e952d732e3cd5d9cae2e51cd70222f1fd5278563
SHA512a91d8357ca976db2eb5a081077304a50edc1b55b2775c00cfde05e03831f98bd04e43f0dba5b3efd5a6370afcb10b23bbf307412467502e9ef57e0beae636013
-
Filesize
28KB
MD51de961b662a374c3af918c18225f4364
SHA1e8f1c438e57b322f43b4b851698bf38c129eb6ae
SHA256bb1365c5770dacbb918af27b47b02f269504f4d2396cf3f82bf5ecb2551c5021
SHA512c6bf62b684039f62744f1aab07f4751948e0c175f7fb7fe126f20903ce23fcdd2e284f1b794922621dae7eaa15c6dae0177ad102289a18f967721486f21073a1
-
Filesize
28KB
MD529f027d2d5fd486bdc20386ace925603
SHA166b8605f23871b4a8302bef0aaccb36ee1e72755
SHA25603c8566f749e8fa349d97101849bc3b2cc0b7561b565a2b0928bf8fe901da813
SHA5123348bdf10b2d964b34b791a774e28c97d3caf28d7f90e36b948cc2cb6c21e84cda933b7ddbd51c8fc604a450361cb834322c15ddbe0f4851154d05e5a2a2ea42
-
Filesize
28KB
MD5b0ae9aa0d5c17ee7abfc57d21cdcbae6
SHA101019eb6ba9c123be528136e12192b0bb33df407
SHA256d10938919e3d28d71e8e3ba2d8e02e0f9dc2faf148cdedc21c166fd994c603e2
SHA5124cba25c8159df865231b08fe650eedfb92d54c3037d28b2b9af010c8a59fa23669041a6c393622fe69b0194c2532f71f02b740f7e26e0bbf7ef34a421d6747b8
-
Filesize
30KB
MD5ad5b530eabff0540078c5d17f27b9610
SHA17e53dbbf64e70e561d37669e69f50eb0da8e37d1
SHA25649f512316a51e51027b4e70de4ffe8c8ecb188e126439a90a5d12d52a0393966
SHA512e1cc853d96589220676d39d91d4108633ce56304640f770e7d22b97a9b3be9452d5fb94e4e7fcd1400b62f0c398da8255c53a31853194a9e7b7784982b5ff40f
-
Filesize
30KB
MD5a7e64339a5314e3576c0d170171fa52a
SHA16c12aab6c97c30aff3245b78f7a3afeea604215e
SHA2564e9ccecb8e4383395f2134347fbad00521345ec9c857d8fa102d5257c7bea9bf
SHA512a4ca3fb60a7f4bda50847544dd1289d750f0d4b3565929290a8392b92822ef1856cec15a1f63f2c6fe1ef2e7cc0936a35bdb38ee5d904eb08cd32f05addc6ee4
-
Filesize
27KB
MD574d4cf3b8efb6cc3d0acc3eac38bd5b7
SHA19337803aadad9042c895b6f418b4c733b81221e0
SHA256b83c8981d8835e4c78250bf265faa6d64693204b77764c8e349abc4365ae9871
SHA512e6112ef60d56101aa16327042162d6ef43519bc56668ca8eaa7fd3e1aaadc75c7df75c1e41583a292ff1a9bdc7d9ad9f5c0d97fa84964532dca2d5f3df604c23
-
Filesize
27KB
MD519dc1f6d1f309eb7abf1e0c8257f41f8
SHA1e2d3e86fe22c6af6b8ee5b359315dfa6ac4d52ec
SHA256046f6c532fcabd969c6e63bb7ee0d7a83d806fa659006508e1c3a9485190d6ef
SHA512478d6a84452cfadc48547930e336ad459eec188dd3d9e4c778cded4ec3d34e00b2b8c0538366aa644ee67f878b29c5c73444c1406c66e8394761bb0979c6483c
-
Filesize
29KB
MD58f7f515d78d2df371993fd70f863ab8d
SHA1dfae1b47e80f91abf2d9c2aac009c0a1767bc59d
SHA256ba57fbb9d3a32b84d6a76054b9ad180b6510e53206b9804bb9ea18ff73c2ae3e
SHA512308a62af00a4410551eac967bb9f2cea7adf7c13b471dd28b276bda40b1e4c0b4ebb60aec29b6165069d40180bc45b4f5da5baddc374ce7bc5a5bb223afb4e96
-
Filesize
29KB
MD56af05d448c842027f876e93f8ac58b65
SHA1f34c988e3875a1d1b267b082476fcfb8d7505a73
SHA25636876b14a214cf98dda5100a7e7134d7ebb78e895535d6bd7562099574607867
SHA512412031db59de0367a102a026f73072244b33d726adc5bb9fd079db3dd37b5d6a24d7420a9811576d0a356933b5ba15cc9e2a92046d2d6e6d6fef37e9d840aec6
-
Filesize
28KB
MD5ae9bdf6416c3630c4b0b5b119308a135
SHA1d7218c677b098d2a93cc91ead39c83d3a2c653b6
SHA25662da90c9417a70632aa190fecc17c31ecf433c1f84f82b08d7d7290669cabf32
SHA5124333ac6cd3737f25e6e1d429b195da781ced4340b89808cbd5d5d2aae2e79bcc700419d613123d632252e31ac44d95b7718f23da5b82ab5054407e80106a64a7
-
Filesize
28KB
MD5fe73dbc305da6223d1e94e1cf548c000
SHA1b16f2c40d68cd9718eaaa9b6db9c8e5c4b6acb9e
SHA2561ef64088a613a4e10b4cf4206f95f5414ee27872798747234a6574b7e5c70a7d
SHA512d9900720d89defffa52198dbe63515995095c94aa0cbbe4f32a1c09d26809cec480e92926d2240702604b8c13fcdc0032cc46910ade8e4c1d2fc9a4bd1b63858
-
Filesize
28KB
MD5367ea715e942c81dd3cb734274969a0b
SHA1f92f1ec2a5be9b775e67c4252a07c37ed0ca508b
SHA256082da1c09782c026c9cd73456dc12539a226f0bf5d113e59bc93b29c1e98b37c
SHA512c94e787ba3bdb56d1827a0477461cbba6b7cc68986722275e0d04ea7dc70db83b5d03887eec810bf9b67f70b18bd3c7b7d28f0e554938b81d3501bc11f97830a
-
Filesize
28KB
MD55a30bc4216af48a493eeb0f3a9f02607
SHA12fdf65a4002d91818d56a23fb8bfd08ab715002f
SHA2565131c23915ad6b5b469bcbff31d0ae31ef34ded28ca0ffff9f1eb998bba98aa1
SHA51234b3a4865f31ebdb8665780011b384ada768a0f71bff77f91706b140eb8cc07fff8787f710cdb1ee14a449cae8f22ee5fddadcc501cf1c921eea078e97dc2f89
-
Filesize
29KB
MD584c4736cf301b93998028ed7678caec1
SHA13b6f1f6b9eb3dd7d9a13c11dfd3ac56c93f1b10f
SHA2563c8dcb7e982dac3159298009a86909b1e1000ccf6f4d333341f16d4d6fbd84ad
SHA5125a1b77ef9450c32802e94e473a5b4e43e892c923ef368ee9bbbbb5b0090429320263cc79a4da0b281930c1a60861519211abd0bd67a9d9ee370bdda2230d2e81
-
Filesize
30KB
MD58993c0784111fc7cd6a90a82303e5f44
SHA18d1ff2fed98ebc608604c555ceb46ca628afb285
SHA2563d0ba88267018f592141ea86592757cf1ecaac1a3a18f99203e0fc5c5eacbd62
SHA512124d16d848dc8ea0a93b292b10ce1fbad23b56b13771d904cf14c19d54478614d214441b05f6cd9e1999b8310fdd26d1c6ecae784be00aecee7e80c96ba4ac88
-
Filesize
30KB
MD5a640aa4ff33662e06a474765df0b2a8d
SHA1c6265225532e389e48c6057bd717b69de2125b61
SHA256078b1943bf7f7955b90abc40f691b27e04376f8c43dd3abc4791614286cd4f23
SHA51259791eef021f94efd9c18737d6c46fbc45add582eec92d5b997cfd66993abc7da872720a037766c3c70862f0654ccf30d122d4a5a6b305151bf8bf1c053a466d
-
Filesize
29KB
MD55bcc643a969559317d09a9c87f53d04e
SHA13602d51cde97de16d8c018225a39d505c803e0fc
SHA256b48f57e90ea9db6d6a296c01e87f8db71e47ab05ab6c2a664cfa9f52cf1d2c18
SHA5124c65772f77e61e64d572df5b1f62733aceb02a5c967c296b303ff17c5d49831e5b7fc3d662724ae3ae1e88cd0fdcb704e838af5d4ae20f2d82b9577f57159159
-
Filesize
30KB
MD5aea23f526ef0c5bb3d2f8fdf192a49ea
SHA14d7695e33ed43c3efb95f304e29675ea885b2939
SHA2563cfe866c151a7e8a208af725c0c6f2a47fc3ada35f9ad3509b16b8d5229318b9
SHA512412e4742ebd46ce38010b4f6a46d8d524025f929ab4658040e271d768e79115d90903403b2f1e51ab910bbdf9677b49439eb3c8afc5959477af198efb0c7c3c9
-
Filesize
29KB
MD5295cd30c00f43d9131621baf4859578f
SHA1cab79a6263b7b0a799461f3e6df41f815029cded
SHA256b851c5a60cb6d1e8dd9aa161106cba99ccea047d0b39d007beaa7b9ef4a83397
SHA5125f5c1e62e6c0e11a63fad68928765e3f504f33cdbb1d9a05cd53cbc3ed145bf3528960a10e3d57e8c83b07c030c72257f403b9a57d12975d3ef8bc255418ad6c
-
Filesize
28KB
MD5c43c1ab37cd93e54068443bc330fb3d2
SHA1ab51a2cbc51b3c17cf184c6d99ac480c02eb63af
SHA2560c26a367355e766402c31fbab102dd1c35300d4a1301417c75be5fc4b3d54680
SHA512ff0193189fb846eb3c4188bb599dad8e6f415ec9612da567d95c9c513defb148b6013208371798d174569b46f443a744e4e8b83aaf139d68c31f7de0f94e63f9
-
Filesize
29KB
MD5a5544f517f7c1bfd1ec6a2e355d5a84c
SHA134a2a4a576300ad55b6757171bcba0fab005daa5
SHA2568274c64bb778b55d912929625cd849adfe733b2dd674d94895d53af8dfaabeca
SHA5129069bcfb736e13499250844dddef40e2cf64937e33ee1f81fc4968f024f7d7b89c6a778866bf1bff98d770686569e4752a473c0adfad4d4099cceda84da3cac3
-
Filesize
29KB
MD5c09876a180731c172fa2532f8be90a3d
SHA14359c7840ddb23142a40aff85129b9920360e954
SHA25650fd548ea12e2b72fc563bc082b870a89a523e8b3a4a0e9b65fe673384da2b58
SHA51291cee1b10fc12a01a2a285e67dba583d6f1bee0716cc89103fee0c7d0f52fadc0f9ac5b13e833834e7279963726950d3897847e7acac61857257fc031692033e
-
Filesize
29KB
MD5ee19156c12d2d7cce9b12e515f9ac6c5
SHA119ad46e40b3c1cb6195231bfcf45bb68ee1b43bf
SHA256c290883b4b99758792284755efa52c12eb09039f0f8027d8ba3b1d4bb2f3846f
SHA512631364472a450519ad8959971d6c319610570ca37b4486ea12d6af5b46aaecbf336aadddd1f3fefba841534ff82adf905b1e1a008638ed784bf08870a3b86ee1
-
Filesize
28KB
MD5eacd4638369bf96ccc7c23af37e15b5d
SHA115c4878b78c06095981abcc589c4a6f265ef96a3
SHA256a53c0fd74995090dbf48bbba4a00560e3cc344ce8120b8b2bfa1f9b953b536ef
SHA51219cc8d25bd8fd84481f77d301f79636208df5807647ddc6cb6beff3882d94672db49daa4ddfff0c334b584742f9d2fea3af73977032d7dfccd0cfd1314af4ae6
-
Filesize
28KB
MD519d44de8f930e07f41f9343478ed5c1d
SHA183ee0c5a86997dd491bd8312d221dde2b2e7d44a
SHA25669d3a21b7723e4df8b7b97e39493081e41231e2d3a3f5a4de462db41339987ec
SHA5124edb82aedfeca743a03815a889eca766fec8083afd0defa098593297a52edaf1780dbd5ad1d3325c614d815d34d8c57ec2283a0db215f94f42819f1890089c4a
-
Filesize
30KB
MD526cbb965c6976f59ac385ef9408bf81a
SHA116bb0530338e600fdfd13a7b03523a715e633bcb
SHA256bed996b25f77c7d4328d96147ed388f1b457abfc0510eb8956be4339d103821a
SHA5121efb1bdf0276de17f8516cde4d435e0be8fd066f52fb5d4c9e2fe2e17a135296ab6b34f523284941beae438e97d7e65de26f0541b7c437bceff229b60da4bb0d
-
Filesize
25KB
MD598f79d77ab05304bba8d60e50914418f
SHA1957590adc0f8a7274e765e2a804c1de7c76e3040
SHA2563764941b873ed59d5bc1097f6b9382ba59c06d443a96ff71ba6b693f161da522
SHA5129ca6af5c14193dce7b50251f1b9205870435e60b5495ab1a9f0d42ca14b98b78fef51bf3cd4165394ca5ba28d0e98bea7642ec67039c0f146383136145c7de59
-
Filesize
24KB
MD5b89ba9ecc6d4c77abff61b1c75fff16c
SHA1f381408f26be2c77c7b59681ad6280a701ccb472
SHA256bbd2c970f747a6ee8e4735939225f607ae630ddc6e2e39954e0300ca9a7a88b2
SHA51253a3db82f4cf5a300a5eab7692f4084451b987ad72ae24d9118d80f18692ac3604981c0e871c7a7625c5153803aea0e093d91822d33af0c10a07bcb6e766a5b6
-
Filesize
15KB
MD59c065d6c5281d117a5ab20d451cbb9fa
SHA1a5389580f858ff959946594db256a3ea52a09434
SHA256d8a24e3962da14244c117f1fea8c918a854d7fb19983bb1c237b67e1b2c19082
SHA512244da1ca4a4eaa6b70f5c5505bf1fd5d6a63ef19c22965bd7e593d4eb1135b4e36d8118da67a975add0319a4c003efcf9a2ecf8d43c8b69450c4e3032bac808e
-
Filesize
152B
MD587fed7c1b9a95ae9ea9cee05e1b225d2
SHA19f178046148c82c04cd1cff275bcf6cea4cdbf68
SHA2567d05154011bf0c5bc132acf7dcb43dc5f1976a96a52537f4c8ee8ac767f29cf4
SHA512e370724c56192b0918e5f8ccd618be2d25f322e9c5a00e5fd4b28018f6983ccfc360c58df2e7e0a6eb9bbb3807bfbde6146a2347c2926c0103dcae90363eeb63
-
Filesize
152B
MD511ea5cccf354760abd587eb0ca739bf9
SHA13aac11e2afa2f15e89ad3c75859c3d721971a5e6
SHA25625a4cf1c4536f3e66ff1b4d6c1289f3b3103aac0fd1ac6eb60c794ceff4291e0
SHA51246b4177061d2aa17251c9e4e80e686eeab7228e25d884fbe0e415ed0a06d839dfb58f04ae6e4b57e51c02458ff93af29619d224fbcdf0906297d27d3b014599c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5295c0b0c9fef31b21dea93dcaa88a231
SHA1df99746a6c6bf074ae177420f82d78b3d2d63e46
SHA256b16d0fa5eee5212e27b948fb1df03b7d7a99b5cc25e896208f813a322f69b33b
SHA512e43321aafbfa867f60480a9b6d792121eebb04f1896dcf192d4bbf7d36d830aa7a9718eba7faf67495500e4b7e7f67f1c29919aeacd39834f854e9dfd82300c9
-
Filesize
477B
MD51234d0388e370bf21e58b6a838325b19
SHA1221f9dd84399390adab8d9ae3a801d4de68a7fbd
SHA25606dac1d560f739e34d771ac04f55f0ad1f75bdd0a9f627621b5b37cd90fe31f7
SHA512336d087f7e497ef3ae90d5aa38c897759b6ac3cd05dd7d9c1435c4be828b0e91a8772abfb00a7e7f8026ffa55419784ac2987ea558aa999c11acbcfafca42249
-
Filesize
763B
MD5105641f199f96750ed3bc3446e3e3f98
SHA15cb2db6ca1ca2d86f53162396f8df30ebaa04cdb
SHA256cb1adaa92fdadad4ea728bbfb87508edffc6656c9f6e13e7378b5fa0057d683c
SHA51269ae7a36a753af385572a56e17c90f2fe6b9e42449498fd94255cb6db3e9a304bd09ff91dd185cc143b5020ed3ea4f9282b4340a2a1bd6126ea6fac8b0b2f526
-
Filesize
6KB
MD5d4a69414bbc2af08f5437ccad162c54a
SHA18f31d8a723438b6eeffb1f7912c907183e65eb1e
SHA2564734cfa83854b4643818d558f73c10dbcfa5ea5d5943c5188cb09d6113a36bee
SHA512ad191016ab0657be7f29fb3e970666ff714baaaa31debabaa4a8582524981fc5dd29694acca7d3abdf2620565e4714db6c79e8c8adf25fdb6b7397405413599b
-
Filesize
6KB
MD5a393bc82fd22329023719b0d2cde1b5c
SHA1f0d85a7240d008baea9d9a2853edc2705b1be5cc
SHA2562402db003293e204699af277e1b46a41f3b32c3cf65cbbc1f1f05484926b06d6
SHA51242351c1d7ce567d735b39130fdae4def605478db305012a9f495b3d1bfa1b06df0a2b9024af6e08772b569063621bb9533b6134e6baf94d3bcb9d3868d9ed5e1
-
Filesize
6KB
MD553c18fbeb089ad842d5b98b5f9db773e
SHA19c5eadc1cfc36d59d63dd61d4c6b0950621fec30
SHA256f5e116f6035b77b08e690387b525e83a192ed8702af1378bf9cc878f8a2b375b
SHA5126b1fa7b52a768739a0dc7593ab173f7e597e540449187865843f5aae9809e9b16920aaa216a81c655e165b4e92c08192471c0a412d8366a8ea3002cd7c335faf
-
Filesize
6KB
MD500dc70320689848ecf3a7793e886d47e
SHA131ffba61b0e3741571bb65811231fd8f3b4bf426
SHA256577b0a6d414aabffb6cd20c35413e6c3c025edc5c7442b96923a8a02c61779cc
SHA512c53dbb2d00639c6c292e631c1085c46e8cdf56b7259c7d2d5c3130321a8b8d358659717b20470089af4dfd42b5b7f987b6968c1e61dfd5079066fe91ad327b38
-
Filesize
6KB
MD5ece85a123ebee715fc9c63485857963a
SHA1f5bc886b4d82a6b5b4c73a29da14cf8b8899ec40
SHA25670a537f4fc1f94e71ff0b9b94f1f7b624e3dd97fa35eca20b9cf8eb01adac8ab
SHA512896a50985de9bd94c395bc3d1e9f5c4c430db869a7c1f4c64d8a3409dbd22df00582ef39163079abe43e2325c0e9ed87cd2bca9a4ea47e75574134654be4dc56
-
Filesize
6KB
MD591a578332885798c3f452a44a54220f9
SHA108bee18c4c52448873be8085295244efd26d1c02
SHA2560e1fb8e4941c226ef336e7dac78e0a94df527946a2aed989705573e283a63757
SHA512f6e78a6adb9d1b7d780d2a692a49dba279bdbc247fb8b23942c007d7178f693757faf369c9b7430b265dfa888c6c842a852b549bec983ad7ee57f2de8768caf7
-
Filesize
6KB
MD5bc5b54bce053d4946d65dc5a2b2fe697
SHA1e4ef969f3aa52b008349dd02283794a91e25d975
SHA256b27a1d9225c2c529057b4e5868edcb355e2f33b58deb8a0a2fce977e92fbb008
SHA512037782fce52efa23143f94e075f98d4725ded1d569ff36e7a0a0f1f21bfdc4ed22ded3b219141fd040f691416e1671ccbe3393ff89db5ff9450414d3468b4afe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD537a201dd07a57847dde7189efa1ca6c8
SHA18d89c2c94ea89e175927fec72b823afde62830d0
SHA256ded7bc783f22260b5fe16e8124ad0b6757317bfe616b6a1f531f13f93ed4423b
SHA512c8aab810f22a15616540ae91909919b033d35cc02ce67e7792cadfaf14f0c627e574681b7c69a60e2d674255467dd47b613917109d5e632f2df6bbc75e59b999
-
Filesize
11KB
MD5f2814328e1375f94ec87117d76b0ea36
SHA1979d4fcfc629c3cf38e692339f910200b2510312
SHA256e20cfa1a8e196f59726c784cf270aa5863c768461f02babab01cc4240c3c10fa
SHA512bff09384cb411ae0d5db1a1fb2a06d7db4510cfba6fd53bcdfd98a439f23449a6015499ebd30b7b83e0e1446823a4116a3a6a3c750689410442b2848bb5dfcdf
-
Filesize
11KB
MD5de59f925760d56284b23275bd9787717
SHA1b27522e2fcadf4f6785b3b6d25dc02cd92848282
SHA2560b5f9301d79e5c87618e5ad7c4ff14466915bf36bac745da9b90273f7d4a72ee
SHA512fba279f2301ca908dfd20b23f7907d8660ac04c06ccd0de80564ee9d79a57c97036555882d86c91ebced7bef73d7bc5d2624fc55c363e4284573dc154ae93836
-
Filesize
11KB
MD51ef7bdd14e5cdc244020fb11a16ed20f
SHA172b3138cbbd2c10ad6860bdb01a9013641a7cd90
SHA2568fc97a772399acc8a9879df9ff229e4af1d2540dfbac01cdfa1bb108ba0dedda
SHA5123f766c4dd96ffa0ee922b9b768a2b189bc3fc703f1f58e8e8ca9f0b9214aa79e30a154ef5c87cbc596a17b3c0b7367afb871b3f16ffeb28615bb2d51590013d1
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\BLOZM9SO\www.bing[1].xml
Filesize21KB
MD5175da4c0d2bd98b98db252caa01a82e1
SHA1eab7e960e6ea28480b18cb995df68626e8e73a06
SHA25655c7adf2b261d8192aa7d2202b0315ec9284f3816480fc67902588ef97472dbf
SHA512cd0cc6ef39f2661e5947e83c7e51ae5cab9847784744eb5dc03b8bd404d712312fb3db36cbd8bc649a6b8a5678cf47535a5d72d057bb7f9fa67e2eb0baa36bab
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\BLOZM9SO\www.bing[1].xml
Filesize7KB
MD5f1babb587f4a8b865d45062a749e30b9
SHA18f29f7148e79f6839b5327aab968a8ca7ffd7f23
SHA256dca70111ac400c0f0e37591e631cb2192e4c09c3f0391190840464bbea375e17
SHA5123f1edbfa8935cdf448305b80087c8c433c9bb30f5f7220c6e182defa5d092e40e5eb6318d7467708b2f2c9d2f75db89686a86a0cafe75b639a34d0ec1ebe69fa
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize11KB
MD5b31162055326f9c5b60d1d3e0f1bbf34
SHA153cf7035cd77503098cc80981db652447c64c8ea
SHA256d8288f6c88819f0d64ad9bfcd9011d32177b5016b63a886f1e371c7a755c9b14
SHA5127b47260730756444ea39270d2bb6733307b549f5ca460f5eb6e129dd2f9bc73deffe80b344be6ed29a3d9f0058fe383e59c30f91a80febfb121b75ce19a093fa
-
Filesize
1.6MB
MD545e5ca74b9ae3c3fc6f6a63c609783b6
SHA1f36715bea96d69bb18075fac30b90502c6d2464b
SHA256b4afd37b9087df7e041ae749fd0fa342926d9cce533bde9cdc4283132c3820a9
SHA512014fd398d456fcb118dfd6b038b6f96008ca209d44d9707e175e85e7f14cfb3f2886deaed0d8ed25971813035e8dd7f88142c06972f3e2c9b4a534d84bec661a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
280B
MD581893f4e066f8dd416b96ecd7aaf69f9
SHA110af02d51584383a9d25d2714f4dde07b6cc35c6
SHA256c225de807a1243ea241bf784c6fafbf400bebe5e78abb57bccc368687ab34c2f
SHA5120d754c0236063d976826553e0d8cfbbd9fa33f31f41dea1e6e07c5217b6af1abad17904519a8dc1668749bf93db1b5f46905cd2bfb76fa6bc7716d93c32ae1c2
-
Filesize
280B
MD51700752a461dda3d691852c44f96dec5
SHA165b1e01ae69676a04dc71ec989a273aab03fed7b
SHA256b047cc39a7be992489b1b1c4392b947e415a2b90f3b8c4735199abb4b528a01b
SHA51243290a85791aba97c0e484765c8d6bbfc18b33c4dcc7ed2ad52ce3d1c5183d3c73dcd4f94b1b95b27f4a8ae002a9564e11eb837dc166b2203e5ab805a4e1d9fb
-
Filesize
280B
MD576161c86758ee4fa6471db16af49f655
SHA1132da8d4ac6a49eee136d57010ea9c6c28a68225
SHA256be09b827e90e90420fbda9c61b229e13bb4a333fd134217c20748b5987f1eb88
SHA51285face49e9260c69b02e7e392638c379e038a345bd38385441e906331bf3c4d9d59e06288b0f7fb87d30e11fc36fc7badffffc3c4d818902f4832d6752bd46cb
-
Filesize
280B
MD580e7c43834d08ce7543fd7c905acc3e7
SHA11b0b7e12ddcd122863f0f0245325b0abcd356aeb
SHA256f1c04c5c1bbaaa5a46bc08133a3484207383f0f835fb46eefc7e16260b787ff3
SHA512c1e25481dbce0b62546e9fbdc7d8d1a2dbb4e813dd750b43f369523cdfd08bbe9f7f404729d279b66313eef383c1759a1b6bb57c976647f56d69407b3b5485bb
-
C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView\Default\61bbdeaf-5773-480d-a371-ad2ec64700a0.tmp
Filesize6KB
MD59dc1aaaf6e90a8b6e347d236a8fbc97f
SHA13f5021906ef3bd34ae22e1ea8bcc75ae22aea0bf
SHA256cc65a075b032779a2b66dfa67a838ef7e3cb32382d927afe6ad2ef17ad394b61
SHA5127e8e554c55a84f6556d4e23745ead044772456f77f908a439d1e59465ad26953f8a5c02d4626c2134631a90c1150a18073e5ffe5995a8f632048b8f99ffd9d40
-
Filesize
120B
MD5ebd86da387aa0daf838ba28164705996
SHA1c54a526e420725d01fa929e745e558813e538b13
SHA25644ef206fd31085d6f33b87c21d06c2bdd4450f5b00a48c304aa8782a4b2df608
SHA51271bbaff33cb98ca522d265f03c24f0033a9eb0218e47ebdfd2fdc2ed6d429fadf1e7a083de1b171798703ade36c077857290a7740ba20b0fc0eba610644511ec
-
C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5c799bd4e275ea84681dd726e2ef075d3
SHA1632ed302c6a2c95bd463428e0b54e4aef56fe833
SHA2562ef14596c0033ecc2398d88c808874d3e1cb3fc98d7b492686da56b01226f017
SHA512f355ec6564b30cbb2f2ed4c19908946eed3447857f7ff72e9e1175ba1935692bb197e88119fed89f29f86c38d2688cf8e3717b0ab8094adc0a6b7f5b22285b61
-
C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD53c540ffa0cce84dc788ec7372c115cc1
SHA1a1b4c888e73fafd034ba19f1b9a55e8cba53c0c1
SHA25629d7596b569e66e87d824b99f5354fef376cc7a3a1e4a5fd79d3452eb881029e
SHA5124f2314aa9cc36deb5a3e29e1aad02245403795335dbda427d8af14f8af5fe472efc763107d4e0ae23466f6395b807b74b1ba53e5621bdb226f8bbb5810eb4c01
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView\Default\Network\6495f05d-13b7-4a2f-9aa1-34786a6fa29b.tmp
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Roaming\SetupV4.4.exe\EBWebView\Default\Network\Network Persistent State~RFe5b1039.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
188B
MD58e7bcbad8c939e11d3cde9f0e19ca528
SHA134a56f0ca29b139c74330e5310038ef417e52cf3
SHA2560e5f968167949239a6a80f132836cffac7a48b5f15e636fa0ae7cede2bd76a7e
SHA51247fd30998333432d6a444d492172b193510ce7af779ab8656a588b4497eb0c9cc70c7fde65717d8e1b2828371c6b74bd0da4e8e812d02ede45fac622ea458c3c
-
Filesize
188B
MD5d58297c07088e1431fb8641a6cca40da
SHA10f2f2ca61c8e38e57c06257269de073b9564cae1
SHA256a674c933d532dcd89b1475c5d3b06b833ac16b8067f4f7029635a430ae08e66e
SHA5127091c00fcc41de88be019c5663f53ff085a6ef1aba840cf519a861a082c62ebb6b86a64defbc28e5c9d268eca10b53f8ad59b07e8ba5d7df4b7b9f774af8d7c2
-
Filesize
6KB
MD56f9510d28751dc5cc1047eb7225a0998
SHA1bc9ab5d9f12c81643d62524f9d7ecb59772dde4a
SHA256f8314884d5d5f94917a42c1551114097ba51deac3cc0e289d53318bdb9f9a7f9
SHA512b7c26b5df52f69e523bced4d18f4e98e65d73dd0a631171baa4e39bfe7bface1c446a2c38e556b37638e5e5c9391cd09ab7c450071ece1f1c9383051b0fd87a7
-
Filesize
6KB
MD57423eb76f4992dabd71dcef6a5ff4e3c
SHA1a1ee1322a9bf346d50a18e916e5debbf395df8cf
SHA256cce9bde8fe0d481e8543ed476900f3ddab2432579551dc0c5f4ce03d16d821ff
SHA512c2cf1e252f74fc4a868d552b3648487892aa4800aed2c566ecfb96c6b773625bed7f8cd7005aecbe483abafaaccebd92cb73554ff03acf742f22dd9bed168678
-
Filesize
7KB
MD5f4f4cc454c8e2381fc1596e956fdd247
SHA1a1927fdfb9584249c645760d7b2c03478293d65c
SHA256d22b149f736e5c20b82a07616a8e4d85fa1cb0cb5587f3f8dd0a78db6c588dbc
SHA5129c857bb56cc489caedd81f4712b5cfdc198160f15b219310d1ec278cb2f6ef4ad784835b9e3859101c6a53f7a896c1c265ceccca3761cc6ff697b830a0ec854b
-
Filesize
6KB
MD5fa16f896c8c2b8465552fc43392d0fab
SHA11bb9b03a054401ca130c4baf50b1a342189b5324
SHA2566645510d8226ea788955e0955446333cf5f68d53ec00daf4fea9a67fc8354b70
SHA512b6527eaf5ab6a7c205db33659493ca7b2397bf71522cad22a121e7d8f62e02640971a580ac932659113f45cd1c02c57b9b84044408fe2d9a6843ec05344431ff
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
16KB
MD5bcdddefa3804561486abce8f6165396a
SHA101d1a2cafe55acdf8317bda623972eaf98f48143
SHA256bcfa1454b330d30317f35a80b0e7b81d03a05e93609d8de71084c2b5264181cd
SHA512edda0fae055eda2fab9a700452ac2981a4697dc797c4ff51b4bbc118c60c0a9b882601567aaf5de5962ef1eafa6c38053ac07707eeb558120602af55b15ca1f0
-
Filesize
16KB
MD5058597e9d7a9f669ef27c9265589ca6d
SHA1c377327083cb7264994ac59057118ba269deedbc
SHA2567f12eefe634f8a3d6a47b53bbb6fe2c8d99d483ec25d6d84c6ff8af6ac1cfe8e
SHA512d93ac2b40c26714dc3f34f03f66fe20d6025f137b1add07728fbe391d58b4e358dc74c84f1c361a412f72618880dae89315b790c2ee5c589d6d8689154c1bf9e
-
Filesize
17KB
MD5e9a46fe3b2b469dc64f6fc417364d8a5
SHA1367b9af464fed1f5d788922efce7daa91b87e2cd
SHA25648c1ec0a9ae36e6a2d8e8f93bbea93dc04e9696d33ba7f67ee66db8dde46814f
SHA5124f02dc13de688d98d4db12a056e5331ba2b3eac9d420c902e1f2dbba52df2165519014f6c51b72a8e39346aaecfabea52f638d560fbec021e982957bf751531e
-
Filesize
1KB
MD55cff1d27e50b4f4a86eadd92ac4b1ed0
SHA1521b6d0821da0cbee3e4c49edb17388ff68987cc
SHA256d99f1213aa42d11d8baa3740806685aa80b4fdce23137d23f76c3f1f269152fd
SHA5129b0bce5d17cbc6f6bcf98217291f143c65cd64ad3397125c286025834d908a5310524507921774490492b0da79a6cde6b8dfaf0a27e2867db6b1036d971dd167
-
Filesize
2KB
MD510e776e3326f6dad4b4b76997624f603
SHA13365ac54bb21aa6871c12da1b8ed6124f4aa78ca
SHA2567a2375dcb4305671ad89f5d8d51c9e1edb1eda83e5b5b938c8cd4ed78839a824
SHA51250ac7d64764ba53aa32a902a6101f2cad274b5550c58d0fee328508951bcc945e4a97fba3c25d5d41ea15e13c44e369ad5f9f50ea9e1a3473eb650ebe2790f2b
-
Filesize
3KB
MD57a9c80f7f654502d694252671242dab4
SHA1193dfad8900e792792b1ceca91b0f012c5b313a4
SHA256fa11ff877b9fe288addfccd6aa2a2848b3716b11c122fe824ad4a3f40ee480de
SHA512cfe26ea931db2ce6f5214f800c0d2845cd0ee24efe5e4782b9b482eb3779d07cce53b0409f967b65707be618ce0b9c0406af84c7cd7f9fdf772d934b3645ab5b
-
Filesize
17KB
MD51ea194dcc52b27662fda3cc34505af09
SHA18cdd47f2fc76a97f7f8d3b4f01fdcd4eebb935cd
SHA256e333fa782a5b0278ce520ec6c6ec008b69348b7d255811ecf94c691ba272f77d
SHA512603136797cde6bbcf822b19e4bfb1c3eecf1a6a74c39798c0e4218c15fe028809c0575acd30524b3d72ccdac993d4b264ac415a8c11ff0a7b5c78842829c6fab
-
Filesize
17KB
MD53a3c43e284ed2c2e4348c71b7fe0bf19
SHA16fd8d61635c88c75a3d6e91b8af65fca8f2846b5
SHA256eeaf756284f97cb170fd3dc5b13b0e571abcf2ca4c37ad60c8d4260f8b1d233c
SHA512a3bcb1c21559d1e120578e619f6bb704d9e94575f3da545edba75b3ab6bf9ba2ac40adfd65569ba7c593931c8f2cc4857780b951601aa69bbba13de0221ee2e0
-
Filesize
1KB
MD5be049694e1b834ec79fc14d0b3fba9ca
SHA14ea21b001856648f8bf6a6bf39ad6c54dc8b3780
SHA2563631a105799a9d6649add8ccdd0cc9d7e851e27f2c14e7181b67dd4a143d0aff
SHA5124e2bb5406ca94bf4b1b3ee9a30efd7b4c94268f6055b3a54f1a7c69052a8f2267ad511894fd70f3c2b3f9030d6474380cc4da74c8539e30f57022bd9a8e0d837
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
15.0MB
MD5b227599e3ee7433b744809b23bbd2970
SHA18d63a3389d3c3d8c7e79e54da8c5f9611974b0e7
SHA256d535b0dffd985929a9e7fc2acc7f420fa8e9c3b9f89e237140898f85c208581e
SHA5124cf2100571038cbe6fdb56102628dd05d9e14123e7bcd0c6ee1c7c5a35727e0a95e2aa0e6c2f6e476ec770a9b7f89a13da27d01200066d2620be48a6bbcef443
-
Filesize
280B
MD5e01153fbb591c0b8cf8c2894f13511f0
SHA14e60a1fc05acf172c616d32806056f5b029b62c0
SHA256a66d77aed224b2999c0ae195681c8c173886b43c1ef1a8ede87f74b1d712f055
SHA5121298519b9aff23b6b28e899fbf06a3ab3711351d70d05e39004fefaa651070575ee11d61422d3b2e6be69bc02b1cff9f755e696e940fb9eb8620acfbff09af74