Overview
overview
10Static
static
3GrowtopiaI...2).exe
windows7-x64
6GrowtopiaI...2).exe
windows10-2004-x64
$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Growtopia.exe
windows7-x64
1Growtopia.exe
windows10-2004-x64
1MicrosoftE...up.exe
windows7-x64
6MicrosoftE...up.exe
windows10-2004-x64
6SecureEngineSDK64.dll
windows7-x64
1SecureEngineSDK64.dll
windows10-2004-x64
1anzu.dll
windows7-x64
1anzu.dll
windows10-2004-x64
1sdkencrypt...64.dll
windows7-x64
1sdkencrypt...64.dll
windows10-2004-x64
1steam_api64.dll
windows7-x64
1steam_api64.dll
windows10-2004-x64
1ubiservices.dll
windows7-x64
1ubiservices.dll
windows10-2004-x64
1vc_redist.x64.exe
windows7-x64
7vc_redist.x64.exe
windows10-2004-x64
7vc_redist.x86.exe
windows7-x64
7vc_redist.x86.exe
windows10-2004-x64
7zlibwapi.dll
windows7-x64
1zlibwapi.dll
windows10-2004-x64
1Analysis
-
max time kernel
128s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
04-08-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
GrowtopiaInstaller (2).exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GrowtopiaInstaller (2).exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Growtopia.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Growtopia.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
MicrosoftEdgeWebview2Setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
MicrosoftEdgeWebview2Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SecureEngineSDK64.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
SecureEngineSDK64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
anzu.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
anzu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
sdkencryptedappticket64.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
sdkencryptedappticket64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
steam_api64.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
steam_api64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
ubiservices.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
ubiservices.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
vc_redist.x64.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
vc_redist.x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
vc_redist.x86.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
vc_redist.x86.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
zlibwapi.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
zlibwapi.dll
Resource
win10v2004-20240802-en
General
-
Target
MicrosoftEdgeWebview2Setup.exe
-
Size
1.6MB
-
MD5
8b9812ba27e12c79319d859e97955ca4
-
SHA1
3cb35ac811c27e7b21b381dccab55517609190c3
-
SHA256
a63d59b2af0c7b2be6984280386042a230dab928e3b426d51a0afb2eff5f98e9
-
SHA512
8312081fcca20f1d8d393ea2588c2fd19830eb9b36700ec8bc541cd25c4c2046008f3eec07883056956adae5c56083d43ded74d3122d21555d1e43a9d1ab5618
-
SSDEEP
24576:o9ye32wIdWoAH+miAQoCZoWf4fh29ht/5iqSxulBbxAl/f1scgIDnzMwdF9fZ4T+:Qye32wIuAAQZKwEqbBe1scgID7fZcZJ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
Processes:
MicrosoftEdgeUpdate.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 9 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC MicrosoftEdgeUpdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 10 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
Processes:
setup.exeMicrosoftEdgeWebview2Setup.exedescription ioc Process File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\ms.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\sq.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\BHO\ie_to_edge_stub.exe setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\msedgeupdateres_ro.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\msedgeupdateres_sr-Cyrl-BA.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\MicrosoftEdgeUpdateSetup.exe MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\or.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\th.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\VisualElements\SmallLogo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\cy.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\gl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\mi.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\msedgeupdateres_ko.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\identity_proxy\canary.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\am.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\telclient.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\es-419.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedge_pwa_launcher.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Trust Protection Lists\Sigma\Staging setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\hi.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\msedgeupdateres_fil.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\az.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\eu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\microsoft_shell_integration.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\elevation_service.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\sk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Trust Protection Lists\Mu\Content setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\kk.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\identity_proxy\identity_helper.Sparse.Beta.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\de.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\msedgeupdateres_nl.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\msedgeupdateres_nn.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\ca.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Trust Protection Lists\Mu\LICENSE setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\pt-BR.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Trust Protection Lists\Sigma\Fingerprinting setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\it.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\msedgeupdateres_mk.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\identity_proxy\stable.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\es-419.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\ml.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\icudtl.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\sk.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\de.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Trust Protection Lists\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\or.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\ja.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\pl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Edge.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\km.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\VisualElements\LogoCanary.png setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\he.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\VisualElements\SmallLogoBeta.png setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\msedgeupdateres_id.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Locales\ru.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Trust Protection Lists\Sigma\Staging setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\EdgeWebView.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\eventlog_provider.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\VisualElements\SmallLogoDev.png setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Trust Protection Lists\Sigma\Fingerprinting setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\identity_proxy\dev.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\PdfPreview\PdfPreviewHandler.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\pwahelper.dll setup.exe -
Executes dropped EXE 13 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_109.0.1518.140.exesetup.exeMicrosoftEdgeUpdate.exepid Process 2608 MicrosoftEdgeUpdate.exe 1452 MicrosoftEdgeUpdate.exe 2916 MicrosoftEdgeUpdate.exe 3024 MicrosoftEdgeUpdateComRegisterShell64.exe 2204 MicrosoftEdgeUpdateComRegisterShell64.exe 1940 MicrosoftEdgeUpdateComRegisterShell64.exe 2984 MicrosoftEdgeUpdate.exe 1736 MicrosoftEdgeUpdate.exe 1028 MicrosoftEdgeUpdate.exe 1628 MicrosoftEdgeUpdate.exe 1052 MicrosoftEdge_X64_109.0.1518.140.exe 1536 setup.exe 1732 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 34 IoCs
Processes:
MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_109.0.1518.140.exesetup.exeMicrosoftEdgeUpdate.exepid Process 2500 MicrosoftEdgeWebview2Setup.exe 2608 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 1452 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 2916 MicrosoftEdgeUpdate.exe 2916 MicrosoftEdgeUpdate.exe 2916 MicrosoftEdgeUpdate.exe 3024 MicrosoftEdgeUpdateComRegisterShell64.exe 2916 MicrosoftEdgeUpdate.exe 2916 MicrosoftEdgeUpdate.exe 2204 MicrosoftEdgeUpdateComRegisterShell64.exe 2916 MicrosoftEdgeUpdate.exe 2916 MicrosoftEdgeUpdate.exe 1940 MicrosoftEdgeUpdateComRegisterShell64.exe 2916 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 2984 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 1736 MicrosoftEdgeUpdate.exe 1028 MicrosoftEdgeUpdate.exe 1028 MicrosoftEdgeUpdate.exe 1736 MicrosoftEdgeUpdate.exe 1028 MicrosoftEdgeUpdate.exe 1628 MicrosoftEdgeUpdate.exe 1028 MicrosoftEdgeUpdate.exe 1052 MicrosoftEdge_X64_109.0.1518.140.exe 1536 setup.exe 1028 MicrosoftEdgeUpdate.exe 1732 MicrosoftEdgeUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exepid Process 1628 MicrosoftEdgeUpdate.exe 1732 MicrosoftEdgeUpdate.exe 2984 MicrosoftEdgeUpdate.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D430D5D-25FA-4C24-88B7-84347452C421}\WpadNetworkName = "Network 3" MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\be-d2-f7-a9-d5-1d\WpadDecisionTime = a0fd144095e6da01 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D430D5D-25FA-4C24-88B7-84347452C421}\WpadDecisionReason = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D430D5D-25FA-4C24-88B7-84347452C421}\WpadDecision = "0" MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D430D5D-25FA-4C24-88B7-84347452C421} MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D430D5D-25FA-4C24-88B7-84347452C421}\be-d2-f7-a9-d5-1d MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D430D5D-25FA-4C24-88B7-84347452C421}\be-d2-f7-a9-d5-1d MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5D430D5D-25FA-4C24-88B7-84347452C421}\WpadDecisionTime = c0d0374895e6da01 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods\ = "17" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ = "IAppCommand" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ = "IPolicyStatus3" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{69E11C9D-4974-41A2-B067-9F26953CF52A}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ = "IAppCommand2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ = "IPolicyStatus5" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ = "IRegistrationUpdateHook" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods\ = "9" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods\ = "13" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine\ = "Microsoft Edge Update CredentialDialog" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine.1.0\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher.1.0 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{69E11C9D-4974-41A2-B067-9F26953CF52A}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{69E11C9D-4974-41A2-B067-9F26953CF52A} MicrosoftEdgeUpdateComRegisterShell64.exe -
Processes:
MicrosoftEdgeUpdate.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
MicrosoftEdgeUpdate.exepid Process 2608 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe 2608 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MicrosoftEdgeUpdate.exedescription pid Process Token: SeDebugPrivilege 2608 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2608 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_109.0.1518.140.exedescription pid Process procid_target PID 2500 wrote to memory of 2608 2500 MicrosoftEdgeWebview2Setup.exe 31 PID 2500 wrote to memory of 2608 2500 MicrosoftEdgeWebview2Setup.exe 31 PID 2500 wrote to memory of 2608 2500 MicrosoftEdgeWebview2Setup.exe 31 PID 2500 wrote to memory of 2608 2500 MicrosoftEdgeWebview2Setup.exe 31 PID 2500 wrote to memory of 2608 2500 MicrosoftEdgeWebview2Setup.exe 31 PID 2500 wrote to memory of 2608 2500 MicrosoftEdgeWebview2Setup.exe 31 PID 2500 wrote to memory of 2608 2500 MicrosoftEdgeWebview2Setup.exe 31 PID 2608 wrote to memory of 1452 2608 MicrosoftEdgeUpdate.exe 32 PID 2608 wrote to memory of 1452 2608 MicrosoftEdgeUpdate.exe 32 PID 2608 wrote to memory of 1452 2608 MicrosoftEdgeUpdate.exe 32 PID 2608 wrote to memory of 1452 2608 MicrosoftEdgeUpdate.exe 32 PID 2608 wrote to memory of 1452 2608 MicrosoftEdgeUpdate.exe 32 PID 2608 wrote to memory of 1452 2608 MicrosoftEdgeUpdate.exe 32 PID 2608 wrote to memory of 1452 2608 MicrosoftEdgeUpdate.exe 32 PID 2608 wrote to memory of 2916 2608 MicrosoftEdgeUpdate.exe 33 PID 2608 wrote to memory of 2916 2608 MicrosoftEdgeUpdate.exe 33 PID 2608 wrote to memory of 2916 2608 MicrosoftEdgeUpdate.exe 33 PID 2608 wrote to memory of 2916 2608 MicrosoftEdgeUpdate.exe 33 PID 2608 wrote to memory of 2916 2608 MicrosoftEdgeUpdate.exe 33 PID 2608 wrote to memory of 2916 2608 MicrosoftEdgeUpdate.exe 33 PID 2608 wrote to memory of 2916 2608 MicrosoftEdgeUpdate.exe 33 PID 2916 wrote to memory of 3024 2916 MicrosoftEdgeUpdate.exe 34 PID 2916 wrote to memory of 3024 2916 MicrosoftEdgeUpdate.exe 34 PID 2916 wrote to memory of 3024 2916 MicrosoftEdgeUpdate.exe 34 PID 2916 wrote to memory of 3024 2916 MicrosoftEdgeUpdate.exe 34 PID 2916 wrote to memory of 2204 2916 MicrosoftEdgeUpdate.exe 35 PID 2916 wrote to memory of 2204 2916 MicrosoftEdgeUpdate.exe 35 PID 2916 wrote to memory of 2204 2916 MicrosoftEdgeUpdate.exe 35 PID 2916 wrote to memory of 2204 2916 MicrosoftEdgeUpdate.exe 35 PID 2916 wrote to memory of 1940 2916 MicrosoftEdgeUpdate.exe 36 PID 2916 wrote to memory of 1940 2916 MicrosoftEdgeUpdate.exe 36 PID 2916 wrote to memory of 1940 2916 MicrosoftEdgeUpdate.exe 36 PID 2916 wrote to memory of 1940 2916 MicrosoftEdgeUpdate.exe 36 PID 2608 wrote to memory of 2984 2608 MicrosoftEdgeUpdate.exe 37 PID 2608 wrote to memory of 2984 2608 MicrosoftEdgeUpdate.exe 37 PID 2608 wrote to memory of 2984 2608 MicrosoftEdgeUpdate.exe 37 PID 2608 wrote to memory of 2984 2608 MicrosoftEdgeUpdate.exe 37 PID 2608 wrote to memory of 2984 2608 MicrosoftEdgeUpdate.exe 37 PID 2608 wrote to memory of 2984 2608 MicrosoftEdgeUpdate.exe 37 PID 2608 wrote to memory of 2984 2608 MicrosoftEdgeUpdate.exe 37 PID 2608 wrote to memory of 1736 2608 MicrosoftEdgeUpdate.exe 38 PID 2608 wrote to memory of 1736 2608 MicrosoftEdgeUpdate.exe 38 PID 2608 wrote to memory of 1736 2608 MicrosoftEdgeUpdate.exe 38 PID 2608 wrote to memory of 1736 2608 MicrosoftEdgeUpdate.exe 38 PID 2608 wrote to memory of 1736 2608 MicrosoftEdgeUpdate.exe 38 PID 2608 wrote to memory of 1736 2608 MicrosoftEdgeUpdate.exe 38 PID 2608 wrote to memory of 1736 2608 MicrosoftEdgeUpdate.exe 38 PID 1028 wrote to memory of 1628 1028 MicrosoftEdgeUpdate.exe 40 PID 1028 wrote to memory of 1628 1028 MicrosoftEdgeUpdate.exe 40 PID 1028 wrote to memory of 1628 1028 MicrosoftEdgeUpdate.exe 40 PID 1028 wrote to memory of 1628 1028 MicrosoftEdgeUpdate.exe 40 PID 1028 wrote to memory of 1628 1028 MicrosoftEdgeUpdate.exe 40 PID 1028 wrote to memory of 1628 1028 MicrosoftEdgeUpdate.exe 40 PID 1028 wrote to memory of 1628 1028 MicrosoftEdgeUpdate.exe 40 PID 1028 wrote to memory of 1052 1028 MicrosoftEdgeUpdate.exe 43 PID 1028 wrote to memory of 1052 1028 MicrosoftEdgeUpdate.exe 43 PID 1028 wrote to memory of 1052 1028 MicrosoftEdgeUpdate.exe 43 PID 1028 wrote to memory of 1052 1028 MicrosoftEdgeUpdate.exe 43 PID 1052 wrote to memory of 1536 1052 MicrosoftEdge_X64_109.0.1518.140.exe 44 PID 1052 wrote to memory of 1536 1052 MicrosoftEdge_X64_109.0.1518.140.exe 44 PID 1052 wrote to memory of 1536 1052 MicrosoftEdge_X64_109.0.1518.140.exe 44 PID 1028 wrote to memory of 1732 1028 MicrosoftEdgeUpdate.exe 45 PID 1028 wrote to memory of 1732 1028 MicrosoftEdgeUpdate.exe 45 PID 1028 wrote to memory of 1732 1028 MicrosoftEdgeUpdate.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUE917.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1452
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3024
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2204
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1940
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies system certificate store
PID:2984
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{FE12ADC5-FA80-4642-AED0-25AA6402B520}"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1736
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzMCIgaW5zdGFsbGRhdGV0aW1lPSIxNzIwMTg1NTQ3IiBvb2JlX2luc3RhbGxfdGltZT0iMTI4OTIwMjEyOTQ2Njk2NzY4Ij48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTcxNzIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjI1Mjc0ODQwMDAiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Drops file in System32 directory
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies data under HKEY_USERS
PID:1628
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{760A20A0-202C-4866-B920-8EF6D6009F6F}\MicrosoftEdge_X64_109.0.1518.140.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{760A20A0-202C-4866-B920-8EF6D6009F6F}\MicrosoftEdge_X64_109.0.1518.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{760A20A0-202C-4866-B920-8EF6D6009F6F}\EDGEMITMP_DD679.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{760A20A0-202C-4866-B920-8EF6D6009F6F}\EDGEMITMP_DD679.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{760A20A0-202C-4866-B920-8EF6D6009F6F}\MicrosoftEdge_X64_109.0.1518.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
PID:1536
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjYuMS43NjAxLjAiIHNwPSJTZXJ2aWNlIFBhY2sgMSIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjEiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEwOS4wLjE1MTguMTQwIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIyODI1NDQ0MDAwIi8-PGV2ZW50IGV2ZW50dHlwZT0iNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMjgyNTQ0NDAwMCIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjM0MDk1MDgwMDAiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvd25sb2FkZXI9ImJpdHMiIHVybD0iaHR0cDovL21zZWRnZS5mLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzLzBjNDA4NGYzLTFiZWQtNDI0Ni1iOGVkLTIwNmNjYmU2MGUzYz9QMT0xNzIzMzk3ODkzJmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PUVPeDNQUkx0R0pFTkpYU09BMWVIYWJ1TU5iODE4ZWFmS2hRbU1jMTZQblBWT1haaUJBbU9pYzFQVmJyQVk5cDJyYXF5TU1YN25LMnMzVHVUVWwxbVdnJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMTQwNjk2MDA4IiB0b3RhbD0iMTQwNjk2MDA4IiBkb3dubG9hZF90aW1lX21zPSI1NjgzMCIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjM0MDk2NjQwMDAiIHNvdXJjZV91cmxfaW5kZXg9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI2IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIzNDIyNDU2MDAwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NjA5IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIzNTA1NzYwMDAwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMTM2ODEiIGRvd25sb2FkX3RpbWVfbXM9IjU4NDA2IiBkb3dubG9hZGVkPSIxNDA2OTYwMDgiIHRvdGFsPSIxNDA2OTYwMDgiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjgzMzAiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Drops file in System32 directory
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies data under HKEY_USERS
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Installer\msedge_7z.data
Filesize3KB
MD5bd70ed26e6e6f3193043ac09c58c6a1c
SHA1d733a65e17f2851d5116598dd80533efc1656468
SHA2567a474217d20b9a6fe3c3a46c0d6d5b2d2040fa790663f6da9202ee7cb07bb448
SHA5123e2ecade6d687b0736d5eafd7527b24095b9c51f0c8ba99398b23da2d8843c49fc8c1fa37190d385b504d8224c8c517d78d44ae32e10e45d54b19477a6970756
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1536_1623339451\109.0.1518.140\Installer\setup.exe
Filesize3.8MB
MD53a92a61a6e01c80ecc7d9499abb901b7
SHA1d89d05802d937f9c71ced14282b8a19623fca7c8
SHA256b70b2ed82c7afde8003983992b74f8182f55080b43da3d96dd29e8c0c7e8b47e
SHA5123867efbd984ddd1eec084c70a42104cbc0057c3bed222af8963051779b612b46bf4cea3311452f6564513d7558d49a1e66a9473ad53f1b2fb4c43a9d7d0fb47d
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
182KB
MD5e0a4142f6fd7098661dd27f41f6b51d3
SHA1b92bed61c6b66f958878f498d4e7bb3d23e8975d
SHA25652496289bd868f12474d9dca3f063853923f541803388b427487ef63f52c6e8a
SHA51242d071c4990cd2d5aefe53ba91cf0880810a003236675d7f251588a507d2654db332b940962479f97811b7b83f5f686f5ff662df4ffa124552fdb0a1be8d1cb5
-
Filesize
215KB
MD58200a55843c5c0da5ca8e01f77038bcc
SHA1cdf2588a010fd6ac5536f9083076c480e05eb43d
SHA256098eb4c373a48ee49681d83f9f03e3701f6dfd5361b6a071242ca23b3162ee96
SHA51210780aa7a9d2021f7dfa2273a641f64ca37a941ec5ef08486becf2422e76382f424f9aca03925adb964e2423322b62ba4ff87b4ae8731e7d5743ac82e33b75f9
-
Filesize
261KB
MD58f559de7fab651b2a31caed79ac2600d
SHA146c7ce06e6592c391dfb54634b5caf136f5f6d7f
SHA256a1b818b507c87bab9e3b4643ff68e6e35f05872ebcd1e8075a68a4cc87650df6
SHA512e975ab0175a363c56da03e43730abfd0dc90e14a486a0f04ecb40c4f2279eafd29254ff69748930d102fb8480bdcbc86611105fccb18028f60e7b3f451c6a69d
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD5c1c4e3a4d49561dd0f6bc85f8062530d
SHA15394c3a4a2601a6bf7b06b5ae9119a3f0c95c974
SHA256e9f1d362867beb3a767233de9d5af3a6e2762bb0627f291c6cb8f9faffb922ea
SHA5120e7f6d2a29c48d99fb417c630287d8d9e9f0365f1c1f2e415f0fc64e12e577c9d4e93bf6573a589e88c75a9dc6c5758fcfd970588c3d187621f8aff8e5ffc5b3
-
Filesize
29KB
MD5bd6f3d4a46abc156e47fe0d6c312a203
SHA1dedb517b1d75993df4d7140cea0a84afebbfb22b
SHA2565294a6e08b6f9818e89931eda4a0bd4ac3949c3f17ff036c1c5e2a6de8df458e
SHA512bee57ee4c14d4c93a125f5219894d10f68982e3f03fac8acc90f2f9e159553ed82aee373107d0ab3b6d5aac2ea8cd58ecb0138de8f6ab28d5d963c28d0d84039
-
Filesize
24KB
MD5914899c76f15e4eb33455f50f60e9e25
SHA1a66113325b547638824d5fa020e4b1eb0c3a4a96
SHA2565c0b6bcb983b3ec422c1459802c993219b66318e8b69ffb09f07ccb28f607ffd
SHA512ee2699489c6496d9db21484771a957acff27e39f2535d74f91dd352432b33ff15581ce4d9023a7ae273b7f2d8729103c5c06859e6cbcdef2c6ebda32ebfca3e8
-
Filesize
26KB
MD5b06ae2aaa639338686ec4f4445173ae8
SHA1842f67cab1334871e81e6428d23827505055a9bf
SHA2567e0fbc3af82b58dfc244d17d18335fac1c7e72d87d9593a359a2390a241450a7
SHA5124b8bb12b11074ce21314072577a7172dec62926a7a628d6526db46062354ad23c2e76b2dcc93e489c9ad17bf2a1b3782d155193f1ea24eb50c8fa551d40486bf
-
Filesize
28KB
MD57310b6ae3b95e9a1ca5b60b3fbd619f9
SHA103fd7d4d53fd38cc8b48d837d5a43788a6bd8ea1
SHA25665dcfc983496529b89c575451c6a897b4491f886783228526e06417499b124f9
SHA512d012d3a27bd7ac166c3ec3614423b89216ff7dcb165d99462f01ac204117fb5afc525d448f8c250638f0ee11929e2c5be61447f83089a4cee9cdd26459656687
-
Filesize
29KB
MD5af0364c9356845870577374bc5609ea1
SHA1be464b53d5dc8a31a32bffec2413081a330f0170
SHA256813220adb207a07ec609a757a10217bccf22bd3742e3ca658324add81849121c
SHA51268fecac6bf4e00fcd5c6c201c1756da13a3d87e4cbfa64fd2d1ab986bf3124303724f5ab9576bf33542d8a0f64d70069becd61182e4c6ab46801fe49a2e5be93
-
Filesize
29KB
MD5e3d3b90ed17afc3312b22051de516aba
SHA16dfd177bda02980ddcb21459969c8d21b4a42df0
SHA256ee36812f90b3a1b5f72c512d44d312dc0d72404d98222bca8ea27ccc8ef106ae
SHA512dbbe7499f0218e2628c357b5195e1f19349e79c53309daa972e294b19582c86d91a23b642c3bace74b0b7d7c94920931db7548178e0b7324feb29b0bae156a70
-
Filesize
29KB
MD5690f6eaa05e17f94ef59f988f052a4b6
SHA1a3703cd237aa460e2729657a339febcbf8b8a863
SHA2565a6dd9d9fdf372b723e8043881d4c39fcaa4f70c838fefbfb192f9c11b18fdf4
SHA51247aa48f8de124d928c0b5d7f635909b3bbb6e640da67a0f014e00c238e06b060540b98a99fa51c9ce1c37baf9ee149502e05a753a25608b00ec7da39526f88d8
-
Filesize
29KB
MD593a91259d51cf1260bcea708c44319d8
SHA12d76d5f7afa1be815838e1aab109973006e3d0fb
SHA256a1ab052c365976ae66b6b851a2282636c2c1f1b838a929e761f374472f0bcc55
SHA5128c3d7bf11796adb998362343399a85ab5127f36f7ce64d575cf9918724e09a21ca8cae0cc0123290db5bcf6254a7b10d979ad0c2a7251c43529edebce85279e7
-
Filesize
28KB
MD5c7fb8690962bd9a9051cfb04b87d3ec3
SHA1d843498bbc3ae01fc0f0fce13160db723696767b
SHA25612330d302841d37fd8bb5b74df7d454062524fac88e954041ce485ac818122c0
SHA512ed074b0890e5cfc2beadab8dab624687f2838ecebafc3da760e248c315201d2230ac6197e016ce480e1798d34e6bd2329e5bda2ef2d329207f1ed7f9d00491aa
-
Filesize
29KB
MD597dc17c19ea5196783b2a20ce423697a
SHA1693744a6f679cb111fca1134dd5efddf90b4b13a
SHA25605b78e67f9400c654ad368d3e63b988602cb2cb89ad486ea340bfe05acefa040
SHA512cbd980f7a99244bc47bf631bf6e661adece2c5d3f998172cbcdef59aab9cedf8226f15222cc9d96c56153c08d2424de70967dd96b76ab629492e25ca8660c974
-
Filesize
30KB
MD56212f397ffe20c6cef27ce0ff4fef439
SHA17910895fb0b9ff6f954ece32aa069507e6914a45
SHA256e94189425823ef69f9bf1f3cc133c23e67ad46419cc455a21d4090bf73a11ea6
SHA5125f04d8c9bd0269ba87bbf4b6a8af07ba426784c08b0a88af4fda3555e1c4e192b56db3c6f0214433fed23675ffde8b0590e5b39bd6b1011c2aad71599ec47ed5
-
Filesize
28KB
MD585f99091263667f3b5e10ef585c6e31f
SHA1de83594f08a9cf2df74b4100827d2a68d0304961
SHA256c73bdd7c4c4d89f9e0c6827f4f2feb78efd4cb047253aab3cf48412b9a78fb7a
SHA512272d8d8e45c5c9d96af41431747b09814b11ae7b08955e598b07f639277cfee8cac11455db43530d78a85ecb095ad83a8735d3e80f0e745629b0091fb0b8a2ad
-
Filesize
28KB
MD56ce4b22b621bf021bf79117a13118280
SHA11b35ca44973ac7bbdadc4d6f3d160ab15ceb47f7
SHA2567aa813b3bb3fbbec5d56da83d5b1db923be9c365511b1b02588336213fede938
SHA512f8deca730042198c2b4fe506b6ef1af62b0e1dd1983b9e92e8d4247027f30d07cec7ff097a8304226ff96cdd528208961754d33403f20463d0b6802ade2cfde0
-
Filesize
29KB
MD5bf382a14c9546ca8a6311f6b5df66d75
SHA110b61ba1e20da2b1b01e760caaa179256aa844e8
SHA2565e516cb414cd8adf278cdceb2ae537cfd7c49c277cb5d7718bcf97897350ce70
SHA5120172c495cc6213b073056dab89979a05ae9eabb7a04d2cc7c16206628f7eb98396909a1914055575b0edde75e53479739c54eae1b9282eb96172930ee10935d0
-
Filesize
31KB
MD5642225f16e2c841a23eb51dfc6e0e1f6
SHA1bcb8ed686351cc56f8c5c326b1032eea7e07c4bc
SHA25695643c34f8ba13738ad3d19a4eb6cd52eaf39f55cd46b21e148627866b4ea30f
SHA512d9fe06e5a81dbdb457f93435966e4321c1b0020e68ca0c466d870e599206a9f1b245653259a051e885cd8b88117881456d248308d278af86e6b3f75f41918b1d
-
Filesize
31KB
MD52c1b44a6c27b8510335dfe8c22d01840
SHA1e2c291fbf5a709a7a1e3c5ad507fcecf25e11554
SHA256b15d11ec96c712d102125d2e1de19507889562f857910e6f76a400d412c4afe4
SHA512adc4171a9335721c13d9d4c71ec0eaa3e873ec1729443b258eebe9ad723380bbf3eb912415f650ac3c8a13d31b658acbcc8cfbbb6fc6453eeb82b619a35e805d
-
Filesize
27KB
MD5985d279b815e130a790eaecd697bb5ad
SHA1bed21cdb6b3983a86fc7fd3d4e0bdf2a7690807a
SHA25622a5f81e478dcc8d54e0a0ca10a66ff98117698883d9fbdee36a110d6554f14f
SHA512018c9dd127a8b8900236c4c10c7770384db82946f6f1646878683960dee06b150558e52bf55a8003e7467eb9b1359d24f081539c644b7c11efa5e661e645ba4e
-
Filesize
29KB
MD567ca727bdf1e5fd6686fe3e6c1b1d43d
SHA1d3ee7ce26c3b1eb4e0fcd5af6f83bbf3c949e8df
SHA256c54a461e2eeb79d7462a4f3810f720835a2827ca752282c01520b8fede5c65da
SHA51268e93cae35433f27593f92d1741ba98a430c6a408394de4f10ce0219fe8213e7878df71747c597c7384660ed696e35dedc08a1d15d5175f9b781fa70d92a3dfe
-
Filesize
29KB
MD54dce98d8ab8857371dc4f787c77b91b7
SHA19d8569edcb1af0e122e5293495f94b388a3c6f3d
SHA2567b79d2f66bdfea60aed02eb60f3d28d396c23c147e1d42f3f10a82b5d3afeb47
SHA5126f4ec5f3fc6f5dcc77d2e811b9fbc4dd00dd15385739888e81835624bbc5e5d32c11eb23bc5dc4e6e9c2b66c77c923efd7edb81f9d8b88b446ba244455881fb2
-
Filesize
28KB
MD528777e8a0de15e07d365f375b71796c3
SHA14f3231a68e7d4817c5f6ab20bcfbc208ba63b6ea
SHA256571aa6917ccbfe221dbeeb485b9f9b358dc2b3ec72271854f880fbadeebc9665
SHA51287a14421ba72f5255d568c1be6f8e108db587525909ae33cd84526714ff89a3ea2bf9c9a78c11718fc3f22c0139ec2bb4d9cde2327cfd4a8dbdd51e992d7381a
-
Filesize
28KB
MD57ee4925d3b4e4116b0b4d61a03ffdc96
SHA17f6e1116374314527100ee854ef5befcb962ce77
SHA25699fd8800699829fd0ad767eff54dafeb913a6261ccb5c31825fdef6835653ae9
SHA512c6ef896870d427fc2ee783bc38b187fc5485dfa9c29f14f4b044b060f2385b445dd051c83a9412d3fde79f929755239061ddcefb012f8fc38ce257c87dd9a8b5
-
Filesize
27KB
MD5f1e551e10354047b68ec1aa1b36327c4
SHA1417b267661838c0626a74e1232154d8245c4bb0c
SHA256171ef4f700c8bdfe146e9ac7306c72b7a41153796d23e526aa6852a150207463
SHA512674ba129c8e1b2d9dc57e77595a994afd8e19f81cff86dbd749c855aff1ffec9c7e9920e1d45b193d83ec6f20ee4fe5966415006a0dff357b471d97b271fa067
-
Filesize
28KB
MD573b893cd1d2d759f98944e8809db3ce4
SHA170fae4564f9eeb3c503a13eebbcbe725e9c2caae
SHA256bc9ed2615e5e6c185c20bbbef898e5ba1543b6dedb15330080dc41e74a0a5df1
SHA512255ef2552a35cba6fd41b53cebee1b9749485017a053668c1271aaf0056bd08107dba6c842a926c83d78472c92aa92f54fbd84678557dc911d20fc190ee242ed
-
Filesize
29KB
MD506fc13625ead1257583224eae1afe1c3
SHA102f3de2d81c4c2868a73211d8096ae79c506d846
SHA256ef3f30691b45838caff42db92a4d6cb8857c8c36ba4b3ed9bd600bae8dc0fcf6
SHA512b2fb89890c6ebf54a325bb1023194f461b532f94113b3ddbe337aa556b0db38159643c57e41b121b3bb21c4e547bd3e89137462a3fa29608e0dbcba00aa9cae5
-
Filesize
30KB
MD530c5a417363b47f3a58d08e44198dd17
SHA11e979631e34cefee21b8a0e0aa22f4dd6e30dedd
SHA2561e76475df6a8a5889f0757584787112745a3775c8dcb04257a4ec0a2cfa58b9a
SHA512691e25436186bbda91b471b5451d06950943e6efe653362be50a3f0d21f341f4b8f751c617f39ab04571d92ef93c04b9db04192220173b66d879cbd5128f7287
-
Filesize
30KB
MD546b4263a73c35d717d65eae93c781f81
SHA13f8678c63d174aa8289d20b7f821a326c33ec07d
SHA25688661266d279b161264678af48fbfbdcaf28b1f8821336b3fb16e2126c5e5e11
SHA5123453b80619277b9efe19f2302a2a2c94372ed2ccec2a01d07741fe037f64e93b281757669750db8e6cc2efdef96b0eb1e373211da51ab887d8f0eb748931cce6
-
Filesize
29KB
MD55381426201e98d1e6efd86d24e341f62
SHA12b2df88be65d0512e140931c2878563345c77dc0
SHA256e3f7c7d612945fc79d2e47872898ae3831d4bcc73bed8d24513780612fbc0523
SHA5129e6aed7dcc33f7c9e9a888da580c2d1e4732e3a61a04bc7e682c11aea53391c82d849e341a98edff7d4792b2d2f5f0e61730d12e19fc5b2a77a5a1087c2b9fab
-
Filesize
30KB
MD56feb8258912fca8354160c02d70de767
SHA1d04f918370da6a637f5a032c8bb616ab8d0d9b64
SHA2566b13e8b6149be225e7f35fbccfd84cedeed9219f06b70630db6bf4be598fa25d
SHA512f69ae204b6569b1cea77fbcaab30d556d325fd18989a347837cd08eb669dbc6bb7794820cb3028f864be7109af84c8532525242063fc2d1901f588fb458dc02a
-
Filesize
29KB
MD575c582abc6e13902afae51da71cdb3ec
SHA10f1813d9992209d9fe60bcafae8f8652658832eb
SHA256587b4af55922cbf961852d0a9234c77eebf0ded6e561b18b09bdb2b2d8b2190e
SHA5127afa52772caf93df7cba83fcffb8b427860dcd92fee4ac732f42b5db11c3c5ef086b212bda555cb095e23d89669e0e8a31c55ca59d9b00e564c5b7ddc43de4ad
-
Filesize
29KB
MD580f4ee6f0158c5a2f50e90ab12051ef3
SHA14a0daef60adc57559bcc22a5b071a0609de82b75
SHA256066e0e6f67fb92785002e0cfdc09777b330c55cf8d34f9597ad45aa5c2171849
SHA512b6cf12625f54bf1855797100a4fa3a5fff0e4c6fa8448ea78afdadccc2639237b34a4b058592a783d5918bdcdafe562d8e8bb59fdec5bb90f3f356fb94e70432
-
Filesize
28KB
MD52cdd815eca87eea8363d7789cbdd8595
SHA13dec86ff3c88b96da8ebdf340d149b775f84880c
SHA2560150d75f78763060d4b5b00e1cdc87cdd6398fb42666da9a733c8b708f3f53f5
SHA5123d66a2b955cc31885df66b9ace4f472136ffd94a00ad769414831f4df66e5f1b44b1d8787e781fdd2ef4300ab0e03b4ecd638f46e39958df7a12281ad6812fcc
-
Filesize
29KB
MD5a2027e9099d943f12ca8a5b6f3f216d5
SHA1b9060511354ac7204df9aa441fb084886f135034
SHA256c74ed61b07e5120798795de86695b8b80255f3111b77836f89820df27dc09b87
SHA5122ea7d141b568ac5df1ba6ccf2af3c4c4acef080763e68e3f3e2b3b3ffda9deda93fa1b9a4e19541afa1f4cf2039b576df23ff98c68d96213944d4f942266ca44
-
Filesize
29KB
MD523a61f4e352d09431c3e6ec05522fd84
SHA1c663b459ce508255cc7b09615520142694526191
SHA25665c0d3996fef2d9caf87e609fb16173c1b35a691a71d926ed3858955566be3fe
SHA5124ec261b2b4b32219eb168da8c247152a1ea4139e577974c0ab571ce84301fde030cc5c3fd554ab4f8dbfba9059be51b6ffca4eef996d5782968cbdf94a474133
-
Filesize
28KB
MD5874409f9bd74f4238e02a15ef3a21d94
SHA15e0336c6717345d102c4b58032e43e2a316e92ca
SHA25677fc8dd2400150d098583ce867fb98c5beec0f0ea72542418a8a99451af12fe7
SHA5124bfda3c743f435ad88db71feaef1a8ed9706adb255d68dedf7704af618476191524e0d9fe19b2213542ac9413f05d4673eca1cc94b00f5d4191868b59e063d5e
-
Filesize
28KB
MD507aa8bf27778ef275b4f7a5242eede66
SHA1386a57f02a521d373466eef276d59c69409d6854
SHA25660e6e4cdcb2147a4a516198746adba553bf9da839a2979222efb9c4220399ec6
SHA5122e529fcbed1418bd2ac674e21d49636af0e7aaaee4f2a63bc17a13a19e43ed9c7c55335089f3d73b232ea911ba384639696a33b603e2b5bc0857875ae78c8217
-
Filesize
30KB
MD522edd8cd3e92e093ab858277552a42fa
SHA1cd5798edcb6ff59a1592bb7a0e044599b7bd8d9a
SHA256620d1ddd4ea912b58589ca415dfd80c78f49c3bcfd6012512e309c4556ba932d
SHA51254838f0c7443930cb3ec1335a7000344453b62d4103bb0ce805a5c5187d63bf9016c9b92ef8a2437e1a9abc5c4b1a632d4c95bf57c217adbeb33dcdf50b68dbf
-
Filesize
25KB
MD546cf423c6ef9301ae776b8f31a0163ba
SHA1e45a34cd8e0e96111c4ec547fa22d176b185aa01
SHA256b4e700f59f1362b0ff2a6987a5a4604225f6aa02c897bfaeafd0cd220dd02837
SHA512c5e567d6d3aa19cc51ec258e596df2c9c742fa135ffa84b1a33b1a4a8b2c74f6e2e2ce0ee1dadeeac55456d2c2d949a440b4ecb9d0d8c69b57c292844266493e
-
Filesize
24KB
MD5196a62a2a30088c4f8f0b637e972dfd4
SHA1cd650889e43abce3a968778e7f47b9f7cd791f64
SHA256fcff08b2b6eec5c1d4a833e3b837923c5fd3f3789a42f9d3683c62e7d8320940
SHA51292861604f2f2077eb70df34fb1b6f91da02a144ded1afe84c7b3878bf068f740ebdef5402ad6832b4c87716d271548c5cc04acf472d3d1564a781a3c5dda5033
-
Filesize
29KB
MD55cfb34e296eccfcd63a6b86fcf04369a
SHA135fc9121ed4901d2213b612194dc6865bb3f4bac
SHA2566ba87a9a475468dad616e007f7953a5f193039714357361b4b5e64c7f4123d3d
SHA5126ccdf706485a0e719ccc806deb4689c7682f269b93869aac746aaa6831c5ebbbdc8b3acc6bc5aed61aeecfe48a37f63357722e55e2c806bd91691098af486247
-
Filesize
28KB
MD57baf1dd8638a4e15c791ea503de05aee
SHA1389fe381c5a903bb3fc1614fe5960c1b16d491ed
SHA2567bf3cb81f44fe8ab41b4f9b221a3c1f82de5388db0aa9b94fb60862748d2862e
SHA512b24bec0201a6246e2ccb1587466c7dfa186b3dcec59eeef1fc8db098e702a8eda49211bbd87e6fb9c553b3e70c38c1669b32072d572d2e8139d015f0710a53fb
-
Filesize
27KB
MD58cf564d06f56f0ae3624731d54728df8
SHA1deeef8265d72e6b7b94bf14ae55cc2b86f39965b
SHA256e9da52655eb8c5ad50560fd31b82566fd1342a56c2a0fd0cc3790ede20a274cd
SHA5128a9f057b6d861956e415c2c3709b750b9a4b3ecd50eacd7b1522599c0a053b218715e0ea3a0b8862b4ec66446b60aebc0a58ee024b52d26d4aed1a629b1dfb7e
-
Filesize
29KB
MD5c462816fc1331ff6113f4a3150c6e1a6
SHA11f7b88b8be5c3a44fbcb91182e6a7f22e6c96936
SHA2561303b13454b14dd66e8b1cf457cd4433cfd80c073db16a792dc4208288f39f6c
SHA5129ce9e599b652668b8d7c54b88662fc150227e91e8e78afe3daba725216a5853bba68e7502a99a118df03a524b065489297cc2b427a51608a6c71bdef815c490f
-
Filesize
23KB
MD52da92995e9d08cf7c00f7cbbc9a311ed
SHA1dca7524f8678a87931a86b9c5c16a40dea7e343e
SHA2566f8b8f4d016e36aeec4f1ee98b92abe3c3765e56fc636de5942c452a7eb58b50
SHA5120e1f7de9e265dfeab5af90042a30855e3df704790c98dd52d1732b0cbaa178d660990ec91f6e4d6f18f5e978533eb332fc7c03821c3f2d95ffd6f6cd76c66f4d
-
Filesize
28KB
MD554911ee16c6eb782e8b99059b0375ef8
SHA16a29f919b989bde902062a67d161c95a8ea1f28b
SHA256eda04490b96f2d84d5797abbb1d701c3a285c8e7c8080d52490403f00fe269a5
SHA5120374744f14a9a7d002b6ecdef8b7b5337643bf1ead8d26fd601374e37f5e9c95b6670050403f4d33f319ba72b93bd5c32f578d305eb2265368f988bbea02a0a9
-
Filesize
30KB
MD5d56474ba5aeb783e7de9ab3b0f7e9f7f
SHA1456d4ab0eeae04f10688fa713d0e3ba5cbd3dd8d
SHA256f8f94e6911d5d53475b5fab4286e2574a230b47a344598fe346130d3a3659746
SHA512efcbba3a011da9b97edfcc4e3ba7be78eb25e378b2ec7e0984b6781f72831c4a102c3e04e703e37e3f051ec9b2c1a00199dbe34818163f4731558f66e6787926
-
Filesize
27KB
MD53c5b463a336bd40a68851b5f8e257be4
SHA143c8ac429deb842963ac6ff9bfcad45d1afd4c99
SHA256b31cf5496370b607a747a04c984410dcc4c721cd6ff8182c1fd1ae37d802f963
SHA512d56d964ee1d43beeb7d764c148e3d90e9a8af94ab987ce307145b2d07d70c14deaf9bcdc64688438dfae1ee0d9f323d1893b7c57bcfa3bd3d5203ae36df961af
-
Filesize
28KB
MD5aee2ea9d2d8fb9df06f9f46c95688bbf
SHA15319a6a0b85b0d46a77be1362c4e778c5d2b63ff
SHA25617652385d4d73afadcc9c6ca0925b44dd4d20eabd67848a66a49d4302894952a
SHA5124a5e75a0a4ffa97c6d31225e953e6deac30d71e7b292b4e9b04b143a212b10f62b5df59c552009a45633ac9f56f4d60a85bafeb5706be370ae1be86adfcd4420
-
Filesize
28KB
MD561c33fe81c8cec70b9a1fe50188000cb
SHA1ec9de07380cf21d47129f276bb91e06b3f59d239
SHA25627dae16f95de324f1b9a9654d677ade6c1eac763683467b0c68470bf27decfc9
SHA512bcefe56a2ffdfd5349e37e823227c0aa08f4cb17b36db84573a70d76a6163f03b25b64771cddccd1d378ee646b3c856a2adbace830173249195380ebf53d9dab
-
Filesize
28KB
MD52c2ad5b58670ef3a612b90136d17b9c2
SHA19e58c45beaf3dd7e436985d42316887fa42e986d
SHA256256ba7572be760392e61e82951bb6036bbed6c41d1fc2badd7122fb6672ca3a7
SHA5122ad938b0c0345f7e65894dba9a5e5ec4db22245d9b80c480e87e59d03788d3c50d278e38286332284610a34cdbd7cfa1174e6cc83c35367a9b9b893f77bc920b
-
Filesize
29KB
MD5d947ec9dee4f059a6c04d81cbfaa3ac9
SHA1eeedcd3ca30ace958f48756d2078426e466cc843
SHA2569181547d9e5409c404d8d844c55ace02b37718a03d7219c3021c2ee104aa9d6f
SHA51299ae4afbada3b896184ee631ff34eef18bef9604e68b5d8f0150ee68941380c32497e2cd12572e67fe579070dd9581a8700d4c795629501c6f9ebae68391fdf3
-
Filesize
31KB
MD541c09622a9813a0a2506227fa5f8763b
SHA1d9c4519be8f0707855372672b8c0b5bfd0361c76
SHA256ceedd7d095e6275022ae4e3901de54907c6c19a0a4499cf685a5fc6265dcb8d9
SHA512ef7da813252947e68d99cbd1b35c2421e3e67c585264972063eb13ea44dc9e2991a8af576f9da9eeebb57f2d02e31a39a71de555a1478d908b303dccc00619c4
-
Filesize
15KB
MD5f85b3b0f0ff473c41e44af6941574691
SHA1656004b51b651dbdcde35d1756a9ee5be012ae4b
SHA2569750c124196cec48f54cca01e0a74b2b0b3bd95131735376dc56176857af2292
SHA5126c06a44447c16a20fabc6dd3a15b58ca11834a85279c58373ca8b625c6483a23d7eb350bd7554c01f549aaa4cff53109e7642e309a2fbdd1fb29d7a228bb4b55
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e3fca611ddeb5951eec1c99c99416488
SHA1f867d1b737c8ab5b55d8f22fa9e5fd3ac3fbdafa
SHA25690b895c26f9d069c27a1019beaabdbf9ef6deea84098d8c7df37507426793f48
SHA512239e56064a22d2081299abc11631f6744136d3ca6ccff8c5030aaee2f642a71650c8ec5e990c7d95c1773465dfc7d2c86f5245046496e08360a47700ea399730
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
201KB
MD524e62a7c8d7f60336e60c003af843a87
SHA19576d1924d37113c301cadfd36481586cdef870c
SHA25643f7de9fae6b79a844d7da6056ac82beadf028a347e227c2bc33d503f7eb402c
SHA51234f33015d3e7cabdea2ef39f7f149aaf39caa534b188a34021e577d68bbc48d1d99b7b13a1303d4ebaf5c29fda0bb573f3a6cb171aa2db67cc4b25292eac4a36
-
Filesize
27KB
MD5f5f1ed2d55637a183674959e82cab3c2
SHA19472086a62950c6b40e1ecefc1fda4573e36ef3c
SHA256cfbe36dac5d40f221f377aeaf2e983dc76ab3667f4672676a8fb37c7bd4f9fbd
SHA5129c4635f791608f815e359ce49f7535bcaca404dd4932efb23f638bc9900cd77854b1d38b5ca60e5dbf3e252cf06bb179b4d9a77368b524233117f48bef345013