Resubmissions
30/09/2024, 20:16
240930-y2bt7axdme 830/09/2024, 20:14
240930-yzywyaxdje 830/09/2024, 20:06
240930-yvhzxsshmn 6Analysis
-
max time kernel
389s -
max time network
394s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
UpdateTool.msi
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
UpdateTool.msi
Resource
win10v2004-20240802-en
General
-
Target
UpdateTool.msi
-
Size
173.6MB
-
MD5
90c290ef28ab6f163a446969090f2daf
-
SHA1
c98b1d586dbb4be7781799a5f414292f11b8326d
-
SHA256
667c036ba1c67b0e6377a23deca78f35220ff15ec278e34fffa521f779b1ddb4
-
SHA512
5615cf7e26f9f762e3853b49b42a327dffdb9f601178bb7d743ab362277d0c850fcbbf40b7c759d7a41f9436dc7e16138a91729fb7ec13d199bffc05b0bb660d
-
SSDEEP
3145728:QP7AKGpPJJgLBZV7MVRy7mURaD8RhDFoqoCPO5R3CvKCNaInqqD7vZbUD02ilsjr:mAKgPLgLBZVR3RBlatCPO2H/5b2iqjr
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 6 3184 msiexec.exe 8 3184 msiexec.exe 10 3184 msiexec.exe 17 3184 msiexec.exe 64 1960 powershell.exe 66 1960 powershell.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 63 bitbucket.org 64 bitbucket.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 121 ip-api.com -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation chrome.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 3068 set thread context of 4844 3068 explorer.exe 134 PID 4844 set thread context of 4828 4844 msedge.exe 135 PID 4844 set thread context of 2968 4844 msedge.exe 137 PID 4844 set thread context of 1380 4844 msedge.exe 138 PID 4844 set thread context of 3876 4844 msedge.exe 140 PID 4844 set thread context of 5296 4844 msedge.exe 157 PID 4844 set thread context of 5308 4844 msedge.exe 158 PID 4844 set thread context of 5408 4844 msedge.exe 159 -
resource yara_rule behavioral2/memory/4844-728-0x00007FF75BFB0000-0x00007FF75CB5C000-memory.dmp upx behavioral2/memory/4828-734-0x00007FF75BFB0000-0x00007FF75C8B2000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 12 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer chrome.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\VisualElements\SmallLogo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\msedgewebview2.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\VisualElements\SmallLogo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\el.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\edge_game_assist\EdgeGameAssist_1.0.2788.0_x64.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\msedge_pwa_launcher.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\show_third_party_software_licenses.bat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\edge_feedback\camera_mf_trace.wprp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\tt.pak setup.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\VisualElements\SmallLogoBeta.png msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\pl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Locales\pa.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Locales\ta.pak setup.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\Locales\en-GB.pak msiexec.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\VisualElements\LogoBeta.png msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC13E.tmp\msedgeupdateres_az.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\dxil.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\ko.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Trust Protection Lists\Mu\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Locales\hr.pak setup.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\VisualElements\SmallLogoCanary.png msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC13E.tmp\msedgeupdateres_pl.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Locales\kok.pak setup.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\Locales\da.pak msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC13E.tmp\msedgeupdateres_bs.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\EBWebView\x64\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\pl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Trust Protection Lists\Mu\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\msedge.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\vccorlib140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\de.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC13E.tmp\msedgeupdateres_cs.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\qu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Trust Protection Lists\Sigma\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Locales\sr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\hr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\hu.pak setup.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\Locales\ko.pak msiexec.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\Locales\sl.pak msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC13E.tmp\msedgeupdateres_ru.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\ur.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\identity_proxy\canary.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Locales\bn-IN.pak setup.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\chrome_100_percent.pak msiexec.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\d3dcompiler_47.dll msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Trust Protection Lists\Sigma\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Locales\it.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Locales\sq.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Trust Protection Lists\Mu\TransparentAdvertisers setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\cookie_exporter.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Trust Protection Lists\Mu\CompatExceptions setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\nb.pak setup.exe File created C:\Program Files (x86)\Update\Update\129.0.6668.60\Locales\id.pak msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC13E.tmp\msedgeupdateres_bn-IN.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\identity_proxy\win11\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC13E.tmp\msedgeupdateres_lv.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\129.0.2792.65\MicrosoftEdge_X64_129.0.2792.65.exe MicrosoftEdgeUpdate.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\Locales\mt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.65\msvcp140_codecvt_ids.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\Locales\fil.pak setup.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI8CF3.tmp msiexec.exe File created C:\Windows\Installer\e57d503.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSID987.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDAD0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7D6F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7DBF.tmp msiexec.exe File opened for modification C:\Windows\Installer\e57d503.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIDB4E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDB8E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7CD1.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{A5F3DD58-6A9C-4995-B3FE-89FF28BB5340} msiexec.exe File opened for modification C:\Windows\Installer\e57d504.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7C24.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI80CD.tmp msiexec.exe File created C:\Windows\Installer\e57d504.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7D20.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e57d508.msi msiexec.exe -
Executes dropped EXE 36 IoCs
pid Process 5060 Updating.exe 3248 MicrosoftEdgeWebview2Setup.exe 1224 MicrosoftEdgeUpdate.exe 680 MicrosoftEdgeUpdate.exe 2980 MicrosoftEdgeUpdate.exe 3168 MicrosoftEdgeUpdateComRegisterShell64.exe 4256 MicrosoftEdgeUpdateComRegisterShell64.exe 532 MicrosoftEdgeUpdateComRegisterShell64.exe 2556 MicrosoftEdgeUpdate.exe 988 MicrosoftEdgeUpdate.exe 3784 MicrosoftEdgeUpdate.exe 4124 MicrosoftEdge_X64_129.0.2792.65.exe 4836 setup.exe 884 setup.exe 1380 MicrosoftEdgeUpdate.exe 4544 msedgewebview2.exe 3112 msedgewebview2.exe 1400 msedgewebview2.exe 4852 msedgewebview2.exe 1988 msedgewebview2.exe 4368 msedgewebview2.exe 836 msedgewebview2.exe 3352 chrome.exe 2560 chrome.exe 3916 chrome.exe 2284 chrome.exe 3392 chrome.exe 1064 chrome.exe 1336 chrome.exe 4160 chrome.exe 5272 chrome.exe 5364 chrome.exe 5148 chrome.exe 6032 chrome.exe 1956 chrome.exe 2608 chrome.exe -
Loads dropped DLL 64 IoCs
pid Process 1052 MsiExec.exe 1052 MsiExec.exe 1052 MsiExec.exe 1052 MsiExec.exe 1464 MsiExec.exe 1464 MsiExec.exe 1464 MsiExec.exe 1464 MsiExec.exe 1464 MsiExec.exe 1464 MsiExec.exe 1224 MicrosoftEdgeUpdate.exe 680 MicrosoftEdgeUpdate.exe 2980 MicrosoftEdgeUpdate.exe 3168 MicrosoftEdgeUpdateComRegisterShell64.exe 2980 MicrosoftEdgeUpdate.exe 4256 MicrosoftEdgeUpdateComRegisterShell64.exe 2980 MicrosoftEdgeUpdate.exe 532 MicrosoftEdgeUpdateComRegisterShell64.exe 2980 MicrosoftEdgeUpdate.exe 2556 MicrosoftEdgeUpdate.exe 988 MicrosoftEdgeUpdate.exe 3784 MicrosoftEdgeUpdate.exe 3784 MicrosoftEdgeUpdate.exe 988 MicrosoftEdgeUpdate.exe 1380 MicrosoftEdgeUpdate.exe 5060 Updating.exe 4544 msedgewebview2.exe 3112 msedgewebview2.exe 4544 msedgewebview2.exe 4544 msedgewebview2.exe 4544 msedgewebview2.exe 1400 msedgewebview2.exe 1400 msedgewebview2.exe 4852 msedgewebview2.exe 1988 msedgewebview2.exe 4852 msedgewebview2.exe 1988 msedgewebview2.exe 1400 msedgewebview2.exe 1400 msedgewebview2.exe 1400 msedgewebview2.exe 1400 msedgewebview2.exe 4368 msedgewebview2.exe 4368 msedgewebview2.exe 4368 msedgewebview2.exe 4544 msedgewebview2.exe 836 msedgewebview2.exe 836 msedgewebview2.exe 836 msedgewebview2.exe 3352 chrome.exe 2560 chrome.exe 3352 chrome.exe 3916 chrome.exe 3916 chrome.exe 2284 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 2284 chrome.exe 3392 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3392 chrome.exe 1336 chrome.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Updating.exe -
pid Process 1960 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3184 msiexec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2556 MicrosoftEdgeUpdate.exe 1380 MicrosoftEdgeUpdate.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 122 Go-http-client/1.1 -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133722013613488849" msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E0C8EE8-06DC-42F4-9542-FB2275AA609D}\InprocHandler32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.143.57\\psmachine.dll" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ = "ICurrentState" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ServiceParameters = "/comsvc" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ = "IAppWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine\CLSID\ = "{5F6A18BB-6231-424B-8242-19E5BB94F8ED}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine.1.0\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\CLSID\ = "{77857D02-7A25-4B67-9266-3E122A8F39E4}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\Elevation MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods\ = "43" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc\CLSID\ = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebSvc.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods\ = "13" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.143.57\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\ProgID\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4560 msiexec.exe 4560 msiexec.exe 1960 powershell.exe 1960 powershell.exe 1960 powershell.exe 1960 powershell.exe 1224 MicrosoftEdgeUpdate.exe 1224 MicrosoftEdgeUpdate.exe 1224 MicrosoftEdgeUpdate.exe 1224 MicrosoftEdgeUpdate.exe 1224 MicrosoftEdgeUpdate.exe 1224 MicrosoftEdgeUpdate.exe 1380 MicrosoftEdgeUpdate.exe 1380 MicrosoftEdgeUpdate.exe 4828 msedge.exe 4828 msedge.exe 3352 chrome.exe 3352 chrome.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4544 msedgewebview2.exe 4544 msedgewebview2.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3184 msiexec.exe Token: SeIncreaseQuotaPrivilege 3184 msiexec.exe Token: SeSecurityPrivilege 4560 msiexec.exe Token: SeCreateTokenPrivilege 3184 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3184 msiexec.exe Token: SeLockMemoryPrivilege 3184 msiexec.exe Token: SeIncreaseQuotaPrivilege 3184 msiexec.exe Token: SeMachineAccountPrivilege 3184 msiexec.exe Token: SeTcbPrivilege 3184 msiexec.exe Token: SeSecurityPrivilege 3184 msiexec.exe Token: SeTakeOwnershipPrivilege 3184 msiexec.exe Token: SeLoadDriverPrivilege 3184 msiexec.exe Token: SeSystemProfilePrivilege 3184 msiexec.exe Token: SeSystemtimePrivilege 3184 msiexec.exe Token: SeProfSingleProcessPrivilege 3184 msiexec.exe Token: SeIncBasePriorityPrivilege 3184 msiexec.exe Token: SeCreatePagefilePrivilege 3184 msiexec.exe Token: SeCreatePermanentPrivilege 3184 msiexec.exe Token: SeBackupPrivilege 3184 msiexec.exe Token: SeRestorePrivilege 3184 msiexec.exe Token: SeShutdownPrivilege 3184 msiexec.exe Token: SeDebugPrivilege 3184 msiexec.exe Token: SeAuditPrivilege 3184 msiexec.exe Token: SeSystemEnvironmentPrivilege 3184 msiexec.exe Token: SeChangeNotifyPrivilege 3184 msiexec.exe Token: SeRemoteShutdownPrivilege 3184 msiexec.exe Token: SeUndockPrivilege 3184 msiexec.exe Token: SeSyncAgentPrivilege 3184 msiexec.exe Token: SeEnableDelegationPrivilege 3184 msiexec.exe Token: SeManageVolumePrivilege 3184 msiexec.exe Token: SeImpersonatePrivilege 3184 msiexec.exe Token: SeCreateGlobalPrivilege 3184 msiexec.exe Token: SeRestorePrivilege 4560 msiexec.exe Token: SeTakeOwnershipPrivilege 4560 msiexec.exe Token: SeRestorePrivilege 4560 msiexec.exe Token: SeTakeOwnershipPrivilege 4560 msiexec.exe Token: SeRestorePrivilege 4560 msiexec.exe Token: SeTakeOwnershipPrivilege 4560 msiexec.exe Token: SeRestorePrivilege 4560 msiexec.exe Token: SeTakeOwnershipPrivilege 4560 msiexec.exe Token: SeRestorePrivilege 4560 msiexec.exe Token: SeTakeOwnershipPrivilege 4560 msiexec.exe Token: SeShutdownPrivilege 1892 msiexec.exe Token: SeIncreaseQuotaPrivilege 1892 msiexec.exe Token: SeCreateTokenPrivilege 1892 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1892 msiexec.exe Token: SeLockMemoryPrivilege 1892 msiexec.exe Token: SeIncreaseQuotaPrivilege 1892 msiexec.exe Token: SeMachineAccountPrivilege 1892 msiexec.exe Token: SeTcbPrivilege 1892 msiexec.exe Token: SeSecurityPrivilege 1892 msiexec.exe Token: SeTakeOwnershipPrivilege 1892 msiexec.exe Token: SeLoadDriverPrivilege 1892 msiexec.exe Token: SeSystemProfilePrivilege 1892 msiexec.exe Token: SeSystemtimePrivilege 1892 msiexec.exe Token: SeProfSingleProcessPrivilege 1892 msiexec.exe Token: SeIncBasePriorityPrivilege 1892 msiexec.exe Token: SeCreatePagefilePrivilege 1892 msiexec.exe Token: SeCreatePermanentPrivilege 1892 msiexec.exe Token: SeBackupPrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeShutdownPrivilege 1892 msiexec.exe Token: SeDebugPrivilege 1892 msiexec.exe Token: SeAuditPrivilege 1892 msiexec.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 3184 msiexec.exe 3184 msiexec.exe 1892 msiexec.exe 4544 msedgewebview2.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4544 msedgewebview2.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe 3352 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4560 wrote to memory of 1052 4560 msiexec.exe 84 PID 4560 wrote to memory of 1052 4560 msiexec.exe 84 PID 4560 wrote to memory of 1052 4560 msiexec.exe 84 PID 4560 wrote to memory of 1464 4560 msiexec.exe 103 PID 4560 wrote to memory of 1464 4560 msiexec.exe 103 PID 4560 wrote to memory of 1464 4560 msiexec.exe 103 PID 1464 wrote to memory of 1960 1464 MsiExec.exe 104 PID 1464 wrote to memory of 1960 1464 MsiExec.exe 104 PID 1464 wrote to memory of 1960 1464 MsiExec.exe 104 PID 1960 wrote to memory of 1240 1960 powershell.exe 106 PID 1960 wrote to memory of 1240 1960 powershell.exe 106 PID 1960 wrote to memory of 1240 1960 powershell.exe 106 PID 1240 wrote to memory of 1696 1240 csc.exe 107 PID 1240 wrote to memory of 1696 1240 csc.exe 107 PID 1240 wrote to memory of 1696 1240 csc.exe 107 PID 1960 wrote to memory of 5060 1960 powershell.exe 108 PID 1960 wrote to memory of 5060 1960 powershell.exe 108 PID 5060 wrote to memory of 3248 5060 Updating.exe 109 PID 5060 wrote to memory of 3248 5060 Updating.exe 109 PID 5060 wrote to memory of 3248 5060 Updating.exe 109 PID 3248 wrote to memory of 1224 3248 MicrosoftEdgeWebview2Setup.exe 110 PID 3248 wrote to memory of 1224 3248 MicrosoftEdgeWebview2Setup.exe 110 PID 3248 wrote to memory of 1224 3248 MicrosoftEdgeWebview2Setup.exe 110 PID 1224 wrote to memory of 680 1224 MicrosoftEdgeUpdate.exe 111 PID 1224 wrote to memory of 680 1224 MicrosoftEdgeUpdate.exe 111 PID 1224 wrote to memory of 680 1224 MicrosoftEdgeUpdate.exe 111 PID 1224 wrote to memory of 2980 1224 MicrosoftEdgeUpdate.exe 112 PID 1224 wrote to memory of 2980 1224 MicrosoftEdgeUpdate.exe 112 PID 1224 wrote to memory of 2980 1224 MicrosoftEdgeUpdate.exe 112 PID 2980 wrote to memory of 3168 2980 MicrosoftEdgeUpdate.exe 113 PID 2980 wrote to memory of 3168 2980 MicrosoftEdgeUpdate.exe 113 PID 2980 wrote to memory of 4256 2980 MicrosoftEdgeUpdate.exe 114 PID 2980 wrote to memory of 4256 2980 MicrosoftEdgeUpdate.exe 114 PID 2980 wrote to memory of 532 2980 MicrosoftEdgeUpdate.exe 115 PID 2980 wrote to memory of 532 2980 MicrosoftEdgeUpdate.exe 115 PID 1224 wrote to memory of 2556 1224 MicrosoftEdgeUpdate.exe 116 PID 1224 wrote to memory of 2556 1224 MicrosoftEdgeUpdate.exe 116 PID 1224 wrote to memory of 2556 1224 MicrosoftEdgeUpdate.exe 116 PID 1224 wrote to memory of 988 1224 MicrosoftEdgeUpdate.exe 117 PID 1224 wrote to memory of 988 1224 MicrosoftEdgeUpdate.exe 117 PID 1224 wrote to memory of 988 1224 MicrosoftEdgeUpdate.exe 117 PID 3784 wrote to memory of 4124 3784 MicrosoftEdgeUpdate.exe 120 PID 3784 wrote to memory of 4124 3784 MicrosoftEdgeUpdate.exe 120 PID 4124 wrote to memory of 4836 4124 MicrosoftEdge_X64_129.0.2792.65.exe 121 PID 4124 wrote to memory of 4836 4124 MicrosoftEdge_X64_129.0.2792.65.exe 121 PID 4836 wrote to memory of 884 4836 setup.exe 122 PID 4836 wrote to memory of 884 4836 setup.exe 122 PID 3784 wrote to memory of 1380 3784 MicrosoftEdgeUpdate.exe 123 PID 3784 wrote to memory of 1380 3784 MicrosoftEdgeUpdate.exe 123 PID 3784 wrote to memory of 1380 3784 MicrosoftEdgeUpdate.exe 123 PID 5060 wrote to memory of 4544 5060 Updating.exe 124 PID 5060 wrote to memory of 4544 5060 Updating.exe 124 PID 4544 wrote to memory of 3112 4544 msedgewebview2.exe 125 PID 4544 wrote to memory of 3112 4544 msedgewebview2.exe 125 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 PID 4544 wrote to memory of 1400 4544 msedgewebview2.exe 126 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\UpdateTool.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3184
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 23AB032B57D4A9F06821B044C54568C72⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1052
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E3058161E6558C97E080B307D5C74C562⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss8DD7.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi8DD4.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr8DD5.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr8DD6.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1hvvkjd4\1hvvkjd4.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEE3E.tmp" "c:\Users\Admin\AppData\Local\Temp\1hvvkjd4\CSCA1FC6EEEECC2489AB228E766E7A7EFD1.TMP"5⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Updating.exe"C:\Users\Admin\AppData\Local\Temp\Updating.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeC:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe5⤵
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Program Files (x86)\Microsoft\Temp\EUC13E.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUC13E.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true"6⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Checks system information in the registry
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:680
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3168
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4256
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:532
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PC9hcHA-PC9yZXF1ZXN0Pg7⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2556
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true" /installsource taggedmi /sessionid "{6677BFD5-9F96-4767-A0DE-BA9C713ACCFA}"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:988
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Updating.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --mojo-named-platform-channel-pipe=5060.2652.114413152507652446715⤵
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4544 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=129.0.6668.71 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=129.0.2792.65 --initial-client-data=0x164,0x168,0x16c,0x140,0x174,0x7ffaa42d8ee0,0x7ffaa42d8eec,0x7ffaa42d8ef86⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3112
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView" --webview-exe-name=Updating.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1840,i,5630877199025318312,6725338360570909446,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1832 /prefetch:26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView" --webview-exe-name=Updating.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1888,i,5630877199025318312,6725338360570909446,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2004 /prefetch:36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4852
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView" --webview-exe-name=Updating.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2320,i,5630877199025318312,6725338360570909446,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2336 /prefetch:86⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe" --type=renderer --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView" --webview-exe-name=Updating.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3576,i,5630877199025318312,6725338360570909446,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:16⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4368
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\129.0.2792.65\msedgewebview2.exe" --type=renderer --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView" --webview-exe-name=Updating.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4756,i,5630877199025318312,6725338360570909446,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4776 /prefetch:16⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:836
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe5⤵
- Suspicious use of SetThreadContext
PID:3068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeWSCOGJJEZZWL6⤵
- Suspicious use of SetThreadContext
PID:4844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeCLWBQWZGWHNV7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeERDCLVBLGHDZ7⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeUKOYHOXSCFOF7⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeWKSKQXYIHZAW7⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exePAJERKRNKQTS7⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeCZTOBSSSVFEN7⤵PID:5308
-
C:\Windows\System32\Wbem\wmic.exewmic process where "" get CommandLine,ProcessId8⤵PID:2556
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeVPFKRGWJTVIA7⤵PID:5408
-
-
-
-
-
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe"2⤵
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3352 -
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=129.0.6668.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffab6917bf8,0x7ffab6917c04,0x7ffab6917c103⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1928,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=1924 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3916
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=2164,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2284
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --field-trial-handle=2296,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=2716 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3392
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=3236 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:1064
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=3224 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1336
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4424,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:4160
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4632,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=4668 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:5148
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4816,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=4740 /prefetch:83⤵
- Executes dropped EXE
PID:5272
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5024,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=5020 /prefetch:83⤵
- Executes dropped EXE
PID:5364
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5340,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=5352 /prefetch:83⤵
- Executes dropped EXE
PID:6032
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5680,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=3160 /prefetch:83⤵
- Executes dropped EXE
PID:1956
-
-
C:\Program Files (x86)\Update\Update\chrome.exe"C:\Program Files (x86)\Update\Update\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5672,i,6883019007610110727,7292471522591351791,262144 --variations-seed-version --mojo-platform-channel-handle=3492 /prefetch:83⤵
- Executes dropped EXE
PID:2608
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:4424
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2044
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\UpdateTool.msi"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1892
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{64026F0C-76AA-45A9-BBB6-7AF3C8798A7E}\MicrosoftEdge_X64_129.0.2792.65.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{64026F0C-76AA-45A9-BBB6-7AF3C8798A7E}\MicrosoftEdge_X64_129.0.2792.65.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{64026F0C-76AA-45A9-BBB6-7AF3C8798A7E}\EDGEMITMP_63D7D.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{64026F0C-76AA-45A9-BBB6-7AF3C8798A7E}\EDGEMITMP_63D7D.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{64026F0C-76AA-45A9-BBB6-7AF3C8798A7E}\MicrosoftEdge_X64_129.0.2792.65.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Checks computer location settings
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{64026F0C-76AA-45A9-BBB6-7AF3C8798A7E}\EDGEMITMP_63D7D.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{64026F0C-76AA-45A9-BBB6-7AF3C8798A7E}\EDGEMITMP_63D7D.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=129.0.6668.71 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{64026F0C-76AA-45A9-BBB6-7AF3C8798A7E}\EDGEMITMP_63D7D.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=129.0.2792.65 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff6164176f0,0x7ff6164176fc,0x7ff6164177084⤵
- Executes dropped EXE
PID:884
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuZi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy9mZjA5YWIxOC02N2U3LTQ5ZjMtOTMwOS0xMTAxMWZlMjFhMjI_UDE9MTcyODMzMjQ4MiZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1kcFFJOTBxRHVud2VJZGlmQnREZUlqOFVNeVlaQTUzRzNSbkx4a05GWFR2aHFiaEhXUGpaNTdHQ1ZLVjduM2ZTSjlJcTJsempYVFRTc1pTJTJiVkl3Vjl3JTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBkb3dubG9hZGVkPSIxNzM5NDI4NDAiIHRvdGFsPSIxNzM5NDI4NDAiIGRvd25sb2FkX3RpbWVfbXM9IjE0MDc0Ii8-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-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:6136
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Privilege Escalation
Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
5System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD520e8994eff730315b7ed935d7055a18e
SHA148cfac62937d94eafcdd56376f398e1a6cb6089f
SHA25637ec7fb6f8dd9a540679bf6b74ba740d2c3e4218ed1e675bf0f64d1b51091030
SHA512f4279f7a2a813d2e7784263bb522b67bdd3519bb46564bd517147c98df7fc870bbf074626054d74348fef76702b7720ed3848f6b31b16af21e2caa746baeeeb3
-
Filesize
6.6MB
MD59826817876f5d690339d91533e9af761
SHA15e87919aec6a837a7d0d7a26dade5c691ff2e11e
SHA2561255d4b34db13d2daeb5b442a4784fe568dfc7adb1d5c243a93b9fc93368ed59
SHA5122e2b93b4245d2a2f82ee195bd26db515e842108e90dd1711ebc0363e3d87812e5f003bfb4609a4a86f36ef273704b4689d7759e2adbdebe0741aaad1f9a9eefa
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
159KB
MD5682cbd01731ad16ee3f89a66757fede6
SHA1072f549ba575e853228acedfdd091cca1e3ccd63
SHA256784d1df23f232b5e4d40477d4ed9d61792d30b3ef28de8d40f681c858ef36d0f
SHA512b531ac8d54966fc6aa9c53c4a126063a8f998763242ce5648e93b5a1571f1c9c2aaff38b6455ef4c6435cd2c8b76624d6aa8c7d939af8b82766cf5bc5c24ea48
-
Filesize
209KB
MD55492e3d3e8e5c13e057d323029aae7b3
SHA1f0db5615ff6659ce7bd7891e5345217e0e0bba46
SHA256bd9699e3da3de952145565d1825da68c3880c7e92af1d5ea94589d0a5820f668
SHA5123138956a77daf7d13baf155142cb03c804440be71f39fa115565d337c1bd123a2530c69ce80aac64c3e2b018799efed8acf06e84ff37eaf61e72886be92575cf
-
Filesize
203KB
MD58b6401915e92e8dd7c1b08fd7c936240
SHA15f58f939a63df11b146153f0533c200355a4fcf1
SHA256c1346ac1f12d9b2d8ed4a34390498911ed87656ac8723208105ecbb84a6d4368
SHA5127978c0111b3c7163657d4be384ea117f79717ccb9a8627b8a35bdaa02893ba06850ff2a3d46d123111404d8932fb1d5d598b2aaae6b6072cd1262e25b3cc8558
-
Filesize
236KB
MD59c49e88a984228e1e9139e10272ecf06
SHA128959c2e08343095359178b6490a244752fb0a51
SHA256dcd5baa50714c59de372ea1ab4ed09e5456e72e5b318c5e09d49fd46965a4bbf
SHA512f6d861ee36d72b75264d66e89be3eddd9801925cfe07782b3fd4ee870f6ba2a63489be1001b9e155d321b4139eeb64e185a6ce4e8d70f200b2f2f4f992ad1160
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.4MB
MD52141e11f0e1aaed7bdbcadf58fad0357
SHA16589df19d3ab259d41c54338bd42ccbd98a35db2
SHA2567d3f4e7a5ecfa260582b80d5a04c118320274a5e421d99e6c39d875ff8a80b9c
SHA512bc01037887a92cd0e43dad028fc8789c7b59d71528396410c793ded43f9d709ace099aad51165e5434e5461bb7769bc786cdb6fac5cbcf63bc0b71598017c939
-
Filesize
27KB
MD5650513fdb8e57e43722139fa33ec4ef1
SHA129c9eb770c41381cef2778eba83fab42437d365c
SHA256a088db9a2a8894f8b5ddad64fef87b19947fa28cfff2106ec913b10ec82242f2
SHA5122eec1a020212333238619ec927edea1dcb25d3aede6bfc894ce1b2a80c5592a82f09cc42519d8e883cd590c1d1ca98af590eec6ca844f3e57e8c72e14a108d32
-
Filesize
23KB
MD50b1daba73d7d9a0b83c9f32de9aaab1f
SHA17256b18df988a4e04d4dce28028b26e3d3fcf6f1
SHA2565c6b11c6601ca9fa7462ab3e81cae6a81f386c0f1f54048ae0209a0592ad8bbd
SHA512d3783fcd25a303c892a49410f102332d2a2ed856df192f5560435b226f16e90cb97ac0be3e4a13aca49e91f6de881b0bbcc63f363a452ab146d64f98c0f09119
-
Filesize
25KB
MD53cd36dd3fb7dbb8cd57d5bc5b30af46d
SHA192c288b5ecaceda4556e4b1b7abba2608f51530b
SHA256c5f7db9ea55a3c1e6a309c7b2a906f99a9a695b969ac7f1fa3238840644390ab
SHA5129c3155a2ef86bd7c01e63a96100942728a7aa763465bd990964950ea13761e03ae6fca15dfe031cc69b1ebe1a87b85f52c3f00f53ae7f76a38a501c294558624
-
Filesize
27KB
MD5dfafaa0329d6468ca7d61735bdb48805
SHA187e099322ad2f10339504b1e602a94c4505f4039
SHA256fdb931a87044070cca635d9e9c943fcfa1b01db355d66448465d53981b9d19a8
SHA5128f140c85d7175afe5c23e199eeb70a104830c9e5edbf2e834e97c93fb5ec223eab43e9e4560167de80d2cd33a7e3ebca0ae034c543efb1aa61a3f4b968b9c6a0
-
Filesize
28KB
MD59c6d060246ccbbae8404ef7ddcc3e999
SHA16a554be64db7d9ea72f45792a5ffdbda252d36d3
SHA2567c8884cc2b3a02e2e40f8b9be13fd22972daf904cc2c9479ab1d671d878ea023
SHA5124ac724e079abfc6eb1716d556339cb52c233c7d9d4cd3b64051332666afb70e9bf17d2df502edc7ac80595ea76ce10aa099efef2779e7442b9c5e4c6fa644343
-
Filesize
28KB
MD5f66b0bda782786dad87872cbc61367c1
SHA13d762a92e8814eb45f0f64ab004f39c4e74b9c54
SHA256a9264904354efabffe7d7e6e8006a79e3fc360d720e5939b11b5ed14a57b1b1a
SHA51296a4fced2979c8c78c42b9387249e4afb13d90294199df95eb588ad7f9f68958bf915a05fea2f6991a1d481a5af8310eedfd4570d5affd56e5bc008bd9dae497
-
Filesize
28KB
MD56b9be2f8ca359f17369eed3c31ade27a
SHA1bccb2f1512615f908e9d4a16c2775e937f3c4a5f
SHA25696396416d10a0601bba95de392ae44932edce69f081a12302f69a8305fe378b0
SHA5126a9831189efe07646bba89407250ea22c9c1eea0f5af04d59220692add99b4b67e96c9ccb3635f476d5bb73085dc35a3896b3b7ed72d8544cca276a6b444050e
-
Filesize
28KB
MD5f834309adf53c98aa3c285009750d7e0
SHA14e64ffe88825b982459e57a739fa64d8a92fc3b4
SHA2560e556855e6486cbac2b9015bc3193139c37b8021c3c58eedd8e463709dcb464b
SHA512a4276d4a9cd964a82bf405bb9579360dd3a61606d303da05ffc8625f496ee685ca9900c6f5f7f06ef818d154f99e8a2ed88f1ff45d30e7272d21c5b9c61d4481
-
Filesize
27KB
MD56e9ab19d33decdc96732e5431be31070
SHA14aabe0abf352f2012f40513480ffc5a77fb936e4
SHA256851b7d6a553dcbe1999bb8d8b6edf22619c02a11dc3fbe3516ba79780db886b7
SHA5129d60210a6ffe5e0b077eb566d9be0f558e8e8e040677b722f895aa807277845ae7873efea33f7966be3ccef2827216f19c737b17ee0863e60464e7897d9bbf54
-
Filesize
28KB
MD5ed0acab9db6d01dd57e8e48574a111ad
SHA15fc5e58477fc533cc457f63ffcb85ea5a88ec1b7
SHA256185e534631402a2f76bf09b6e6c036be3907bbecc3f627ffa645ec5b2a610dc8
SHA512265e87aa7d4f2b23f4b720bb39dcf7c756170aaf1ce43ecb820eef2fea1c3768c3227e20a9de8fd41c7e70afbae462c27006bdf3877d4c9faad04f16bde8157c
-
Filesize
28KB
MD5d9fd19795c264ddff0b95710e5f124b4
SHA19f6282feeb6d5b16df812b1d78cb2ea52c8da009
SHA2567b3b9b2bbf6162a2c9c024cc5276985d5ca977e4dcff0dc3ba72b6d03730c1c0
SHA5120fd5c6fba92003f4c0f84bb233ae191ce7bd4867db24d5bdfaff5cb501b02dcdfef584457846a9f949123842299d793a911d92eb926176c32ee761a499a46004
-
Filesize
27KB
MD5064f2fd94367c7658b1a3d0fdaf9b892
SHA17d03a7d9cd5b887495015678244d57f307bbf6e5
SHA256782513352898fd1c3f666e047fd8020ac4d99ede6da567b4c48b69d009128180
SHA512422813cf2c0774488199d919f3a6b7f5cdec79f1ddcf0cdc31d809e079c3ac0e7c2d817cbd2b69c9b00209422174392ddfaf4b88a0058a1e5a98faacf9798474
-
Filesize
27KB
MD5043accc7748d1b2af58d6297bd58d666
SHA1225c5ff51b2225111d68f3be51cf259ccbbc7505
SHA2567959ba8716128d46a92adc53afd149ba8293c04f446d87ca64196e8ad1477238
SHA512734d25f35eea0b9ea55c3e7bdd6be997d3b23857996bc35a1f59fff7ead8824dba70465570bb3aef0c3c8fe21c05225a9293e64063c979e2e27406732a2a3351
-
Filesize
27KB
MD57bb7ba0ace4da5724c0d799c187bbf3c
SHA1ac02a7777144e99a757be9fe0c410fe932796eee
SHA2566a878779b8c25d4597ad939b5675a320df8d2681f8adb542dee5e270c048432f
SHA5128a072de448804324fba9b2b3dd878b6d250c5f912ba383780af6b38fe224507fecdfd34be2c1663bccb849f5968e78db03d585e7b55bf3c767cbb97545be64f5
-
Filesize
29KB
MD5d92b223966954c7618b4e57474c6cf18
SHA1d71184385360c5f4ec1ce0a67a55bcec8a9f1dd4
SHA256bd69f57de2225ae3cddcef6866c34e12dc7afaf96e401563b8070a48b5b9071c
SHA512315a83393b129e69697ef1833662bd0aa106bdd46e78e2e5d5656ca3ef47dee507d81c8f2725334f60cd771631d1d1ffa49ce211450ce78e04221785c966038b
-
Filesize
29KB
MD509a969ceeb8331e44312d00801a8a834
SHA17f7833fb13878a8bab8988664abadf07c9654879
SHA25632cb1180e063174620c8a5fe5fc6b035a62387e1ad50ac4c42c88bf50c8f3d03
SHA5125e5405c39ef367fbb64e534ea04d4d60c1f9e3546ad56f0186faf9db2bcac78cc654c9c4510fddd0e22656f657ec5e087be49516ebc239b2dbb8742f559e0187
-
Filesize
26KB
MD5e729e693f3a57dc0fde4417a3e700f2e
SHA11715d1e56441cf65aacde9e49a4cafe82c9315d4
SHA2564125aa8ebd02a8fb0539b77f0b8566df9084ece651defc35fc991365e007801c
SHA5129bcb07a776b2503fa66d78c946019495243f30c6c0448d54b1dc593b52f38488093d4e88e41338e96c20fad98b215b9bcb305bed4bbf04cfb5795fc1f5006020
-
Filesize
26KB
MD5580e2d1e38ea17ecf3c9f1bb9e1e7520
SHA10ad4a7629766e2a4ef42bdd8d945289f400e3992
SHA2567d347fa9e6482fcc6e93a35f903da2d6a19a429e3cffe4938979876ecc195f9d
SHA51204b86b67112dc174de821fde975c7365b389f87ba7188e0139589d40d7b14e037047894947a8c8a26f79f923959f43e8afdb2787003f93e041910ef716056a0a
-
Filesize
27KB
MD505c8fddd08f87aac5ef60cc893774dcf
SHA16b226843ed011952b0520b8af2bb2f00c0d96a36
SHA2565c728f0e1a2510e83ea178709320adc98fdd05ed5dca72f6087eb3e142e73616
SHA512a95645c20691ad71ffd7ca60444b9756dce73a0c222de33ace035cf6dac5a20a42aa4f82f06231112943776e612ecd8c2aab52fd7dc328adda02d58bba9d60c8
-
Filesize
27KB
MD535911665447f05be40f9e0df2dbd5736
SHA1ee42b211f24c59ac7927ad610b07024b56b67dd9
SHA2563c95ff101e4b0be33739f3fb0eba874dbd8aaf425c93b08bf1201caacfd17f1f
SHA5123b2dc33854f5a4fc711fd74cb6357461041e5c8f94a6ec0addd8839e55e8309e8352cc16bb78e32893789eb28394ee0749a3c0ae0a12ad07b64dfe58e4eebeb9
-
Filesize
2.6MB
MD5711925666846ff7fc878ed7b7c4b0338
SHA11f9f5e8e77bfd4445b9a9cf0ff470ee2637c058c
SHA25690a4d8b80f8fb9327c728b97b09274ae6771ab29bcd40c33c8b5fdf4b270e5c9
SHA5128f2113d6fad643900b48a72b058e3985aeded890b8364a0c818c91041f6b72d4c93a27b684f8c960aa9d7d567193b62623aafb3120e312506648835034582534
-
Filesize
280B
MD53c543d9491f42241ab6495b040f0d2ed
SHA115e828aebaa9abaf144810fd29b10b91f6e72be3
SHA256502eed7da52dabb4e1da76a3d4371da69acecbcd8a19eaf8bd69cb170d1f2e8b
SHA51295107390baae28b4f26d83505d1aab082b707659674a1e3dfd64120069b03b32edc76c2e9bfe9b3b1a0455242fcfe4002195056de350e288e6e8485566f8824e
-
Filesize
72KB
MD5b23dd5b6eccb460003ea37ba0f5e3730
SHA1fd444553cb7699f84ce7e5664232771673dcf67d
SHA2567f7f432c27d97dee184dcd3ea20f731674c008be849c0136f9c5358e359f3ea9
SHA5127e47bd172c4bd4c65f063a8fa3fb33ed47f29156eb20e42d4e8ea73c6f02526a30ffe907be5b7c1406d4eaa71fbec7c0d557c376dccd0a1a961e2f61b3431181
-
Filesize
114B
MD53448d97da638c7ef0fbca9b6949ffc8f
SHA136d8434f26f0316fab4627f7856fca7291fe8adf
SHA2561700a11fd1e58367b450a41b2ae5fd26ecb5cdb459869c796c7dde18f1d30f73
SHA5129bf9055b2ef82bd1d2a1e94009fed2d3481fe2dc336d306fa0db786658efa5b72c9a9a214a829b9fcc4222476051871ff012009c64f09b9109072abdf3def8cc
-
Filesize
83KB
MD58b9bac9b40f70a85b4f62cf7498d9066
SHA1eb97ef113aeca0fa81b25991004888054518e440
SHA256496505a3c51a205c8d3dce51cf389089dff9a53e71f41b637d238ca6d1a7d30a
SHA512501f55e21c84bf1dec55192aa96fee0e9d09bc9a07f01f0485c12d19887763fc2d147ff3fdeef88d72d54e8f7580dfc8c8c2f60215e90759731f04ac769f8ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\248DDD9FCF61002E219645695E3FFC98_3EA7DE19EE0C309EB676B7E60E82F717
Filesize727B
MD5e5b34a1d4fb702a002aadc2ba0a2c550
SHA1dc66efde97577f57c4d0637126699a8fbc5d1fdb
SHA2564e4e8de8822628ad8a1a124e0787540107599e74c772139127fcc7a77f1dc46c
SHA512729bc09347d0bfebc86865cd0156ca643f7d8ff0a9501fe851d25c43af80ec1f14047e9a43e11dbf8f7613cd99291c1bae6a64f148585290be8375566931b9f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1
Filesize727B
MD57e5e9912de7a985ff6257b5e3005de2c
SHA13d5557f4d0ce85b5d42ae97579b154c53648c418
SHA256ec0bdea0fcc54be0a302cac5a2513186ccd5a9e1bd9de7c8dd81ce1773141571
SHA512a2a8e2118dcbbeeb1c208fc34ac67d78ba85bddeffe3cc81668ce2b90d8cb992b2be881ed9db2c9847cebc597558060d2cec50337cef115bc2a07773076a6e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\248DDD9FCF61002E219645695E3FFC98_3EA7DE19EE0C309EB676B7E60E82F717
Filesize478B
MD578b722f438ce73dcbfe8859ba268c52d
SHA17adb270f39a88670d0adb2974c2f32bba18a2f25
SHA2562ad66a4bb70898caa0c056b258a406d20f1738e751f268c4bfd3c891624b4e56
SHA5125652aaf1153dcdbf9b830e8e4dd7ff52d43b6990e2c4af257a3a00faf50e8652c7f0b74b37bed83384257be04ca71ae7cff3ce572630afb1a6f37f10419993d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1
Filesize478B
MD543feaed80ba04323445145afad33b944
SHA1925aab847ce159d49d1155ab9f4a2000d1c0f47a
SHA25636f20e1719fd66ac61ea5a48eacfc07f9a5b9ea76b558ae542c9e214acdbea6b
SHA51200ac936b1f5cbd7fa06046a35b62ab9a834287e8b7bd15c6040027e9b1533899a5ad75b34b5e326136023e654cb6ac483210835d1d221a34ccab6feced75ef7c
-
Filesize
181B
MD543f664dc7d6c6cae47a3b1d6cfc8a788
SHA1311b42f76d1a1bf2a8590a874ff692c673a0427e
SHA2564764e9968f2328dbebdbbfe68bca65f92daf3b6e8d666f96d2ab005fb301e4f0
SHA512d6f40f19a44bf82313a5f025188a05d4d5646c42868d0a60bad435a84cd8a35e12361b4117a254240d0caa26f100ecf431cde1af8c8d6c9729415075064c958d
-
Filesize
649B
MD552a97f416b353f34d455eaa052723332
SHA18cd45d47ebe4da1c2a6794a8bd1fc80acaca38d9
SHA256c0e8d20d4a01b40f481ace87811611a2b38e47c140914da03d825cc8c6840f98
SHA512c2a1e1514369f73c53a180fc4034a5e4fa279e57b3ab51b2bd5ceec0fa8c6a145afedb7a1aba563a2058b270912fa134e53a5062dbc2ca62c4e1964a1c4aebef
-
Filesize
192KB
MD5505a174e740b3c0e7065c45a78b5cf42
SHA138911944f14a8b5717245c8e6bd1d48e58c7df12
SHA256024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d
SHA5127891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911
-
Filesize
2KB
MD5ee462ad24970dae7e7e83ffe43e15d57
SHA1d397c5bb618a6f8392d7937602352afd67a3878c
SHA2565a8143b782be319295d64cb0c6a7e7a0f691de8c0816e97b14a823a0486abf24
SHA512775c08f49bd834c5b72de754c289f623b04499eb9049bee73bb6a8d8e0138f1aa863e4e4e5b98ee8301b32eb06d585739d4c60ca344a80482dd36c28a16c87ca
-
Filesize
356B
MD51f4cd902f5af60929243661d870f80b0
SHA17857aec87f41ee341a51afa4316f59d6481752ae
SHA256bccb7a49ccc43007a7038bbd95aa28780cca33cfef09885a9a2d2aaf074f56b7
SHA512bad30d490a3764c359cdc6985bf2d6b8aae9052bcf8710b9b13005091ff17fd3d7c42dd26dd79717d90ed4e997f21240d1103ed0a98c1d53b8a4be348977c1d1
-
Filesize
12KB
MD5fbfef679bee004a9bbb46075ff2c0326
SHA1cbb91b112b98c2633ff824b43b29f900b9d0dd30
SHA256c387dd021611b63eaae3cebd263b3cb6de2ea216c53802ef69f050ff872626c6
SHA5122917d8abec91aa85c05c254d7035cdf0d7edf7c12c440ed8f08494d0ed64fc7d0f3445f249900e1e4f51f37002465eccb325d09c5beda5a34468bda8a62c0d82
-
Filesize
10KB
MD56dd35fccc01fb293e8acca6b3d9da5d4
SHA161b307d7da9ddb0ae27dce6934d5235f54bb0eba
SHA25663f4ec8bf5467402df68fa6abd0fa069c824349d43e4de2731d34846fffb58b6
SHA512fa4d1054fcea39a6398300307b6358321500f7111c3f2cd768c2cead754fd42f1901f6f8e2c364895741d90d67a65876155f7e4fd1a6e42d8e55eacd5685da55
-
Filesize
12KB
MD53e08a336e1d76b59150cf0f8f547012f
SHA1d8279975785b07ecd338c229d973a0573d3a4c56
SHA256d89a72e5bdc135afccd879d68651b68c0806e387991f01c342dc9a1856fa35fc
SHA51249a5ac78f7f6f53468d39470975d1c921a9740cbe318ec0f09e7a66ee6439afa93f4bb7526b5fb4821f88a35dc30ed8fad7d992d31fceaeb48128b8332dec8ea
-
Filesize
15KB
MD51eba4946d089cde6feb88050b4528d3f
SHA1bb04738d5d2cb7bd3871fe29ecea6414782f5b88
SHA2563bc94f46c59aca3a26d839d85fe318ad2ceeaab24b23ad8f01717b2dda333e1e
SHA512152ed2ae1135661076293200295cacb84d03153adeb22cf87a0e7efc3d6bb5cb2cfde1b63a1cd061ba8edc06f30a43c60c189bdf71648e006ce13d6eed1aed48
-
Filesize
38B
MD53433ccf3e03fc35b634cd0627833b0ad
SHA1789a43382e88905d6eb739ada3a8ba8c479ede02
SHA256f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d
SHA51221a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c
-
Filesize
182KB
MD5a358d703b74bfe2a83ac9a519cc1b69c
SHA156eaf3af6a83e1e3dcf74b2952ff3db4f29ab9fa
SHA256a984d08c46443cbe49e54399a734f7c35ade88ae44c3eecc4c0858ed62f08f03
SHA512bf8b506e8ff78618092f27ad78520c41530aa037535ebe24d2849c04f21443015dbbe362702e8e78f99f187549f95ecce7dae5159bd26866c9b5e264bc0ce551
-
Filesize
182KB
MD5977108e9c61a382046e3bd1f6938e39c
SHA10a42921278db39787af73f9c1cb331c8733e54b3
SHA256661743b66182ac0532f48bf3a9729401b863a54a22a25955962ef6802fa6c914
SHA512f2c5ad3cc5ff76d8907dded9b4cc8325212b8d39d2100e6cbcb512f3f2550828231c459938d61d95e71141b9d2a6391392f4e969eb4ac2cb277677c3af68e887
-
Filesize
185KB
MD52fd0c181d248f4f7ed7a27b9aea40a1a
SHA105d78575c5d18c3ad1f6b0e056ebfd4b29a121c1
SHA256b802080886d2a285e7c818504dfe4600df5c3a035f06ea64872a159c2b87d5ee
SHA5126bea09d3058553e3ab0f4a6153555812f9ad666184a13f6c476320a3ddcbfe54042c09c3f9444a00a767fb9de0db6efc0f521a91a63ecdeb53802422ccb247f3
-
Filesize
99KB
MD50032d348a86eda7c7fb6f80b5e2b84ac
SHA1472af01563049f9e9df1efcfb829af1fcbe46c29
SHA25629d0fd998419c7a035fcddb51770071387bd8ccc0fcbc7bed5370fae84887cba
SHA512e26971eff3f0b482be2f26095173c6a85304498cc0859be3c80536254cd4fe09deade0bf50ed90233851ce1ac5f85453f27de912e3ad3325ca17b677db30bb0b
-
Filesize
186KB
MD5738ac3ba9346cf79b319a503aefc0693
SHA19dd89fa01dd3fd6dd5ce820f833e8b979eb0c3b5
SHA25634ac064e0ed5e6f333579755bd37d0e175e862171ae402a6ad8033cd7a8a4d6d
SHA51240f5ddb2762bbeefaf0efb5896e34cf0cfc9042f5b663ba64d2b4559a74940e26a31a5c81f357c73b29681a045bd722481c908b729c2b72dd2c64579cb5e0e78
-
Filesize
100KB
MD5fdfa397589032bd146246cdc91377564
SHA1ca5ca30550f1682c9078d0d5ada7e6b2e1662bad
SHA25684c8f8dbcac853e02248cccafaeb559b40ad1a87c0f2d27310f59d7ce77cb4d1
SHA5125362965101d9e95c80912b2c9e40ea52ce942d3b70e9119c339ebbbd225cc341daed322b968df7f534e4d313b9e00dcbb3ea083bfbd24b373a65161d5504696f
-
Filesize
3KB
MD51f4bf35fcea6139e9b627c1a1ada511e
SHA1d7ab473b2a4a6cbcf3ea51a66699e56f079d9bbf
SHA2566618abddeb13d58c230363499136e0ce2b72ac2544b072a134921de2c6c021f9
SHA512204455bd9275b1ac4134e579fffa85733e5bae6b8c47d74a1d99ccf36f8e82d7f13fcf6431503e24ea84c125cf82614de18fa5588e2d8be94ef0bd3d17889f90
-
Filesize
1.7MB
MD560366cbf515774ffde2b49297c3d2e9b
SHA10158273f35fb5069ae6ad2950045d3656e86b444
SHA2567ebc4ce80143ef89cea86a61ea151502868db6caaa678b8b43660a66ace11c3a
SHA512b6e1142835e2945f38f478d1ffb9d3f551357d0a65efbe23f4d0a3f4bd4e1933542251233f37f2c47ab5a6cd6b959164b813d43756b49ef72d7dbf73669fa99f
-
Filesize
1KB
MD55a008b7b3b33ed48257d4237fd999834
SHA1d36eb6b574cde7c25a5802bd312526f444b79d18
SHA2568efc8feec97a356b78d9cf232d693ee69b0a02adb14e31cdeb3e9ca7fce3ff63
SHA512680d92539d3fd26cab558f9c87abdd1bd0ed17f5b53ee3a25d8a23a50ac260872dba519fb80fcc1febe27f6edea5855a97039b164453dcf18eaba626b3f1ebc0
-
Filesize
39.0MB
MD56f9364955758da40f420391d984fce6e
SHA1f3ffed453d30bfba112a8e25c01cb386e1407f9a
SHA25644521e1af289aa3473d7445d097766f1c3f3d8721d14b14ed6d5404994a03eb2
SHA5129950dc834cf0f49bfc4943638e57089ea805640127cacf8a126c3b941c4b2635b6883d52cdaa0096aead9abf6618c17c3bfbab2897ecc03d4ef5d7fd8b4166af
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD573e24349eaf1363b7b5405c866422ea3
SHA10c0c83b558864e97b9a1ce436e5f3edabf2fbb28
SHA256c10d2940e15b29a83b7c9e32f8a47388f90926c0ffe5c5926a6abef355300aa9
SHA5124e6c84b299a08bb4a2a3f19caa3f465bd452a000328dedf4d73d227278bc069ed00488a73de6424b3d6a5ca7e5e1a691c5529eacd4b63f7be3b27b6f7d3352ff
-
Filesize
3KB
MD54de77742ba082e2ed4af14a74b535ca9
SHA16a768bbce9e7ba3bb35037738c2e35f84e2fda3a
SHA256f42284c78e58876961deb6b84c0f2a3247ae18a030e3de05062556ec1a5dc005
SHA512045df436e9b3a9a51f7f37ac393a146456ae6dcec49ca9b2e6d71e40734ff1cd7e702337e36b66d799f66490da27099b185ee60b666a3d9e685053a8861253e1
-
Filesize
280B
MD5ab5600bd07668d7057fcb88e197a1065
SHA1580b6bc01593a032ed6059d133ea24ee67bf1201
SHA2561ab6b178787f943d0785919864df81c1609575c4054e5fe148a8a62ebbf0c274
SHA5124369e6a27be0cde591ca6a00f7ddea6af2c3f59eaafa0e285d51099ef364fffc8f44a12a9e9f0b5538f2bd13fbf7174dc65772b05e53c9afe94ecc309332193d
-
C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD549854e0a4e84f6163c385f8403bafbb4
SHA1e0c27857612c9ccbd15a03ee0110e8a0856ccb53
SHA2563658829c8d13941f41938a6bd94abb6247f1a5eb6b2826ab84ea6f1dc624986a
SHA5124b79fe2d06d9745d5a894f80be5ec65c56e8678034cadca9c2307f87cbfb7712ab134c949d01ee90ad89ac27d7bcfe3147105cea023a950588986458ba0b21a6
-
C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b02a0f0a3d632042cacef68c67469d7b
SHA151dd5b82f8016c50eacd7d308505bf9d5ec443f4
SHA256960f0ca09e9ee4408342a68ab27d27e5d351379bbda09a88d35cdcd080dd2c54
SHA512339834399d173af1007e8041f25dedfa923675840d124b1a894497b503518f8352296e72701c7ac0edc36c6b78c784fe3e1dbf72c0232321e054e87a43c5c60a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\Updating.exe\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
1KB
MD5a9d7e65f16e888bd7632d648893c9e3b
SHA1742fb24222c365647d4fcf78d91bb71c44572c78
SHA256ea6b029396d5a7e2c3cd284e112e5a3226df26fe45582123dfb1320a8e7ba396
SHA512c6768e12917a0d6822796671c0a7720f3268aa6c1701262ebdb6b8d7cdfb4324d490aacb585a70c6339ee68d2bb11a745aba7912a431f66805f56a6b76207ae8
-
Filesize
2KB
MD51fa0b45739887749d9c2314c1725e4e7
SHA1f050a31c6715d709d7ec368c2205c8fec33f7e0f
SHA2561b0a85a17aec0a71a54fa5c118c00bf8f435ae4746ade5f511304e8e9a541e12
SHA5129ad2c146a10f1f038ab0eb15dec1bc72f1c7fd4924c2588a7a1e8c9b7463c1ac538ffc93bb088eebfb2ef03acf4fec5ac78c30b200f91c1c6a58a430bd17c437
-
Filesize
3KB
MD577ec5197978298a2dbf112c6fb1ad75e
SHA144e3610636f50d7521230f1121721cc53913903e
SHA25665a96b3fa12ffdb09c5328935d2a77c7995505b314ee43e1436246f85ae729cd
SHA5127dbdd34678cc77bb36bc8c63968337627802ad1fadd6298fdeda2348ae99d0da52de41bfdf49724f7e70457d746c1f45825e228e4b59bfacacf04fbdd2d7b232
-
Filesize
16KB
MD58adf3d47bd9fc8372658db6da35001ab
SHA1bf1b216c4e8d08992ce165af47daf6f73742a1c9
SHA25647cb4aa8346bda0f262d5474496ebcdbbb31dc290d9beee6baad422b4d3a19d8
SHA5128d6b284fdc14fe97e1efa2cfcfdc3c685f8c05314267cba1a8117fea154c33cda937f382a077601bc182dddab19d8109379b279e3242e0aaac85d4c7bf83a3ad
-
Filesize
1KB
MD54b8489dd0708e2c8b2c3d3a9e71eb875
SHA1c53c8c68acc46f2d6efc312a028922b010f65dcb
SHA256300fb9c49a04520dfd0be177467dcfa0945a4fa4b4b885102db9bdd670073cca
SHA5128ee91094aad8110753bbddf55b260bb20665b85c5a1df70d86a90f4dea56987d5850abb98c3d79e88034e46361c3da51e126278d869383ce7a229be81895588b
-
Filesize
600KB
MD5f9ef32df5a77e7374d72288ce0700fe4
SHA100114f26e6338a5d8138dc956c5e60388ef37e0d
SHA256036c0ec5ae8ea6972d6763aea652de8257c40dfa97d43b34b3b9db46c2b42b40
SHA512b29ed68ca7830a2576aa6c7b768060ff3e454f507d5f553c02a625cb0a7817d656bef6f4308cd1a7c8cf7b7f92fcea8f0d0e5798cba9bb3fb8cb6cf8ad5c0259
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
945KB
MD575fdd4bafba5d7082126be37eef2598a
SHA173cb2823016ecb1ce287da67e135e02c13c556c6
SHA2564ecd8241776a95987927cc7cc4854f2d1b4ce3e0631aed33c7639e931921ba15
SHA51200bd76d4bb9ac5cb5ded051d37e8df5e4a9c6209e747b2b399f7744d833fad0e957fd4fa897db02bc3ea9ae1da8d25e29623ef19c968c7791481e51fd6a7f891
-
Filesize
293B
MD539ffa2cbc3fd9b1be822d06b33d766b6
SHA198b3dc87feb3c776f9066493e45aa5f687bc6194
SHA25613151ece00129ec03cbe7806e26c5ff20d56e2d1e793c040afbc46d55d9176c9
SHA512cd0ca105aa65e9f378fa477e97377c5865d43f02ce65d10f4fdccd6bc6d93dca2a0ac65d4d32b3412c2b397ad77e340043382c824c0fe1d892f22b3779205d93
-
Filesize
369B
MD5d24911d47b77c888344c45f1ec54dac3
SHA1553558446865bdf1630bc5cb47c4323807bdb078
SHA25604b05a867cab46f21a88de7c7bf953c9cca0fa03862cd6c8ac1b7b67deab454e
SHA512b3e83558717ef9d2a25a15d0a225451d3f47f3f7b7901d35eca9c7e6898e3d804cfedca135247de70400372c6e9e89cfa057d8ab80d3a22b0bbd9eda0d42a275
-
Filesize
652B
MD5fbd79ed798e1b1b6c92dda42c094d5f8
SHA100226a05f967669cffd018389d5babb5f8e7326c
SHA256154310044bb8a213b68b81c649b94ba91ae372f6a923869758f724b3027a6beb
SHA51260dd23fbe1acd4fa768f4b0b937a884492df466f72b938ee173ac803f136330794360a47e152d1e4cf7084468c71e3896f8e13ea6bea1e8db7ce61be8dbf4ae6