Analysis
-
max time kernel
125s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe
Resource
win10v2004-20241007-en
General
-
Target
44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe
-
Size
1.8MB
-
MD5
aac12149429e9c1770d6e4961c07533e
-
SHA1
a6318976aeb0164108f9ac1c93593a3a0f90682f
-
SHA256
44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b
-
SHA512
9f73f70325088610173f66400adfaa63825e602311b9e11abbb08d7d2f91e50109a76c8d87313fe69770d5105c1b47352626fbefeb033bb8fc3815575c55a18e
-
SSDEEP
49152:mSU3ky/VaNbbridO5vT8mJotZfNDAhhhxTjF17C:mS9y/INbbrh5bhmtPDWXD7C
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 12 IoCs
pid Process 2484 MicrosoftEdgeUpdate.exe 2444 MicrosoftEdgeUpdate.exe 1092 MicrosoftEdgeUpdate.exe 1228 MicrosoftEdgeUpdateComRegisterShell64.exe 1484 MicrosoftEdgeUpdateComRegisterShell64.exe 1664 MicrosoftEdgeUpdateComRegisterShell64.exe 1572 MicrosoftEdgeUpdate.exe 1580 MicrosoftEdgeUpdate.exe 1516 MicrosoftEdgeUpdate.exe 852 MicrosoftEdgeUpdate.exe 2280 MicrosoftEdge_X64_131.0.2903.99.exe 1260 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 34 IoCs
pid Process 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2444 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 1092 MicrosoftEdgeUpdate.exe 1092 MicrosoftEdgeUpdate.exe 1092 MicrosoftEdgeUpdate.exe 1228 MicrosoftEdgeUpdateComRegisterShell64.exe 1092 MicrosoftEdgeUpdate.exe 1092 MicrosoftEdgeUpdate.exe 1484 MicrosoftEdgeUpdateComRegisterShell64.exe 1092 MicrosoftEdgeUpdate.exe 1092 MicrosoftEdgeUpdate.exe 1664 MicrosoftEdgeUpdateComRegisterShell64.exe 1092 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 1572 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 1580 MicrosoftEdgeUpdate.exe 1516 MicrosoftEdgeUpdate.exe 1516 MicrosoftEdgeUpdate.exe 1580 MicrosoftEdgeUpdate.exe 1516 MicrosoftEdgeUpdate.exe 852 MicrosoftEdgeUpdate.exe 1516 MicrosoftEdgeUpdate.exe 1260 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\M: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\N: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\S: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\T: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\X: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\E: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\H: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\Y: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\Z: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\G: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\I: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\Q: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\R: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\W: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\O: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\P: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\U: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\V: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\J: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\L: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Checks system information in the registry 2 TTPs 10 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification F:\autorun.inf 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 MicrosoftEdgeUpdate.exe -
resource yara_rule behavioral1/memory/2352-2-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-8-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-10-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-4-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-11-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-12-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-6-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-5-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-9-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-7-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-35-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-39-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-208-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-209-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-166-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-222-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-223-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-236-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-237-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-241-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-242-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx behavioral1/memory/2352-2591-0x0000000001EF0000-0x0000000002FAA000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_is.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_bs.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_sr-Cyrl-RS.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_sq.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_ca.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_en-GB.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_ml.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_nl.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_hu.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_nn.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\psmachine.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_id.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_iw.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\NOTICE.TXT 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_sv.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_mi.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_bn-IN.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_sr-Cyrl-BA.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\psuser.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_ja.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_kn.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_lv.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_mt.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_es.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_fa.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_pt-BR.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_mk.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_zh-TW.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_az.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_cy.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\MicrosoftEdgeUpdateOnDemand.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\EdgeUpdate.dat 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_it.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_ms.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\MicrosoftEdgeComRegisterShellARM64.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\MicrosoftEdgeUpdateCore.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_pt-PT.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_es-419.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_km.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_quz.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_sr.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_as.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification C:\Program Files\7-Zip\7z.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\psmachine_arm64.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_bn.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_ko.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_pl.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\MicrosoftEdgeUpdateBroker.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_te.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_gd.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_bg.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_el.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_ru.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\psmachine_64.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_sl.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_af.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_kok.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\psuser_arm64.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_nb.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_sk.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\msedgeupdateres_ar.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\f76950f 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification C:\Windows\SYSTEM.INI 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wermgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wermgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1572 MicrosoftEdgeUpdate.exe 852 MicrosoftEdgeUpdate.exe 1260 MicrosoftEdgeUpdate.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61FB18F4-1240-4F22-88E7-1947FD9CC3D5}\WpadDecisionTime = 3076a0109c4ddb01 MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-87-14-80-e5-b6\WpadDecisionTime = d034c2179c4ddb01 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61FB18F4-1240-4F22-88E7-1947FD9CC3D5}\WpadNetworkName = "Network 3" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61FB18F4-1240-4F22-88E7-1947FD9CC3D5} MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\MigrateProxy = "1" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-87-14-80-e5-b6\WpadDecisionReason = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-87-14-80-e5-b6\WpadDecisionReason = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61FB18F4-1240-4F22-88E7-1947FD9CC3D5}\WpadDecisionTime = b058b6019c4ddb01 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-87-14-80-e5-b6\WpadDecisionTime = 10d55d059c4ddb01 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-87-14-80-e5-b6\WpadDecision = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-87-14-80-e5-b6\WpadDecisionReason = "1" MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-87-14-80-e5-b6\WpadDecisionTime = 3076a0109c4ddb01 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61FB18F4-1240-4F22-88E7-1947FD9CC3D5}\WpadDecisionTime = 30ea08349c4ddb01 MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-87-14-80-e5-b6\WpadDecision = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61FB18F4-1240-4F22-88E7-1947FD9CC3D5}\da-87-14-80-e5-b6 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B532B342-0E34-448B-9EDF-1D55C04041F8}\InProcServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.CredentialDialogMachine" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{ABD63202-F52F-4225-9C85-19DD88589B66}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ = "IGoogleUpdateCore" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.151.27\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.151.27\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\CurVer MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\ProgID\ = "MicrosoftEdgeUpdate.Update3COMClassService.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\ProgID MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.151.27\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\Elevation MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ServiceParameters = "/comsvc" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods\ = "5" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 1516 MicrosoftEdgeUpdate.exe 1516 MicrosoftEdgeUpdate.exe 852 MicrosoftEdgeUpdate.exe 852 MicrosoftEdgeUpdate.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 1516 MicrosoftEdgeUpdate.exe 1516 MicrosoftEdgeUpdate.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 1260 MicrosoftEdgeUpdate.exe 1260 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2484 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1516 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 852 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 1516 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 1260 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2484 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2484 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1052 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 17 PID 2352 wrote to memory of 1104 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 19 PID 2352 wrote to memory of 1184 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 21 PID 2352 wrote to memory of 884 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 25 PID 2352 wrote to memory of 2484 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 30 PID 2352 wrote to memory of 2484 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 30 PID 2352 wrote to memory of 2484 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 30 PID 2352 wrote to memory of 2484 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 30 PID 2352 wrote to memory of 2484 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 30 PID 2352 wrote to memory of 2484 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 30 PID 2352 wrote to memory of 2484 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 30 PID 2484 wrote to memory of 2444 2484 MicrosoftEdgeUpdate.exe 31 PID 2484 wrote to memory of 2444 2484 MicrosoftEdgeUpdate.exe 31 PID 2484 wrote to memory of 2444 2484 MicrosoftEdgeUpdate.exe 31 PID 2484 wrote to memory of 2444 2484 MicrosoftEdgeUpdate.exe 31 PID 2484 wrote to memory of 2444 2484 MicrosoftEdgeUpdate.exe 31 PID 2484 wrote to memory of 2444 2484 MicrosoftEdgeUpdate.exe 31 PID 2484 wrote to memory of 2444 2484 MicrosoftEdgeUpdate.exe 31 PID 2484 wrote to memory of 1092 2484 MicrosoftEdgeUpdate.exe 32 PID 2484 wrote to memory of 1092 2484 MicrosoftEdgeUpdate.exe 32 PID 2484 wrote to memory of 1092 2484 MicrosoftEdgeUpdate.exe 32 PID 2484 wrote to memory of 1092 2484 MicrosoftEdgeUpdate.exe 32 PID 2484 wrote to memory of 1092 2484 MicrosoftEdgeUpdate.exe 32 PID 2484 wrote to memory of 1092 2484 MicrosoftEdgeUpdate.exe 32 PID 2484 wrote to memory of 1092 2484 MicrosoftEdgeUpdate.exe 32 PID 1092 wrote to memory of 1228 1092 MicrosoftEdgeUpdate.exe 33 PID 1092 wrote to memory of 1228 1092 MicrosoftEdgeUpdate.exe 33 PID 1092 wrote to memory of 1228 1092 MicrosoftEdgeUpdate.exe 33 PID 1092 wrote to memory of 1228 1092 MicrosoftEdgeUpdate.exe 33 PID 1092 wrote to memory of 1484 1092 MicrosoftEdgeUpdate.exe 34 PID 1092 wrote to memory of 1484 1092 MicrosoftEdgeUpdate.exe 34 PID 1092 wrote to memory of 1484 1092 MicrosoftEdgeUpdate.exe 34 PID 1092 wrote to memory of 1484 1092 MicrosoftEdgeUpdate.exe 34 PID 1092 wrote to memory of 1664 1092 MicrosoftEdgeUpdate.exe 35 PID 1092 wrote to memory of 1664 1092 MicrosoftEdgeUpdate.exe 35 PID 1092 wrote to memory of 1664 1092 MicrosoftEdgeUpdate.exe 35 PID 1092 wrote to memory of 1664 1092 MicrosoftEdgeUpdate.exe 35 PID 2484 wrote to memory of 1572 2484 MicrosoftEdgeUpdate.exe 36 PID 2484 wrote to memory of 1572 2484 MicrosoftEdgeUpdate.exe 36 PID 2484 wrote to memory of 1572 2484 MicrosoftEdgeUpdate.exe 36 PID 2484 wrote to memory of 1572 2484 MicrosoftEdgeUpdate.exe 36 PID 2484 wrote to memory of 1572 2484 MicrosoftEdgeUpdate.exe 36 PID 2484 wrote to memory of 1572 2484 MicrosoftEdgeUpdate.exe 36 PID 2484 wrote to memory of 1572 2484 MicrosoftEdgeUpdate.exe 36 PID 2484 wrote to memory of 1580 2484 MicrosoftEdgeUpdate.exe 37 PID 2484 wrote to memory of 1580 2484 MicrosoftEdgeUpdate.exe 37 PID 2484 wrote to memory of 1580 2484 MicrosoftEdgeUpdate.exe 37 PID 2484 wrote to memory of 1580 2484 MicrosoftEdgeUpdate.exe 37 PID 2484 wrote to memory of 1580 2484 MicrosoftEdgeUpdate.exe 37 PID 2484 wrote to memory of 1580 2484 MicrosoftEdgeUpdate.exe 37 PID 2484 wrote to memory of 1580 2484 MicrosoftEdgeUpdate.exe 37 PID 1516 wrote to memory of 852 1516 MicrosoftEdgeUpdate.exe 39 PID 1516 wrote to memory of 852 1516 MicrosoftEdgeUpdate.exe 39 PID 1516 wrote to memory of 852 1516 MicrosoftEdgeUpdate.exe 39 PID 1516 wrote to memory of 852 1516 MicrosoftEdgeUpdate.exe 39 PID 1516 wrote to memory of 852 1516 MicrosoftEdgeUpdate.exe 39 PID 1516 wrote to memory of 852 1516 MicrosoftEdgeUpdate.exe 39 PID 1516 wrote to memory of 852 1516 MicrosoftEdgeUpdate.exe 39 PID 2352 wrote to memory of 1052 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 17 PID 2352 wrote to memory of 1104 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 19 PID 2352 wrote to memory of 1184 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 21 PID 2352 wrote to memory of 884 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 25 PID 2352 wrote to memory of 2484 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 30 PID 2352 wrote to memory of 2484 2352 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1052
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1104
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe"C:\Users\Admin\AppData\Local\Temp\44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2352 -
C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2444
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1228
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1484
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1664
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjYuMS43NjAxLjAiIHNwPSJTZXJ2aWNlIFBhY2sgMSIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuMy4xNTEuMjciIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iNDc1OCIvPjwvYXBwPjwvcmVxdWVzdD44⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1572
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true" /installsource taggedmi /sessionid "{EA279899-C1A8-4276-AC1C-65206E50AB0B}"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1580" "540"5⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2484" "276"4⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /unregserver4⤵PID:2236
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe" /unregister5⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe" /unregister5⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe" /unregister5⤵PID:2880
-
-
-
C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU953D.tmp\MicrosoftEdgeUpdate.exe" /unregsvc4⤵PID:1408
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:884
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjYuMS43NjAxLjAiIHNwPSJTZXJ2aWNlIFBhY2sgMSIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBuZXh0dmVyc2lvbj0iMTA2LjAuNTI0OS4xMTkiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjEwMSIgaW5zdGFsbGRhdGU9Ii00IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MjUzNDA5OTAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIzIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3B02D04-4DB6-4F1E-9D35-D917CCA63F3C}\MicrosoftEdge_X64_131.0.2903.99.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3B02D04-4DB6-4F1E-9D35-D917CCA63F3C}\MicrosoftEdge_X64_131.0.2903.99.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:2280
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjYuMS43NjAxLjAiIHNwPSJTZXJ2aWNlIFBhY2sgMSIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEzMS4wLjI5MDMuOTkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuZi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy8wZjZhNmRkMy0wYjIyLTRlNzgtYjA0Zi02MDQ5NGViNGM0ZTg_UDE9MTczNDcyNTg4MiZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1RZ1Zya01XQk9MTXU0NEwxT3JqalpCeXIlMmZ6YWQ0ZXlhbnA5TWtQekRlM1hxSmVHdHowTmloZWRPcVJCMlFDOVdTejhGbWNqajRjcmNVdFpsd0NkVElRJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBkb3dubG9hZGVkPSIxNzY4NTU2NDgiIHRvdGFsPSIxNzY4NTU2NDgiIGRvd25sb2FkX3RpbWVfbXM9IjE5MjUxIi8-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⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3000
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2776
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2236
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2824
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
160KB
MD5e7ddb7d2103fd518652eca1328f21510
SHA136bf5749f398a586ec1481cc42a3a6f5deb3754b
SHA2568666d49f5af22615eacbb8b389098c2e7276e6040c937aba970a1dd46fefa7d5
SHA51266c44138de7053a38ed25a01d5c03b08b2d91b2845b54efe6e0be79f843fbd07a81aa0796965e8de027cfb3f9ba362fd34694535f5a72d8c0dd56ea5488b97f7
-
Filesize
209KB
MD53c2ec71dbec0629c92ee081fa5523190
SHA1c34429bccfa61fc4d2bfc7be42227017fcefd4a9
SHA256d357502511352995e9523c746131f8ed38457c38a77381c03dda1a1968abce42
SHA5122a50c2c3b1391b0450cea7dd02b96046fed3e5467cc0e317b4950514fff46ed07a64fd48a917ebc1d86247f30d274bab9efafed2d4e05fc485d55e9c254bd448
-
Filesize
204KB
MD59db970fa6963695477e8a3691c5d9940
SHA1e5b57ead1f5d0fbc3185a3761103e55b69ca03d0
SHA256d5d69fb701c077892a587f3ecbb1010ec0846f5046b05a653a7994154420c328
SHA512fdfabf237fbb833f76c9968e99e887a6bc732b9be13bdb3723c472251b11faacc16eb73377ee5b532d2e6faa03e103106120d80b2d4ac0cc843c4c9951b310b8
-
Filesize
236KB
MD5b6a524d1abeb4868b67e780ea6c2e267
SHA1fbe541805bc0922f0a1c1eb9f09125a7f38a32a9
SHA256113d781452ea8d2632d50a6c64c4b1728d8d158964c0ea99e6e0b23cc9861d89
SHA5126a8df76159c0ed181e35084d75cf2edc36a0e16f93c1115d6c455b544cb2b409a447ecd1e7ae976cb2518a9cc1298df25d8ad946d4a2b89c1b3ee4b9f035c8ad
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.4MB
MD593d198acff9bb99fd6dd2f0b972a4172
SHA1a1667b10a8536b773d0c0fc9dae19f0320f95336
SHA256a88a49608b123e5241c4ebe8d69dfda70c0b3d87640c4d4a565c99b8ec00aa12
SHA512b3e5fcbad61f038848dda8cbfc40664285aabce4fcbc0ede274a9d1296216a4ab3b6a3ead902f204dbeadf7d6cfabf56f50f277e18f47b399217087996c140eb
-
Filesize
27KB
MD551e0f6293052a9ed32eebadb0e78dba2
SHA1b6f109d95760e6a8da19f760b54e35316d50db47
SHA25665f20a53718c547b675f0ebd8ce406ae2dcbe242f50fbb631e0d052befaa1a87
SHA512d4ca2fa4b832537d9dcdb6358aee50824085c4327957cfe6465e5af7ddc8245158959ecd6b7767686033c799df4deca06716d8bfdfb55d297436cf65769d1161
-
Filesize
23KB
MD5a6c941f474e1c7266ab500cc932ad294
SHA1cfff3bcf205666ca3b17b65d82a7aed01888af6c
SHA2565ad20f36db95fabbb0f8c62b94bbd532db8083e0f380191180613bd2579a5481
SHA512a7b36bef2929df59999a9fb32a0a2cd8982d90e552ceb29730ed544ba0009192659b360d02181a894943571030b5e0f7ee63b3449be489527718de318a1eaaca
-
Filesize
25KB
MD5ad19703ff751e308a0e64e5aa88e018d
SHA1aec05b96d8a10a2d6f3b09691b1f2512af92948d
SHA25613a26667a4fd42a7d9fe3b61fa5ddf959d93642b051a8ad43ef87d38619cdc82
SHA51256f7599ec7ac2db9b6d8e7c632f1327caa97395c18f436052e7482fa9d12d65c14f84dfb9e6052529a133e36201cb76ee5cab37da5ad1bb8def1abbf885f3c5f
-
Filesize
27KB
MD557147d7160d98f0e550abbe56f09e12e
SHA18463be34d9a2852f57ff18763d8ef7d2c070e544
SHA2561ba80418686eea5fc7ece5d0d4f0dd4bcdda9df6abf5bf0e8bd941ee2972ac7b
SHA512f1020a91b43c40eebd8f6f61dcba9588c6b4966bc5bd50fa806f3a0c55ec6f9921f44bf36915fcec541df540f40f2e6f3c073a9f1fc2b603db590887cf8b2dc9
-
Filesize
28KB
MD5033e5cfa0a2627efca17f13824ad5092
SHA19f7357fd9a06f4e59cbeb4492bbed4d364789e9f
SHA256de0b777c86d95dc5e9d0614ac8a5dc1b559791a2fe11385d3758e6f7021d5cb4
SHA512453508c01d40a9c6a7c4359ec991f94201be1090f663828f1f4b962734852c6ea761a75fa590669436ec0d74025d1654ec0d4dfa116d0a2f8680d54c6efb6662
-
Filesize
28KB
MD5b5c174c65533a224015e940453ebf7bd
SHA1e812e228587a9c8eb7ec7e5d838da264fbd3eb9a
SHA256f9b9730b97f160b22bb9e5f96c2fe623e4cd1ec8d58b36c05e62b92b6eed29e6
SHA5120ca1668e224130c9b9638c979d1e833ff3e4452d9007f1748d4d126a0dd99d829e8dd46dcd0606f5202534e8e483d3af5f5b300d92063a8294338f2264c58ead
-
Filesize
28KB
MD503159478c2c5416cd03b90fdbb85f60b
SHA13015e5b79be506516f05366c36e885fa15675bc0
SHA256ae58ce60a6171b2fbee56f58bfe6e38f5efe568af13355b1d3f6b6c66e5b7906
SHA51238071382f91847641e19ed957e695f45b6b76fa4b91d90db1251dae00df07d6757a6e382098ec8afb35f04fd01c8dcbd661bf0b7a1bea1054b24fbc29a29cf6c
-
Filesize
28KB
MD5ceb156024e4c9b36bc3e217201fc2322
SHA1e126d7953d5c49b724617e1f8b81edb64a769dfc
SHA256ff10d60ec3ff0cd35ce090823bcb2fdd18c825d7ee6ce17655431739e219c17e
SHA512dc74407f6b2f237479d6fde428be3fa72be3e2efe4d8dfb8e5430c119deb39ea0c9d63cde654376e7a190be0a220eaab3343df76a01059316b5b6c444479abf9
-
Filesize
27KB
MD532018e13551cc7fabff9b9d281d3bea8
SHA149796fd79c9c76e45358f21d8f9fabbb81f928db
SHA2566eab69d9cf28d403706e0dced218b3bfdce328cfed3103812388734bae98c693
SHA512e960f0eeb0cbd3393b575b91c953ed5bd8c9146aa8b8aa113605d646e48b4c4ba4faa8987889fc72dc2d786c8c4200867689c1cd8867c3f3dd9a249537ddae4b
-
Filesize
28KB
MD537eb7b29ec5007edf219acb6779d791e
SHA14097b0b293e2e5c8908b8baa7bc41128ad4abaed
SHA256e9b2d242cef0bf2f10824e9435eaa9cbe196c88c6692c0707bcb532580dafa8f
SHA512e9a8a52b7e52e85468edc9503bc1970585c178bcf8c29c662b17bed4d4399ac0b756a67c926b79f2a409f91de3067fb39a4e7f36efd5fa7ea720b841f3d50371
-
Filesize
28KB
MD513de822ff2627018bdb4c30c14463dcd
SHA19e09b285785ec4ccd6b307176212edba410b128a
SHA2569871893788cb63a024923941c1ad02da611e27328745eab33f73b42d62c9eaa8
SHA512e4e0d039f6250fd0ff78e34103909eaf13c45396900107342dc8b727b03c0e58aedad3deba7958f282e74e1a3ceb840c3cd38edf4ec10a1eabd768c1325b19b6
-
Filesize
27KB
MD5dd7622f55ba5a8253f7140ed8619d71c
SHA10cc78f6db200f6da0d0c631e36335f9720fe4ae7
SHA25690eaa4bf9fb360730d5d9567206f0740d77007492725973e4dfd3b934cae13f8
SHA512aa46fb3b01045f2f04999e66ecbe17e43212287fa08f36e6197240fd4c1686411682d0a915d7d72ba105a350c22dd7b0e2690fded93742d027efe9bca37709e6
-
Filesize
27KB
MD57fa587fc34b1f4ccff8687202d5ceda8
SHA145a5c0ea96d729664401facb37bde3d764158c5e
SHA2568dddfa9c3cb4a5f6d756b80c254e2c260cc902bc029e01708bb0828abb7ca0a6
SHA512137d520fbeb25c8dae9717c2ec4ddff1a070af074d7586afbdaa8c069f62aeae1157cc8e1b08ba40db4729314e3beb0e6fb601f017ea7e8f885a948dfa454b03
-
Filesize
27KB
MD5d02196748b8425bc2c8140f4e83a78d2
SHA10969bb02aae0ef1af7f96aba45f3941d088f9eb7
SHA2562dfbb4caa84b3be64aa909d4cf63ff4efa02695d6a378e358943c623dbf2a178
SHA51253df9dac034f7a2713b7030236c9d123f4ff2eb0fe8048f5c6902459fa812572b41b7f6c01c565cd3acb38c44ffaa2ef649dcfed76d4a2ecc6a7b22c3c53da26
-
Filesize
29KB
MD5a8a9599b126dc0e904efd055f7137c6e
SHA1061824f41d8a4d2f8ef8bef3ef2cf32a443aa326
SHA256d97203d6a65b7069423228c962639a9b8772588515baf875ff3f4a3f5bc78726
SHA512e7ad1f5c7e63cf6b3f819b8b690e078d7e7be2a4bc1df6c94132e4c3e46a4cb26b509c0f28a5647a2b1749ead70d3896f4ae4c5378f3542911a97a5842d98a61
-
Filesize
29KB
MD5e14d69cce787e19d164c3f7c0ae61332
SHA1d19d3856cf7caa2b725e1b83e861e2cd907128c0
SHA256e8187fea1b82843af60eae0e49ba184e05d36f112024c029fa0125c5d7067a64
SHA51226d984b35b12fbb416d5b27eeb8784bf5200e2d2ce618c6e2974e1336cab0f62ba82296494027ce3b73e402aa43d9b66abbe19107d74376d3490f012587c1b10
-
Filesize
26KB
MD506e1502286ac9dc94e223f186df41132
SHA1946166c0e8e57e17caedf5df17242e91f5772e81
SHA2561ec5c1132baaf9732b5bc30e6d870d5537e6bf3baf9516f66f4bf0c95c1e8b6e
SHA5129c5091c95c22d87070c6a750d66feea3e42b51cf474c5ae5566d4321acf64c7ecf37687dcc3eedeeafd568c608778b2b0e06e329ebc77c24997896b755b24ca1
-
Filesize
27KB
MD54bcd1fee36fe6a0cdaaada40907c3d8b
SHA151eb3487585e51c3c263089bad695e0922264a79
SHA256a9b4c3aa17f41e577f3d8f47e7b1b0eb57e83a67e14f3b9796a6224f0bf13a9e
SHA512f1ce2504c051301c361ba081b41b655e2a9f6add8152f5e93867dde1d2974c7723475b935ebe815c0bfcb97b9cbcb783e9c1141786a1445e8ec44bcce2e215cc
-
Filesize
27KB
MD5f3cad4dc9b85dfadd1a2f7f23f6a115a
SHA1e6326bae48881a877b2ea0e7abad5ea8833b8aee
SHA256cd0b3d6c02257f25cac07adbc2e04745afa7677e1546de60e445a1e1cde7a2dc
SHA512e870f2a49e8f33ec90cbffd783c6bdeb8259afd0bd6851bb94f471c900e6f67e12e1da16d549564da15d65e7c517bac0f983ee3395770dc7f57a31158980bff4
-
Filesize
26KB
MD55179538542bf7b9d09fed7c6ce5f36b6
SHA1485a7ba019a79c9edf5170c66f20093a8e244054
SHA25646a9baf759ff770d2abf7fd7f2dda8b1f3336f3dc477889a93b25a12e839d9d2
SHA5120b60f7c21b9421c52caa00052d1c2c3c0b4bbdb2ece783e4c9dc4b288e56c21452040ab6f0e2a024e73f6fffd4bf0c5b348975bb73e197220082e4eaf55505ef
-
Filesize
27KB
MD5b2a5bfeb8421a42a6d4e4bbe0af1ff9d
SHA12949dacb397f669812acbd2a44d45b6fd87de110
SHA256e9be16e58573ad3a66eac5330eeabde2e6b07d47862a78b4a4552cb04570488c
SHA512a89ba89ce32116fd085bd11a2c5d164e6c37e5519a8547481eaa8e1b75837920831abe2f86b6454821c133f1a7d8c1ef3d0b7cacbcfb0570d88affdeea35c81b
-
Filesize
26KB
MD5a6e0e94a5118406a49967eff69e5f95e
SHA1cb97b85f6c45cb1635a05e2ae678861758ffb5dd
SHA2563757d9f64dc9050b4b4a880be38c563202f5d4e9d4bf5c6209abfd4392aba906
SHA51211d5d98ee13b6c9da1d69b6958adfd3b078e6e4c887b056e33c59893be044ebe6fe74b3367959cc8248c2067ba54220e4333f63942da78f9cd0eef56da5222de
-
Filesize
27KB
MD55bcd5010264333cbfb0005678db9079c
SHA167049ceaee6f1021cd4cd7b2886c92aac5d6b047
SHA2563e1325f1f1f95d9fffc554d656720e19499ad8f658b1ebbfd4e4d1623639a6fc
SHA512f32a204d75683bf6a26a60e0ea41db3048dcbeb868955adde28b16786b6be8a91587cc8432a8d5a2de70b151d954543f0477fb56b26be5f0efbe25dff89fcbd5
-
Filesize
28KB
MD510bcbf6c7efd39b40c4d7819103f83d3
SHA1dc870a07ab956e2bd519424553373e53dd50ff6c
SHA25636ee1d98a48726048f1db8a34a474bd595d42836ef3c9f45ad8fc7876f6f5782
SHA512cd4cafc77ba66912d3fd46fecc2eed59f4b19de1564c42948d01e0e8a5d1150f71d59827179eedcbe12cf4308fb13023eba30f1590cb70dbdf4df29eb9e495ed
-
Filesize
29KB
MD5f443e9d9a090641a0108f2bac5f00332
SHA16e8efd1f83dc26490920f0135f36f2e91df08c8b
SHA256ec194ff30119639d586d6bed4a57fa16cc7d1024f09313c55f54311f123bcb88
SHA512892323d6497ab36a049f59e49de8c23e5ce880aca811c3423621585838bbdb64c0e95f62f22d9353ad3efc84383be52eab2797b8067fba66689763d0a9287f63
-
Filesize
29KB
MD5d60d8b7d2861cb74672a085694c4a080
SHA1c4be46de53e224e53db055d17b3393edecdaa7bb
SHA256ccdda5523459637f0d7b8766fd282b70c2849185dff5935dc2dce1cac89b0e80
SHA5126836a47ab09acfbd526d0dedd46c16b7879138d2511afdb8321c615d122f3a7c51997fab1cb9407cc6ac6ad19862e25035b133f30e0e74cff50e7a0ea4b3baa3
-
Filesize
27KB
MD513eb51cc09c9f16c2744daee640a5cbd
SHA1eee30a7fd1fccf3dbae9c1dfa6d77122cb05536c
SHA2569ccb338c76156396388f1bdcdd8ab56dddd3e7d0c9e58ad0d36f749a3edb6ec8
SHA5126fe703743bc6db042561a9d84a4dc3219fbcf4b362808979adf8e89bac7a89ba39d5d4e72137dc74ac7406a89a057001b2cfe84715a5e26a7790353c56acf748
-
Filesize
29KB
MD5000f0f4c7002bcf241d5d4a93bdfced3
SHA1826c174c8ccdc75455bf4a68051ad0850be05593
SHA2562faa96d51684d46d93bfb700d518144bdb50cbdd73fe18e24a1f47d769cd097b
SHA5127f83df76b5fa87311157a5388440b2737197381a4153c0f3ede0774fc9dc545875ebb5f3c274fde3e428b0e8c067663fed95c25be8be8e8c2de97d1d761027f7
-
Filesize
27KB
MD582583acb95a791851f88d38726823703
SHA1fa7da649160bb78939193f159060d6bcede11527
SHA256b76cf107610560354caee4c9519b3e8a94376394a4abaa32fcec5ab1d83f976d
SHA512d62868ea81a124bb07a655c3f6be7723977171102ae160b48460c2e466f2206ea98a68b64cc8e5e0a8a7dac1fcb10ef7c7fbdaaa4b67a2ff6feeea368e2969f9
-
Filesize
27KB
MD5b18de93a0ab6c5150128c1ce85871960
SHA182639dc738bb9b9bdaf37b1e487b51517e819cbb
SHA256d598eb005612e0a84ebb5a6b38bb3b963ef10d3c97bc27d6b31d2a5225fc239f
SHA51284454597904b5c20edf356a706621f2434c70cf22edd2367b20d6d3417112c8341d7aa4e9b46a9473311727288298bbdefce3118838588082f92a6a348efd2dd
-
Filesize
27KB
MD5a77de8d46c5da2a1d07af61bee8923d5
SHA1752a6202592f979edb850f9cd48667cff85eea4a
SHA2565a8471a73dcf56c3e65ef855c6c559ce36a52c40f061902106ed9ee1c80600b1
SHA51276dd9ff39e8bb06583ed2547dd6f42b29346b2ddf9b4ad5aae19182e7f6b0aa491a71758cdf08bcee2f071ab477f6f22d0793ce5d41c83c267daf2a1823bc051
-
Filesize
27KB
MD580af740b5c50c78d3f9821f3e8638660
SHA1629c5ebb042870b650b6f78223b70ccf3cc39e84
SHA2566b30deee4522880198b706250c919c4ce2f8b63481489f309b7fe5014ee655d2
SHA512cba44d0d42292660a7a27f5b5f3781b353d4131d3eb3e4c74e08455f8dda64143b7757b2b0c62ac839984beecc4617a7e836f286de4d75d6d2ec458f334dfb3b
-
Filesize
28KB
MD51e959547bab52467f7c7bfe671ae2f20
SHA140f98aa0e71d40333e9b45ebfb18440e4a9eb0c8
SHA2566048c07a850c8378268d7331ed804ec2fbbaa0659553382f72a423ff738df9b1
SHA5123442ec3f25c2e9b0441d8e6dc2aeb8efffdeb646d8b1d2c0125490d3d59551d11a60827d0b7beb8fd1cb5c41af73100d44edfa01e5dd42b53d05f738a7ee538c
-
Filesize
26KB
MD5b6e391edc3d1a78dea08f684d06b1b24
SHA16167d7bf6df527354e3f4201510472b677c00bec
SHA2565351fc8c0e42c1c4e33b5a04c24109398bf5a025ada9379d9a7b408c0623e261
SHA5124fe94f41583f1d5638a59efdabaf44b32e1f83b0dc39d068261f7c1e663682ef9dea3e01466005faff9340eca75c0f2fa3ac65903133c82d44a5cabb0101cec4
-
Filesize
26KB
MD589067e8802d0ad17c733a647f0f68f39
SHA1f06dc0f692b894964c6a2884c1e52032f3f25c2f
SHA256aa80041ef7b479789fc61cc85c82a340d36ebfe40f849e914ca2a86332167e6f
SHA512307d443ee5753066051d907339e6c4de9b2e2b18f33c2fece7a6c78ac26af9d1ed40c631baf86e4e724e5825856b68ae58cc307b21a2c723f8ca783348824a4d
-
Filesize
28KB
MD5abd3a4a91ac6a253a658495fb7f6ea60
SHA1ea00d0f58a9324a9b33c1b0840a330d529df27a7
SHA256b4d1a7bc6fd4606b7dbc95d817202bd01493205daa10a930e2cc2b18d7604c73
SHA512da1d32215921f6127658923137ad735e803e47b7ec70cdc0bb98ef738a2ff568c6d652ec12cdd41de6b2d6ab311df948b88927da009172d246a9c353145ecb59
-
Filesize
24KB
MD55d91d3770cf8cd752253e5e0bd15082e
SHA1c039fed60ff86c3b7318b07f097b25be1ed3732e
SHA2569d702e95f6d914bef2fcb2a8eb796148f6c25762484ce9f9a29498a84c9890ec
SHA512f90a461894aaa711b49154dcfa7e18d05f2741f89007a868f6be705fc603ef9c65fda24d8431422b3fe1d4d329ea5a5e7e8566bc1bdec866b96e2d5f0acc5541
-
Filesize
23KB
MD5f8fdb56313d6154ceba519bfcda2ef09
SHA16afd055e09104abf4c2b53c05d1a6f7040ddab7f
SHA256ee2afb2574f5502f782de600edbac64d14947f40f930eeba2a126d706015f211
SHA512dc8d83d769aff1aec6bbf6fe680e76c764087869e4ad1606d89870a9e5f29ec1e7ca875d1f5f6368bc9f047cead3f7bba8311f9f10197c6e005b692216b9ad8c
-
Filesize
27KB
MD50de94422ac7e5eb02e60e9b23b61b1f3
SHA18051f13584a48cadad9d487941c5b8d6c382288e
SHA25695024ee97cbcb460b76eb3914a10f35f87632f5c845700b4479a4238cb2da529
SHA512b515ba34a5bc3d4923119f3699c30bf412dc017d6968e195eb6662e4dd548ef36c5b3bd0c4a603f99d6850fbdb0c0ec850251ff0a5947ad41d7d5cce2b7c27ee
-
Filesize
27KB
MD51d4c0529d47e3c533b8ca75f406a2881
SHA1d3d6d8d422df088260aa0c5159c657341446443e
SHA2562f7b1f2c0193166a5882f51d727967b52f7177e9aa0cad37bdeaf974eec12b64
SHA5126eefd37c80ed38ebeb58a8b1e4638645fa199ca8ec0f8cddc6204e32b16bb9ed8f572eb60f33203d9727b2a2f964b382813f6216261fe7c77c7551e23008a5be
-
Filesize
26KB
MD57b11c313b35d6dfdc9e924e56388e2ea
SHA157e801aeb1dfba6388a7a03b16c24a1bac577c81
SHA25615e79d9ac3c0f75ef5963af2fc8c0fca4d4ce78cd94d6ffa2551726c8ce0d0fe
SHA51250c91ad0ca6f04bb597ee0ead44208fbfd491e603740772ee5f1ec3f527130171c3e3c0cf682030d1d70b349c5969305de005036f7f67eaf27c41118dcd6d72c
-
Filesize
27KB
MD5423e2be502390f13d1b2d97e10c15eab
SHA12b0de5cebafd5eb9004c2635c36f66feefe798e1
SHA256b77fcf90e7f5381fa319802f434ca5dc9ee6ad0cfead4afe59f3a9dac7445c5d
SHA51277a329e28604e12d4389ad17fc1191c23883fbb8344936ebe27345d530c4635de882c6fc7438dc93a55d348946085b74e2dedf28535d97f2024c3c4eb1455d4f
-
Filesize
22KB
MD50ac2cab38e96067b2badf2342bc3cf44
SHA18647ee323d0fe4fb7b56172fa0ebfeb2d991d4dc
SHA2569089b103d1725f84e6c068d4885695953cc93570251d56427801f0e1d5f9fa57
SHA512bba32d2d9a293766259d9f6e0b2e480c9263fee8656eaf1af3796f4743e428c777db69d1e58ce74e22a8bf560cc244d9e75f08fff9ff4b2b08e8dadc5686ac44
-
Filesize
26KB
MD5dc923f6292b04d83706ee61341ca7ef0
SHA1b343284e4d574a36139c019d644897d62a29a5e3
SHA25691ba12d89d5e651f5b70d8d5142f5f9a6de1783a544c71ecdca15d7254fb6121
SHA512d1f0d59296238c360de803300115f44fe4084ee185a23d90892fad35c4476a87d3c398dc802b273a76f017e912eea5624712df6f7a8164a0ec54cc0ed28893c7
-
Filesize
29KB
MD54e21cc5558f9b019636ec9fed354f678
SHA1111361a33b0dd811a9c3ec3b7c65f54f421420cd
SHA2568b0f4f465da08fa82d98c8af1cc22716c54818161bc258d763810c1ad4a1dd77
SHA512c370c6a1e0e3e25a5f2797658a07fbe2de28542d8cbb37abdea9440ff841a52df630e11784e41b03da99a657886486845eebf2b91e0892eb87ce654f33032002
-
Filesize
26KB
MD5132cf2f99e786032fb2ee18a7f255b1a
SHA1862c66cb074e88d4498fefdb3ed67e30682b2fc6
SHA256d35000bea1d48ff2301376168e8e5a7acf57ff8371f158dbf93b0dfaf053b242
SHA512ee394b124e51053239c21570c3dcdd106bec45acea960261d352cd4238291c350fc22ec7e11bd0f9fc82b0dcf2f71619a9630bacfb1d621eb526e92d4b2fdccb
-
Filesize
26KB
MD5450d253ce2c3c620981c05fd59288a27
SHA13fc3325e700c83dbd7ee86c8a2547e1f90f43e37
SHA25603c74a2122241e6793ecced16a940f8b36935ee952ef45b36299de61d4b90e81
SHA512a3734fea4463aae29fb7d6e23e8feb81ffc3ac64a55c901e530a9bb18774325d69aac8dd829fedeeca66f8b5ee9d772643524e0ea5fafef3ae99a3d09d4cee6f
-
Filesize
27KB
MD51aa89c4ef80ca5e2be6ce45a4158ba8f
SHA1e0747961862ad0cbc83261d2a4180d5b5341f08c
SHA25698db378e75eda360fbcc74e22111aff9771fb707d081915eb46793b5b7eff7e5
SHA5120f2202a4c38b23c49259e00e103d42fd35f834cf7fbedbe8889b044725959763cb52a1c62b62aaded3ae7a4261a11cdc5349f0e67b73ce2e3647648220e692e7
-
Filesize
26KB
MD56bf8e6b2e028a15663fd2230d81132c3
SHA161030e4adf68ae5e840e7773592aaf13f84c5c02
SHA25648572b116d002c6e956353b2dd90be740cbafff702cb48e42bccc8ba3716aa91
SHA512d1508193dd2c196d133b874db0445aef4310cc8f7c50dc70fd82f360a9f0f0313c658c1bf58e9fb511847c8a9970bbef8b81d80717797f895b0a238b076bcd02
-
Filesize
27KB
MD54106a9023ae77d4041e44910641f4ed0
SHA1780fedebe09ea061fd90eee42a2f674bb63be6a1
SHA25613101960ca99c29e3ff0929a049f52d8451e9fc51d10c781057d8d3659866819
SHA5121969955af43887b225be481910eab24185f582fc7c04650322f5cb0fa81f7472e69f46c4c3feb5af2b29f1219eaf29eb38ecf59f51973f28c01ce752f6402766
-
Filesize
29KB
MD5829f540454981ceb53f5212e8f07898e
SHA1544162d29848c91882bbd93d35353efe1b0697a9
SHA256f5679de7da75a40b4125b5eb31d6c466e6180e9567b828f980b14e2dc279cafc
SHA512056cf4f010a9f38662a1a1550e31c28ac2aaf454a47c8ecb6a929f17c5da21853b2eb9145f39cb75600677d6296bbe85f75747aa6d9a2e0beb09c78802a0c897
-
Filesize
27KB
MD57809a2ae4daa00b518d4441fa38ead1f
SHA1191743ac6b9b07677e96abc74457e20482bc9703
SHA256c29709e567f89ae6ced8352ca979b6d7b8a90240e7ea37549e13bd5bacfec054
SHA512e8cc5a3db7541e05e26e5a270b84636ab3485c3c9044721331d7d69745b68f42bec597de96d768559e2b402a284a515afac68579735c1a3e74d16270df369c93
-
Filesize
88KB
MD5fa596790375d57d9e97dec6d065b782d
SHA143456060c0f1a050cdf5bd3997a85f2ac1f4bb7b
SHA2565146c32cba32f89740931a723fa3d82bd2ea8978a8b3b546f6e22c07d86c775d
SHA51295b6a696a7a0c427235199e6cd166462a76fb374b7eb824f016b90ce677382a2da958e01ffbd6674b3b43c1762f36b5fea7203f5829c9007492f08163ee7346c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5406806e5c5f66393542fd9ed826ccf49
SHA176c5e634d95aa2f2aee7f4827150317825c0f482
SHA256469540a30a66daaed26b5bd8976224a5aa7d06256854d403161f256dff913257
SHA51248e3d55e5157d2360b6ffe45dc781103a331655673d995f735b8e8a76465b0a798d4af180c2b88d8dab549126b3db9c2a5a340c0481b6be73a2efd980bcb49f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034c0bc5cedcc6f0aa2412c0ef791736
SHA1b3827a78343e67b7c0c17a86acf3a55166e641b4
SHA256b74ce07605cd07a7b661ca069d50cd89a3a9001697220f2ec52de79c8fd67eb7
SHA51288452a9de1971cee77d0694bff7383dac99dcda982987ad1acf35d63e529edd5ccc86c4ea3eb1c45401469a7b5b6268c3d16810610a7a65fd43d69ccf1ed8774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db75cf0c8c3b8b1193c5cff04d023dc6
SHA1097b1a97f4102ac209ac22745a52f7ba358f2666
SHA2564a452ba7d3178c4ef7b93e22a43ba4d8fb9f7b374135c66e6e93087dc98ea162
SHA512f1c4c410c05a4640e7f779c7552b6e234373bc6efe04b53a54516fe8570b430e1b53370086a68d283b9bdf366e3ff64a9978d3290d7241932f157f35038bc187
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561cd360e8ac9e584c036dbd16594d491
SHA1861a8fbb51f827f98af4eab9c95a98c16cdd3eff
SHA25632a3792c1ead6b7a302680ab2a7f7de2b984a345168a53706fe761f5f9e997c8
SHA51228a3f7d95a4923af147539945e684cc03279fce3268f046dc074966dbf9fe2ee27df5a17c1a3b513cfcd4c9a24cca3a179455bc7f14cd4cf76090559d7246356
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53aa12b31f985043b4cb4a90b8eba1b17
SHA1560a55b5c47325c5e5fdb38d2532e26a54c83811
SHA2563c6b32e746b1e08d6a7d68d9705679f9cc3ccc5537d03b6a3776d09f3fd10c4e
SHA5120c528fd4f5b5f31e1e435d226100410f77dbd41dbc32f6ff23a03551a553d72d60b85214baf1f59bd15d1f6004a9097ba5fbf082c81bd7b69ee34d286d0fb485
-
Filesize
97KB
MD55dc62bd06dab265e3e44c49da530ff84
SHA14d3d4f1e2dc3ac33f073922b81013029b0bbe7cc
SHA25692d3ffb5f0d1f6e14af52f444f4a365e3b63992a31016d735fddeff0503d7600
SHA512f43d24e22d01b65e352e7b76b8bb88e3e0d1a7aca6adae139ac64605fec8aea5dddb9e390c54d12f6edb095dd6a526eacb3e0d95c29fd45c5779406a9c4e5d50
-
Filesize
26KB
MD5c97f93ffe9d5e3e5bbc04b168650cd00
SHA1fb035621aed66c60271df3111eecec2d178a021c
SHA2566c9f604468d01e0db22903555ce58fba91b3bc1168057bc3cb0d056c4c785ba9
SHA512b6c86093fb142af4c47b478920106eae03552ada516429bbdb249e51b4caa8a7ed49c741c8bd469c853a2e36f99b5c6a79a7414e7a7848d6027351216d6b7f27