Resubmissions

06-02-2025 15:09

250206-sjg1lazqam 10

31-01-2025 12:44

250131-pylqjswkbw 10

Analysis

  • max time kernel
    892s
  • max time network
    535s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    31-01-2025 12:44

General

  • Target

    $TEMP/MicrosoftEdgeWebview2Setup.exe

  • Size

    1.6MB

  • MD5

    b49d269a231bcf719d6de10f6dcf0692

  • SHA1

    5de6eb9c7091df08529692650224d89cae8695c3

  • SHA256

    bde514014b95c447301d9060a221efb439c3c1f5db53415f080d4419db75b27e

  • SHA512

    8f7c76f9c8f422e80ade13ed60f9d1fabd66fef447018a19f0398f4501c0ecc9cc2c9af3cc4f55d56df8c460a755d70699634c96093885780fc2114449784b5f

  • SSDEEP

    49152:2iEx3ZsKgbBPetIhztPqpP0NxVjRLhlcoRZ:2issKgbBOIhzV3RhlcoRZ

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 16 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 44 IoCs
  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\MicrosoftEdgeWebview2Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\MicrosoftEdgeWebview2Setup.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
      2⤵
      • Event Triggered Execution: Image File Execution Options Injection
      • Checks computer location settings
      • Checks system information in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:3572
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies registry class
          PID:4168
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies registry class
          PID:4708
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies registry class
          PID:3956
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QkU5RkZCNEQtMjY4NC00NTcxLTk1M0UtRDk4MUQxOEFDRDIyfSIgdXNlcmlkPSJ7MzRDOTExRUYtQTUwNS00MkY5LTlBMTAtQThFQkRGQjI3RDk0fSIgaW5zdGFsbHNvdXJjZT0idGFnZ2VkbWkiIHJlcXVlc3RpZD0ie0FERTI0RTA4LTA3ODktNEY2OS05NDFGLUQ0Mjg0RjNBMjk2Qn0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgbG9naWNhbF9jcHVzPSI4IiBwaHlzbWVtb3J5PSI4IiBkaXNrX3R5cGU9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDQuNDUyOSIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjEyNSIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjQzIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODYxNDE3Nzk3IiBpbnN0YWxsX3RpbWVfbXM9Ijc5NyIvPjwvYXBwPjwvcmVxdWVzdD4
        3⤵
        • Checks system information in the registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:1464
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{BE9FFB4D-2684-4571-953E-D981D18ACD22}"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1036
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
    1⤵
    • Checks system information in the registry
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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
      2⤵
      • Checks system information in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2040
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FA8F2125-11A9-440E-89D6-0C5EE3D0C7E1}\MicrosoftEdge_X64_132.0.2957.140.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FA8F2125-11A9-440E-89D6-0C5EE3D0C7E1}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FA8F2125-11A9-440E-89D6-0C5EE3D0C7E1}\EDGEMITMP_015E7.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FA8F2125-11A9-440E-89D6-0C5EE3D0C7E1}\EDGEMITMP_015E7.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FA8F2125-11A9-440E-89D6-0C5EE3D0C7E1}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
        3⤵
        • Checks computer location settings
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:324
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FA8F2125-11A9-440E-89D6-0C5EE3D0C7E1}\EDGEMITMP_015E7.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FA8F2125-11A9-440E-89D6-0C5EE3D0C7E1}\EDGEMITMP_015E7.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FA8F2125-11A9-440E-89D6-0C5EE3D0C7E1}\EDGEMITMP_015E7.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x240,0x244,0x248,0x21c,0x24c,0x7ff76327a818,0x7ff76327a824,0x7ff76327a830
          4⤵
          • Drops file in Windows directory
          • Executes dropped EXE
          PID:1488
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QkU5RkZCNEQtMjY4NC00NTcxLTk1M0UtRDk4MUQxOEFDRDIyfSIgdXNlcmlkPSJ7MzRDOTExRUYtQTUwNS00MkY5LTlBMTAtQThFQkRGQjI3RDk0fSIgaW5zdGFsbHNvdXJjZT0idGFnZ2VkbWkiIHJlcXVlc3RpZD0iezQ1QTFDQ0MxLTcxNkItNDM2NS04NEMyLTU2RjkyNzdDNEFCMH0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgbG9naWNhbF9jcHVzPSI4IiBwaHlzbWVtb3J5PSI4IiBkaXNrX3R5cGU9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDQuNDUyOSIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjEyNSIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-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-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-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-PC9hcHA-PC9yZXF1ZXN0Pg
      2⤵
      • Checks system information in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:3580
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler
    1⤵
    • Checks system information in the registry
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4064
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
    1⤵
    • Checks system information in the registry
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\MicrosoftEdge_X64_132.0.2957.127.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\MicrosoftEdge_X64_132.0.2957.127.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\MicrosoftEdge_X64_132.0.2957.127.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Installs/modifies Browser Helper Object
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3724
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7a70aa818,0x7ff7a70aa824,0x7ff7a70aa830
          4⤵
          • Drops file in Windows directory
          • Executes dropped EXE
          PID:240
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          4⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:4784
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9CC9B855-A050-4473-AF32-DAC623D0A1CD}\EDGEMITMP_46C02.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7a70aa818,0x7ff7a70aa824,0x7ff7a70aa830
            5⤵
            • Drops file in Windows directory
            • Executes dropped EXE
            PID:2296
        • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
          4⤵
          • Drops file in Windows directory
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3020
          • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7130ca818,0x7ff7130ca824,0x7ff7130ca830
            5⤵
            • Drops file in Windows directory
            • Executes dropped EXE
            PID:2424
        • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
          4⤵
          • Drops file in Windows directory
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1948
          • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7130ca818,0x7ff7130ca824,0x7ff7130ca830
            5⤵
            • Drops file in Windows directory
            • Executes dropped EXE
            PID:2948
        • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
          4⤵
          • Drops file in Windows directory
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:928
          • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7130ca818,0x7ff7130ca824,0x7ff7130ca830
            5⤵
            • Drops file in Windows directory
            • Executes dropped EXE
            PID:2840
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7REJBRUVGRjktQTJGNC00RjQ3LUIzNUEtMzE3MDI5MjJEQTMxfSIgdXNlcmlkPSJ7MzRDOTExRUYtQTUwNS00MkY5LTlBMTAtQThFQkRGQjI3RDk0fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins2QzA2MEJGMi05MUFDLTQwOTMtOEEwMC1FOUJBM0M0MzVFQTR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-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-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjgwOTU5NDkxMDgiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMjM4MzgiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjkwODUwMTE2MTAiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIGRvd25sb2FkZXI9ImRvIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy8yYjExOGEzMS1jY2JlLTRkNWYtYmE0Mi0zNzNhYzMzMzYxYWI_UDE9MTczODkzMjYxMCZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1qRjA4RG1yc2YwcUhxRlNCQVlicVZISFUxJTJmbDZvR3c5ZDMxM3pIRXQ4SDZGem1PZ1c2M2ozODVMWXdMVGJWWEtsWHdCMGJlVWp3dGdKRmkydE1ZRHh3JTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMCIgdG90YWw9IjAiIGRvd25sb2FkX3RpbWVfbXM9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iOTA4NTAxMTYxMCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvMmIxMThhMzEtY2NiZS00ZDVmLWJhNDItMzczYWMzMzM2MWFiP1AxPTE3Mzg5MzI2MTAmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9akYwOERtcnNmMHFIcUZTQkFZYnFWSEhVMSUyZmw2b0d3OWQzMTN6SEV0OEg2RnptT2dXNjNqMzg1TFl3TFRiVlhLbFh3QjBiZVVqd3RnSkZpMnRNWUR4dyUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IiIgY2RuX2NpZD0iLTEiIGNkbl9jY2M9IiIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjE3NzA3ODM1MiIgdG90YWw9IjE3NzA3ODM1MiIgZG93bmxvYWRfdGltZV9tcz0iOTI5NTMiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iOTA4NTAxMTYxMCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE1IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI5MDk3OTgxMDA3IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0iezFCNzZEOUMyLTU5RDMtNDE1OC04MUY4LUIwMDUwOTU4MTBDM30iLz48L2FwcD48L3JlcXVlc3Q-
      2⤵
      • Checks system information in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:4648
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
    1⤵
      PID:3272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\EdgeUpdate.dat

      Filesize

      12KB

      MD5

      369bbc37cff290adb8963dc5e518b9b8

      SHA1

      de0ef569f7ef55032e4b18d3a03542cc2bbac191

      SHA256

      3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

      SHA512

      4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\MicrosoftEdgeComRegisterShellARM64.exe

      Filesize

      182KB

      MD5

      8f7c44e937ecc243d05eab5bb218440b

      SHA1

      57cd89be48efe4cad975044315916cf5060bc096

      SHA256

      bc3cdd57a892ce1841787061e23e526ad46575460cd66c1dc6dcf0f811563d59

      SHA512

      9f0020b81d1945fea12efe1a0a5e59caae4a01432429e065e35c73b15db873253094b2ff1f8903a348446dfc9c9fb658f8bfed8c25bc56e8b546c16304a385a3

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\MicrosoftEdgeUpdate.exe

      Filesize

      201KB

      MD5

      70cc35c7fb88d650902e7a5611219931

      SHA1

      85a28c8f49e36583a2fa9969e616ec85da1345b8

      SHA256

      7eca199201273f0bcff1e26778cb535e69c74a69064e7759ff8dad86954d42b1

      SHA512

      3906ddb96b4b1b68b8c2acc940a62c856e8c3415a1b459f17cf2afc09e05751e0086f8e4e5e0ddd8e45cfb61f811bbe4dd96198db68072b45b6379c88d9ea055

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

      Filesize

      215KB

      MD5

      714c34fe6098b45a3303c611c4323eae

      SHA1

      9dc52906814314cad35d3408427c28801b816203

      SHA256

      fbf495968c4a385ff0790e6b65d26610ef917a2b36a5387eff7ae79d7a980ac5

      SHA512

      68a65496275a1511b2d3bd98ac5592cb1c1eb9df0448471a8985cb2f458c66163e6d55545940de72dea80118ff8ec7ba0ad3276f51095f55c1243fb9f3311345

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\MicrosoftEdgeUpdateCore.exe

      Filesize

      262KB

      MD5

      c8b26176e536e1bce918ae8b1af951a2

      SHA1

      7d31be0c3398d3bad91d2b7c9bc410f4e45f37be

      SHA256

      be6ab7dd506e44a0a9eb0dd531929bd8aa0796d85a0353e6944bc6bf1630b717

      SHA512

      5a362cbabebbffbb0797646576b65e2934a3b0a30306d74078ef2448fea3940df14f0b8f149691a100cc170bd548c9b420dcc8aa41eb1ea0700c9f155626c565

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\NOTICE.TXT

      Filesize

      4KB

      MD5

      6dd5bf0743f2366a0bdd37e302783bcd

      SHA1

      e5ff6e044c40c02b1fc78304804fe1f993fed2e6

      SHA256

      91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

      SHA512

      f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdate.dll

      Filesize

      2.1MB

      MD5

      40cd707dd3011a9845ff9c42256ea7e3

      SHA1

      4045ae709979f75b1cf32142c1137b4be2ab9908

      SHA256

      9f4c7072716e0be1be08207a7024a5e41162e288e677d805be8e5469a8bd4909

      SHA512

      bf1ada8a0d9c3d9f39fb739d05fc4a61f0a7e0e1bb5eb44e6f0f5f58381ee6d80aad89dbc3211b70a6294fc69d5820c70fa8488ef2f793a3710ecff5ee90422e

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_af.dll

      Filesize

      29KB

      MD5

      e91e279752e741b25cf473338d5aac88

      SHA1

      2b8ea61868a26408cd1dd351cca5139a046bbb7b

      SHA256

      5635ecedd84330f070a9d6f4cea8b8b81e9dad8592d336ebfd236b7d67e58acc

      SHA512

      7404cdb82309351a21415b045fc7165137492aa262d00fd0f74bad4262ce10e86c3bde1718c38757b7133e41d044035e731c52cccea285d659c4a570776ae535

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_am.dll

      Filesize

      24KB

      MD5

      bd175cb3dfc1d43944223bd5d7177539

      SHA1

      193623dc372937f31a545344d340360665b8d69a

      SHA256

      bf0d65cebe0c29f15a616a0dda2f1a414e3f96fe7a28ff7876e811855be6621b

      SHA512

      f5742352852837ce16f3cf1655e4d41e301f0351b68c7346457978aa310b95b69b1070741fc2ab8be5ff449f6fd44660df3b15811630efc1420ced1455fcaf5f

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_ar.dll

      Filesize

      26KB

      MD5

      42015aafd53012b9c8afa009ee501fa0

      SHA1

      c1fc049feab4fb4b87faf96c31b3d1160f1c1d39

      SHA256

      86858a1807e6cf0b91565ed7a5a15db24720b0a7f60ae41e67dbf9faeb6ef2fa

      SHA512

      9ce323da000b51480ee35973872fc7d181e1f69e820ac737c62c36eaa81eb99965bae39fdd394459adfaf8f746f5dc3b768015e01d8724e2d0718f5286c29389

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_as.dll

      Filesize

      29KB

      MD5

      8a54873d54a41442b62f9fea9492d3a6

      SHA1

      fb19af151b15f4bdb7a555924f1835b0337ff1d7

      SHA256

      af9bdd050b27b8883f72e3596179fe244a6a2e3545950c82889aac7198cf3c32

      SHA512

      7cc0a578586853afd027264c3898cb1460b23a47eab9c79e064b9f327fbdee6e3f9bc7043a5a76a710ada05edae4ac0b47529be3ae67ca9b5afaaa16151797c7

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_az.dll

      Filesize

      29KB

      MD5

      e47db9afb646fb31cc8650837f487134

      SHA1

      f304204c908ea1fe2bcaf76040d5d1f13f1e99e0

      SHA256

      4e03ed7a538793fdcd4c646c62ddd278c46911099e6485bb2644a17ad3a8ecf6

      SHA512

      b2b01c86c78ec3450635c0fdef9666ce302600956e8def3bb02d205ba2a11b3d422520a64361c6f666998bd82b5557ec96cbcaba9e1b712c756e75128c8f9bc0

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_bg.dll

      Filesize

      29KB

      MD5

      5887cd452245dc7bd0389a0ad5db98e0

      SHA1

      6486d0ae59ba338e8bce87b438f86691e955840d

      SHA256

      922a102cae4e74bfc0b402bbb136116eddc71a8adcf7f1268d48006c858d1d60

      SHA512

      0720aaebca04e84d8af2d7b153b0fc51e5651cf664051b8c4b44159ed4c6328eb237ba4f4c97bebedbb1a45ca5c1d0f249cdccac76c6d5619e0e761d12aaaba1

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_bn-IN.dll

      Filesize

      29KB

      MD5

      6aab6d42c7b7a90523a3272ad3916096

      SHA1

      cc638bd6ec6478734b243de2daa4a80f03f37564

      SHA256

      67180722f255985e849ec3ab313dcdc0bf2834bad7b6163a0b14587fdf4b4c66

      SHA512

      ebc17e0ef86b8e5bb938040ad78b299e33d1228c730666526aab27e464626b71ea900cb6dbe074bda5e42e77cd569b083637e233d757b8b0bdee2df2e0c509f2

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_bn.dll

      Filesize

      29KB

      MD5

      abc20df0545611a835dcd895d2832cca

      SHA1

      39e90363156c461e5aef64a714ba43cc61617ee5

      SHA256

      75d8c2e259b4d113c0967615af61e8f54eafb49c498767291627faae9fcf504b

      SHA512

      732f31d175f08c5c69b9cf540e2b0e72b8986b44d1ebfdf0e56eb56b68bea64e6446932a546f1fc30dbbbad4ccaf6bc935177a6348c5280ef786d6d8dfa7b325

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_bs.dll

      Filesize

      29KB

      MD5

      327e92c7a55ec996ce09dfcf8c89e753

      SHA1

      2a51c99519257ddebf0d8280d46e0c0fd416e7a5

      SHA256

      2b61608a7aca43b7ea4374b79acc6e15deb382eef0fa8751c8e57e03e061cab0

      SHA512

      ac3ca0f66b899759f0d23ba64ff291486edb1e1d3bb626ad3efe3e3a6fd2aa4081411546e4849ff1645dcd26161f35defbd8442278e6d6f66311780c60474296

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

      Filesize

      30KB

      MD5

      e0d2675c6de1b8d4e5e463246529a304

      SHA1

      132dace535b9cdc7a4e5f6137407d5becb23c4c6

      SHA256

      4af082aa0193b9b15622eba1f6165d0b6032b4dab17ba16a8a9affb267ebec34

      SHA512

      afafc1ca5abc636066ee98a6c68356d68f506fe3734a4b3e68073eed1f2ddc51840464e91d3cd3b28648fcc26b9457ef6484100f9543739220ad75a9eecb1e90

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_ca.dll

      Filesize

      30KB

      MD5

      bfac1c3869df5375aedb24458cf321b7

      SHA1

      848232c155c7dca65f6cb22d27a72f2c78e964d8

      SHA256

      a9f5cf25b9512e1d30ecb769a5eeb694888b72b7f05b78c417814802c5aedbd7

      SHA512

      732270e8e8036f8ec59c214ca3804c6c67420bcf5fd633347c764f90b06b25fd73a0c7aa75ec42461ae3d3570fbfec5c5a7eee10e8d494b805b7c7e0d4aa227e

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_cs.dll

      Filesize

      28KB

      MD5

      c5681c3b4a8145d3b6cbf51e3f0b12fb

      SHA1

      908a0546ce091906aa5e7728660b838bf1e619e4

      SHA256

      2b47a6c19ec492149eca6afb03ca82ac1418a727f35cb641bce9f22136dd3459

      SHA512

      06c850119b5199bfcec41abe2b5e6929e0a960b69337c6048e0dbdd37ca56401885785de96cec235093a4d6536d9de55178a4c739a6ebd5e34514e12635b6d31

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_cy.dll

      Filesize

      28KB

      MD5

      3206ad1fbe5c53d278607da7767b1996

      SHA1

      6964da8787c299e71f8428b22ed8ff6909912034

      SHA256

      9ea2727ca92f74c7c35ea22287f13ef262241a905567b908e2860f19e044a848

      SHA512

      38281ab3590a2e6210d1d9c0d1f5a4a3ef19772065f87d94570bb448fb83ea0579aa8bac9e94b05ba2b6bb2bb882f1be6d45c921c52ca2f0608056512fb3338c

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_da.dll

      Filesize

      29KB

      MD5

      7f0ce1bf90bc88d5fb4d32d359063868

      SHA1

      59d8ba8397c325ed7b2dcd6a262906795549af6c

      SHA256

      1147a2cac674209b9087f7c81c09000a2177bb7d42d0d518e3c93d8a9ee2d7fb

      SHA512

      5cd723cad43388c7e2db4452caa20c07e73a676c82bfaca27a293ab70acdbb115fd82c7a65dee3e6c6d8969c4b99e90ce832760b6f7ab47e9a4f631ce53813d7

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_de.dll

      Filesize

      31KB

      MD5

      d9eb30f1811161a6903901f1ff316ebd

      SHA1

      7ce5e34af30e821a0bbb7074da57636c1be15d6f

      SHA256

      73b4fab09f7f224b2527dffdb617b7f852c78eca8989d493ba2fa2201b1becf3

      SHA512

      9d2e2a44fd027c30836254de1ec99fdff4bad2d3488f25d88a9f80f5f994dd5c660903dd3586dca85fa9e1a269ac8c51b5a060156fa65dc1df0d8137bf878c82

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_el.dll

      Filesize

      31KB

      MD5

      85dadb4cac0d76fd821346c411d5c3d0

      SHA1

      999dc0bd7250f71465f5098dde263a7a82ba7b3c

      SHA256

      1392f864c486e4b4b6859d900b12182f5ad5ec90e183808ab7ed0049aedd807d

      SHA512

      649833bf473139db879c2c7218567c49ad6436e3af1efdc7d9e9d48b8d3347e2bfacd6140a59d7973fa9df9cc9cab0e042bdaa7dbf32846bdf6b812b7ecaef07

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_en-GB.dll

      Filesize

      27KB

      MD5

      5d4f7ab307f71d761a7f0e193f4b2ca1

      SHA1

      a3580268a98ad5242c7c56fa759f39276b6149de

      SHA256

      e2f0a11b5269b08261397e2ba8e2a5e44d5bf2e042a1cb91ad395d7c274b44d8

      SHA512

      307c489db833e4f2c74ab5201909ad2c53c691e0409f5abc29540a84d1c5ae146a072fecaa0ac886c83e4521fecc58ae5b0ff4331f3b37f39114d1fdea731021

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_en.dll

      Filesize

      27KB

      MD5

      cfb71031c56d9e8b9490d01fbe86302c

      SHA1

      9e11ecf5efc88e0beee1db46620bebc73f86dd21

      SHA256

      b18e14d0e24546193822b83996c5b311500ca213beb4d497cbd1dda9dac9db2f

      SHA512

      9cf993ea53673e416eead78d45a6d700b74001b69b1b987d479e77348ea8dc151f4ba6d6b1220db21ce792f9da51b9c83f33663621f9350b848a766ceae92370

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_es-419.dll

      Filesize

      29KB

      MD5

      b25a10d8b739ac2eac10b7b7fc7a61d5

      SHA1

      ec993d8113e4c0a4a1b36920a8991521e4f7eb57

      SHA256

      cad0cef66ad1097dc11e6396d0a0fb11ec1734acfde15e9eae402ba0d068615f

      SHA512

      315971e819d2c3dc5fc30ffe2275c3608125f1e4f14dbeb39aa0fd014291dec0c5efb3e02628bf345c92ea0faaa38e30d4ed5c3793995afff9cb9c933f234513

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_es.dll

      Filesize

      29KB

      MD5

      6c3d219e2169f5566a8bed031b21bdc4

      SHA1

      073a61c02b87e37e87fd3c8e609a56828ec49a47

      SHA256

      3a841555813f21928fdd45003a3f694a87074869b001b3e063eb97ad35d8fe17

      SHA512

      2b57d8325ada86a1ea01df0c7d0122875450f913bc8c21d8a7dd44ac7037a170e2f4fc92c13c58980aa9371a7bdfdfee34b9e188e16ad0b89181f7f901467152

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_et.dll

      Filesize

      28KB

      MD5

      27d45a84e2b94a60d5a821597fdad6dc

      SHA1

      2125fe5fbaa2db280a859ef3a7d27ba21efec036

      SHA256

      65f3cd75a7121dc3d417a9c3180bb52b485b5e7d0ac3b483fa355d13515f970a

      SHA512

      eddccfeee69b7a53adf32e72724ec8ba1668d1927322ce61429a4c663cf3d17e3f6f59fe1930b96f78faa70d30edfd7845ba53cc161f06a4e67ad43d11cd576e

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_eu.dll

      Filesize

      29KB

      MD5

      d8323f3db20d104441f548decfd022ba

      SHA1

      de7f58b9ee7cbcad73433a17ff55385fd7e91035

      SHA256

      d07d8eb066e953af02a6e3a160232a73c1b66bb54d93d6b2ebc1557d1d322358

      SHA512

      7de3a803131086c3368d4acada0b6a29ef4ed4102a151eb000056c233da4853c97e394c98d6fd856714758ee17a0cc4c3df061a1b5d2b2b3e3bf95447bb729a5

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_fa.dll

      Filesize

      28KB

      MD5

      6ba182cbb744541288629a2464ba99e6

      SHA1

      366751e425128654514dc82112238a7d6f4c9908

      SHA256

      cca362dd297b8d8e20893cf4da8cf9efc9848f97a04a9d69cabff67ae947607d

      SHA512

      ab3da91d7ab7150100b580d7b25a5fe9cea67affb1c4ac9e479b70e2d17ebb14a0745bf62ffb3792b8ce4cbea130cbd0012053a5dba7930252e2c09b763ea658

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_fi.dll

      Filesize

      28KB

      MD5

      e7a774a7b404ab800efbdf7ea52e7ead

      SHA1

      3f0476821281614b9ee32faa5c534de5f6dc21f9

      SHA256

      1e1f09beed91a6a84535a1cf2b4df5e416cbbf785546f798d736009e31f95691

      SHA512

      85091f8bf809e88e248f4a899682f15586a083d1bb94cb5674da0e463716fa927ebef578519b653ac4ced381f98c4cf7a409c1ed52927dcf7fce4813008ce900

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_fil.dll

      Filesize

      29KB

      MD5

      1223e486deb013055cb0b7729681b9ed

      SHA1

      b5b43fa89f066a9b6ceb47389c05b69ea6a784ba

      SHA256

      fae283a78757cdc548c728a38cb041db4ffe538c5ee7d2aa2f55e3469f95fa25

      SHA512

      8862d2f4778bfd0659dcf9dfb992072767af30dea46b34d626580ab8183a765d0c0f95a7070f0aa36e694d9e559f843672000aeaa4d8abdca60ff83da5a2b857

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_fr-CA.dll

      Filesize

      30KB

      MD5

      9fea64a22d045d8edc38a9b8480a9c12

      SHA1

      e3342e26166a43a21729b8aadeca653c03dc0528

      SHA256

      2f324851f0ccd101884b78fe1eb07c2da2932a68015eb8cfb4c801e288c8771b

      SHA512

      a3601640cf961c88efa476125a71786a109d23355922eda45b5be8824ccce650d703546c5c8c281308dce208edabbeea5cbc3b44ed678d9d36970c4e5f236c0f

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_fr.dll

      Filesize

      30KB

      MD5

      498dddf273f0f2973b1c4581e820f10c

      SHA1

      aa048015a3ed6ebf9b4848a9cc54beb5e39eedd7

      SHA256

      9ec8cec72404794a2b2a738502c7f531d976d8c99a57d2b5d2f0f2e818e35e04

      SHA512

      3596b20469daece28496a13b02ae0c1cd9265fc0046e1fffc384b8a16a4869402831386679c3e9cdfe03903df0b191d2fdc04cc531104c9c0d84bef24eb4d60e

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_ga.dll

      Filesize

      29KB

      MD5

      81d35302b31bef2a99e154eb64abbaa0

      SHA1

      ea72f2aa526ea299d5515921fa0ac8f502ce3cde

      SHA256

      0133af05b669f957174a22b0b568a17a9bef1e387f52ae157766fae42d4e647d

      SHA512

      4d1df9684e7247ec0d8fbfdcfdb6ac5b2811de649c5b7ee4a20e5733307cdf5855ff767ebcb12ba15b33be58d82bacf9a02522126d927304e11f8e64261b46bc

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_gd.dll

      Filesize

      30KB

      MD5

      2e88f4aec46a293b3ec9bca2d7d2fe73

      SHA1

      ba34b9635832b2704942d7cd8578c8d70f0ffd2e

      SHA256

      f7278ba46204bfa387eff0e72fb2a8dd32ccea154fb268a8c39b03ad5334cf38

      SHA512

      b7f655cdaa3a34a8e0e00186cc49986cf283785a133af87ae47c3a3614f0d15d5b51b4091ff33bd0fc445815665edd37d378a9665d3831d2281b0bf6cc933c87

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_gl.dll

      Filesize

      29KB

      MD5

      2dcb17e8da6ed1a62a53029940592cbc

      SHA1

      b12941091cd1a554cd23d38dffbf75ec8ff57848

      SHA256

      a6770040c2f93ffc5c542dcdb1e7ea529d6036920957a9709153d80d360b178d

      SHA512

      0c82b39c7128d81739f64346948784c60d2cc409b637d5ca79825ef12766c10861ac3c119a5f232b12f52e50d3ba6818532968c75fbf455e75bd3be83c931f10

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_gu.dll

      Filesize

      29KB

      MD5

      571b69e1a8f9cac5eca53ba624aae924

      SHA1

      89798cdf858a4ee42ab4ffc01055c0463b6c4c0a

      SHA256

      37e67d7511d261ba1e022c9019d1b223d6d092260f97b471fbe2259ac5af6d3b

      SHA512

      961834f77c2683332b7a650360c09fb08e7efedf4249e48662b9a4fb9534bdba687eb9320da1a3aafe6a9c30d624c4bb94b55e1bf086a970354df61f2065e181

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_hi.dll

      Filesize

      29KB

      MD5

      4e8b170283c3f3d182eca7ce97e71a08

      SHA1

      93d86d961014b12c1a376effb3c568318db1ecc6

      SHA256

      0eb7739ad2863ccc13fa5cdb805189634728a7613918cd54bfe53a06d9c26cf9

      SHA512

      76a384ede88986c03e659c61e5409446bb472fa50c2e2e6f6e907f74e675ef0c5e932d950733ee6dc0c167881bc948d7ba9771bb77f31db3fb540277afb829fc

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_hr.dll

      Filesize

      29KB

      MD5

      54df61c0431c61851d8b61427f2cd68e

      SHA1

      84c99b724a2a5f321fd161d3beceb894e377a121

      SHA256

      6e96de38195de0095c6ab16696ccde2577a65e8c23d07f31e9f3c9f52d76c7ab

      SHA512

      46bea4f17fb327bce8bc6cb5329b7086a772a6eae07a8f2f34309a42acbb9f3dadd675d9c8d9f9e72c85149b48419fb5807acebbcee5bee150c754f94e98d7c4

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_hu.dll

      Filesize

      29KB

      MD5

      6b201af2eae546c9b638e38cabd9676d

      SHA1

      626b2029d573f371dbeb7b7878779383adc6253d

      SHA256

      c849d765c73a969ac10acff6195edd9339054b93a15152e5d1eb1fd1b5017b06

      SHA512

      1c35c169cf16a37a5537d0911af7da64ce9a0f999e76464f3410ebb224b9e65bc71deaa253e549b196c52409127b55cbb2e4a39bf9731b3ee76dae560b74fc2c

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_id.dll

      Filesize

      28KB

      MD5

      17162657113e9d8d7c1763bfc0ec991d

      SHA1

      f2507d9d1516bbcfbe408186894474c592f141a3

      SHA256

      60d759405a83ec4bb64144ed61b0e9a704bfb3b74e8f956277df71a38b19fc9e

      SHA512

      450e90b4c8ee384994cd6f56677dcacff258eb12442af3fea3a977d7d00b943a1b1f6b12769d4a02aeadc4f4c3b82a06cf8a667ce6691ace5d479d1261a1a629

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_is.dll

      Filesize

      28KB

      MD5

      625060f019c3bb8f1d49a9b128e1e4e6

      SHA1

      0e22bd7e23fed0e856a09bfaf5ee105a3dd27edd

      SHA256

      6117fb49f06f4d8e7268de9e41862a940fd36600e23f670f3c77ec0adb27257b

      SHA512

      962910c5a438b0289eea0402a262b8b7920255a1dabafdcc477cbebcc36a1c31b69784947c794bf720e16c0798cd958616a763e67c42327a94f7e66daa63a07c

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_it.dll

      Filesize

      30KB

      MD5

      258b52e60a1e353b6117917154c7b24d

      SHA1

      c109ef8d1382991b02fe953679bf3fed063e9e82

      SHA256

      2362d8f1e8f2c92e43659d73052f2a43dabf95121f852d6d04471710f2c7109c

      SHA512

      fdaf605922e728f87d7d916f75a83f78f4549dbb35f9d2e7717d369cd658075655a1b903e705b5cb609880033c080e4b3135902fcaba7a8a96c2904f05d53164

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_iw.dll

      Filesize

      25KB

      MD5

      973e14a5557248bdc2cd3a5fa3540a77

      SHA1

      66818135e202fc53711053ceba04ecc8b9b28506

      SHA256

      0af05d8af74609c9436ed0dcd3df52f7ef3dea8b786c85376c57c0cf128b3045

      SHA512

      e8c271f52fee4f249c27c4c344b5ecbab796227aabeb36b0b7a7d82d5463bcaa707b1f8ea47b863f2d87b35fe9b361ae2e2b7d1c16a4eed0ce0d530e1e34b26a

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_ja.dll

      Filesize

      24KB

      MD5

      dd5aa26cf2d67f50540da8e552f792a7

      SHA1

      0b14b06a2beb63fde2c1bc86c49a5117287de2c7

      SHA256

      b11af70867ab588c412cb5d5cc36ec888e74a50f508eb31a28db559aa00f8a35

      SHA512

      9bc1d7965a66ddbe7dc3fefbf2eb445a0857f83a28b2b3e120de80b03b51e87e6acd20569f2b002bb7adc41cbfe147572306094d83c8ffceb44f7a8417d89e0b

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_ka.dll

      Filesize

      29KB

      MD5

      3cba4b52b099039d2fbed395a3bc7568

      SHA1

      1a5204510d2c02d02ce361c7a3295498a60efabe

      SHA256

      79d4684d4d365b2c89f16fa0522f66031a1037cb4ad2a33050ed97a1df825990

      SHA512

      6ea41e61e4fa8cbd73e693db860a84bb4c6389b0aa5aace965a9567f6c16ae23fd51c018c6d96a1c08500a3cfe6327cc4c9ca9aa6bf9ad0b2f0d0c71e8922e05

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_kk.dll

      Filesize

      28KB

      MD5

      6543ba7290488f5e3f68675a598255fb

      SHA1

      7359895f909776c5f14f6e5ed0fa11cd50853cd5

      SHA256

      df016969fc3ae57abbe8fa9f811364cd84612af0e819284b4d1acce981f6c21e

      SHA512

      90f376c59d67d89bcd646895209c0fca92866f9866e1cee7a51745077ad05f730cea2624837baf1e5ba92365ff46955ece98938849b87ed7f89a92897949d0f1

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_km.dll

      Filesize

      27KB

      MD5

      4d101ce3ce6be285845e8f8bae548097

      SHA1

      195f314bcbee9cc373136334b5089e855e71286c

      SHA256

      3f11a2020839f5993e6e3cb9b5e7c5c659753cfa49257d3ebc015da6a8ead94a

      SHA512

      c31214e9aacfe7056be1f7ca6399270e644acef060d208d805b59bc6635772592ae166b06d038e2eb74218c451ef0fdbb09dc7e2ef6d23b751cbd6ae935cdf6d

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_kn.dll

      Filesize

      29KB

      MD5

      cd6084bee91407a5bb932cad81ca0636

      SHA1

      c9e56e6d15b413a8061ba38d05ff402b30688684

      SHA256

      01551c5de82d4d9b262735ecdc39fd6c4ea5a94acb9cb1dc4cea0e3bcfe7ee9f

      SHA512

      4d1cfa478050c87ff0c7d0b17ab7c23fc6bc400214b121bc86fc217b7b8b764c8109bdb15a3790822295556a7d8706aaeb8ff642b24d2fbd582b2ede61a76a7f

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_ko.dll

      Filesize

      23KB

      MD5

      e73046fc5427ed78ca02c7f50136efdc

      SHA1

      df58d20768edc25637ad8fa38f71d25a86633725

      SHA256

      49e0f43057c404a4ff5a2bc306f70c3728412b887e07870cdfd1f6eb3836ee88

      SHA512

      fce94d5a6b8f99a5af8f30314a0a7a5a3a557fefc630b907e5266c9f397bf6dd1a8211fa9d6535f75a0db7016ae20a3b295c4780383516d7a234225b798be584

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_kok.dll

      Filesize

      28KB

      MD5

      735d775e6772b5072227a3efc91d6f5d

      SHA1

      b302aecc725b87d3b0402be8d5b30c35084f2d81

      SHA256

      11c257e800ef3021c2d6147999f5192b28e48a0ff9d486be5e47c181744c15a1

      SHA512

      8dcd0e07b90ceb6d6f39af9077bd85eba46506791491eda63b05471a7f984c2d1b67cc1335f788682ade2124b32e8b5b436bf717f6b5e2de8276dddbdab3fd34

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_lb.dll

      Filesize

      30KB

      MD5

      8fc766f256ccd06f09106c10f9a20edb

      SHA1

      867c9da84a0e61a8b4787bd3618ed25aea80360b

      SHA256

      7cec1855457e12c2adcdc3790856f775fcac27bc4911258937f8b08ef0a0d1f8

      SHA512

      4f545d4914ab62743d2a0c6a461c03597d38b6a8ceff85b154629d2676f41b9cde7efe2e8131d2749321e56e7ac7d90e4f958917a989170bf505840bfba059d9

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_lo.dll

      Filesize

      27KB

      MD5

      f59fdfea8b8be13fbf3ee855f0f840fc

      SHA1

      32743d1ccc6702bdcb8e4e1320c60ce3ae0c3a36

      SHA256

      ca296d434902c4146ad1828ab96679d937d8edb85adf0184de00732d86e49d08

      SHA512

      fbf31397247f434d67f1f02751a12ecce46253e43218dff701c86ef3990d8ec8cbe50dc94b32810ec665e42246277ca14846ecc77350d0fb4a706b5d03c1484c

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_lt.dll

      Filesize

      28KB

      MD5

      f4bb4677d5baafb96c2489db597ef7ef

      SHA1

      ddb9566fa8f2206df5b2a6e71870b08a4ef3e418

      SHA256

      2a0e85a66fa811b55b5fda8dbb45b5db4ea01a32cfc927e22809ad5f3c8bebfd

      SHA512

      4beb5fa5ff8643622bb6c971a84f0af33328a98fc6caebc44f02d243c3aa5fb30f390dc65921fc1aabe7099b94a8c4e748c82543670053ff6d20a3c0a15a513c

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_lv.dll

      Filesize

      29KB

      MD5

      f4d4b8ca1664b954595d872cd6ccccd7

      SHA1

      288231017312ede121141f94ba89051fb6f3c3f1

      SHA256

      ec7072699b9c3954d0eae183312d4041299a1f2cdccde2ed8de3fe96837745ed

      SHA512

      b1474c0c4e87f499d8f1b3a83b8b001c72a48656781e8c3df87cd0a5eb2a6d9fec5abdf56922eac3fade2df232322e804f315874d983fa256941d4e03ecb93d8

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_mi.dll

      Filesize

      28KB

      MD5

      b112ac05613a1942f009db22c776170b

      SHA1

      3124e35610322ba8eec2779f4d4904a569e093ef

      SHA256

      9c1f34a7971ad37522136dfe3e9bb8c6939b69e9adc2ecea44ae495ade165419

      SHA512

      d47455653a9f1d69b0c63040eac6bbdbb8b3f72060862c1adc2bd589bbe20c04f25272e69324b0249a79eba4f089a3e68e787ee80a4d992df160597186d3ca89

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_mk.dll

      Filesize

      29KB

      MD5

      3824b848b8d27996e03b77e47d683ad5

      SHA1

      2112959b86d3699f7748120e9ce704a4b1d3d85d

      SHA256

      42ddac6cb468b4d938fac198019dfcf36b33bb8b370755425a6a5950d226878b

      SHA512

      cdfb37d6ffb0f344dbfb95af7cee8f0d7f420a1a98f934ced93ee0c349b1f2661e8331f4ea373a7bd535df89b783ec662935c9dec8f86c31c91bc6383af01028

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_ml.dll

      Filesize

      31KB

      MD5

      c48931cb10b1cc296f87e982d00f43bb

      SHA1

      c9a6574e4e31fdb73699561faac3608df9a846b3

      SHA256

      170cc518628e509b7121251e08894d2a865ac0ea1e4c96817938d677fb58f7bd

      SHA512

      05784711f1257fd0397eb324970d31c9807c6c2fadb084a89788dd33e73d7ea55d9cb96d42a2bf077db6720b8b5f330b113f035f82d1830d49de9296541962d8

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_mr.dll

      Filesize

      28KB

      MD5

      d3f6ab6ae235e87080e5b4fe3510b937

      SHA1

      06a4c82db747fdfac0c1114248e40fbd024a9bc2

      SHA256

      ee83dd12d5a99faf762e5ca10182a9e4ba04044b6c4d04d482de09959fd76a49

      SHA512

      f5a64838bf8abfe9af4b1a6a25570d8b092babe09ceecdc2b26e5fbbd5e8ffa3ba87c95376972c589d01d9ff7c566d31106ddc46424961ce8062fd2bdf8ba075

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_ms.dll

      Filesize

      28KB

      MD5

      dd6d3e273f0e7971d6889eacaaf0648b

      SHA1

      24b9447e1510e8c855378be10d1f6e4410ba8ecc

      SHA256

      39aaf503747f3afa7836a8fa3c425778eddf56324c91e2bab88edcb30faf606b

      SHA512

      05fc709eecd0bc4e7c6f4b60675a64159421c16c5ad7939330c1ec6539e7a1acc39f3e39bd046dd1ac29f8f6c55e38e0c3a8e14a0154d8906dd5b034fd607bed

    • C:\Program Files (x86)\Microsoft\Temp\EUB66F.tmp\msedgeupdateres_mt.dll

      Filesize

      29KB

      MD5

      cff3fc3d855f0d4ae24e953e418281df

      SHA1

      660646b75ea68d7d509ea8d4627dc7f4cbe12912

      SHA256

      44758d90b1e15c0862d55475b7d4a658bd2673a60967c09178cbe132e7b9fe51

      SHA512

      30dc2af48452f2cbbf4331e5470d5905aef1bacbd7a2e8b941d990094af43eac6512aec0458a6af64a569466004c2359723e65b0f6716626cca01fa9aea973df

    • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

      Filesize

      78KB

      MD5

      0ceb9940087128e65cf17ab71704576b

      SHA1

      bd5f43af93023798aaeb6b99be19d3bfa72f8c19

      SHA256

      c3a85902e0568163b6a2d5ee1c663074df3b1200e1b27f813b91f9a5b6251f2e

      SHA512

      84d7f85e474ae9c24481c901c9411e0b24373cdcd382909b2cd40a357407211ff3c12405f9deffdceecde61908f32928c6e1ba1fadee98a98018d11365b53bab

    • C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat

      Filesize

      280B

      MD5

      d4800d462c6503a395b0bedce8e8a0f5

      SHA1

      f23aa663ef840800b71036bd6087fac907a7db8a

      SHA256

      6ec5498fc74dc03a28acd62a541cbe98208ebf69e08d662154672999ef85bd92

      SHA512

      ec06a01c0c78f62f6baf07657c9e7babb3b379295362590a58ccb196df4378bab84f6801de54ea5e834cd230ab637a7e10edb867246b9df5bf92b5b8efe9e6d3

    • memory/4816-228-0x00000000006E0000-0x0000000000715000-memory.dmp

      Filesize

      212KB

    • memory/4816-214-0x0000000074FF0000-0x0000000075216000-memory.dmp

      Filesize

      2.1MB

    • memory/4816-177-0x0000000074FF0000-0x0000000075216000-memory.dmp

      Filesize

      2.1MB

    • memory/4816-176-0x00000000006E0000-0x0000000000715000-memory.dmp

      Filesize

      212KB