Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 11:12
Behavioral task
behavioral1
Sample
MicrosoftEdgeWebview2Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MicrosoftEdgeWebview2Setup.exe
Resource
win10v2004-20241007-en
General
-
Target
MicrosoftEdgeWebview2Setup.exe
-
Size
2.3MB
-
MD5
a61250a4ca592ca4df63a735a9facc0e
-
SHA1
ae06a5cc58eddec055c63c529e392afee2821854
-
SHA256
a280044f416e832e17c5525334ed096f4714f0450ea9eb1526eac9bbbfe9b541
-
SHA512
4177c9c25450abc7b9f21ce3976f8f634dfb698ab0f70a728ccf401d84748732455c7b89e3b1fb2813f42c3246f3d1cf4d74f41460b064647e2494bec73e2023
-
SSDEEP
49152:ZnsHyjtk2MYC5GDriEf3ON2k8vaM9GVkMSC2LeWhRXt1DlZFuXyrRJN:Znsmtk2aei9z8vaM0yyIeC5DpRJN
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 18 860 Process not Found -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 15 IoCs
pid Process 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 2636 Synaptics.exe 1164 MicrosoftEdgeUpdate.exe 2172 ._cache_Synaptics.exe 1520 MicrosoftEdgeUpdate.exe 2292 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 1624 MicrosoftEdgeUpdateComRegisterShell64.exe 2908 MicrosoftEdgeUpdateComRegisterShell64.exe 2780 MicrosoftEdgeUpdateComRegisterShell64.exe 2568 MicrosoftEdgeUpdate.exe 2736 MicrosoftEdgeUpdate.exe 2616 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdge_X64_109.0.1518.140.exe 704 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 61 IoCs
pid Process 2896 MicrosoftEdgeWebview2Setup.exe 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 2896 MicrosoftEdgeWebview2Setup.exe 2896 MicrosoftEdgeWebview2Setup.exe 2636 Synaptics.exe 2636 Synaptics.exe 2636 Synaptics.exe 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 1164 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 2636 Synaptics.exe 2636 Synaptics.exe 2172 ._cache_Synaptics.exe 2172 ._cache_Synaptics.exe 1164 MicrosoftEdgeUpdate.exe 1520 MicrosoftEdgeUpdate.exe 1520 MicrosoftEdgeUpdate.exe 1520 MicrosoftEdgeUpdate.exe 2172 ._cache_Synaptics.exe 2292 MicrosoftEdgeUpdate.exe 2292 MicrosoftEdgeUpdate.exe 2292 MicrosoftEdgeUpdate.exe 2292 MicrosoftEdgeUpdate.exe 2292 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 1624 MicrosoftEdgeUpdateComRegisterShell64.exe 2912 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 2908 MicrosoftEdgeUpdateComRegisterShell64.exe 2912 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 2912 MicrosoftEdgeUpdate.exe 2780 MicrosoftEdgeUpdateComRegisterShell64.exe 2912 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 2568 MicrosoftEdgeUpdate.exe 2568 MicrosoftEdgeUpdate.exe 2568 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 2736 MicrosoftEdgeUpdate.exe 2736 MicrosoftEdgeUpdate.exe 2736 MicrosoftEdgeUpdate.exe 2616 MicrosoftEdgeUpdate.exe 2616 MicrosoftEdgeUpdate.exe 2736 MicrosoftEdgeUpdate.exe 2616 MicrosoftEdgeUpdate.exe 592 setup.exe 2616 MicrosoftEdgeUpdate.exe 704 MicrosoftEdgeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" MicrosoftEdgeWebview2Setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MicrosoftEdgeUpdate.exe -
Checks system information in the registry 2 TTPs 8 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_ar.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_hu.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_te.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\augloop_client.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\Locales\es-419.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\Locales\qu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\MEIPreload\preloaded_data.pb setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\VisualElements\SmallLogo.png setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_is.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_km.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\msedge_7z.data setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\fa.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\sr.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\psuser_64.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_ro.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_vi.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\EdgeWebView.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\icudtl.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\kk.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_fr-CA.dll ._cache_MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\VisualElements\Logo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\et.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_bn.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_ne.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdate.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\msedge_proxy.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\vk_swiftshader_icd.json setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_bs.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_nn.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\pwahelper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\MEIPreload\preloaded_data.pb setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_el.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_bg.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\Locales\sq.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\Locales\ta.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\msedgewebview2.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\fr.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\psuser_arm64.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_ml.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\Notifications\SoftLandingAssetLight.gif setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\uk.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_iw.dll ._cache_Synaptics.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\ar.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\hr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Locales\ne.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\Locales\es.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\Locales\en-GB.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\msedge_wer.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\resources.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_az.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_de.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\109.0.1518.140.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\mojo_core.dll setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\msedgeupdateres_sr-Cyrl-BA.dll ._cache_MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source592_1339469148\109.0.1518.140\VisualElements\LogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Trust Protection Lists\Sigma\Content setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_pa.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_ja.dll ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_bn.dll ._cache_Synaptics.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Trust Protection Lists\Sigma\Fingerprinting setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\msedgeupdate.dll MicrosoftEdgeUpdate.exe File created C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\msedgeupdateres_pt-BR.dll ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wermgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2568 MicrosoftEdgeUpdate.exe 704 MicrosoftEdgeUpdate.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\WpadNetworkName = "Network 3" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc\WpadDecision = "0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc\WpadDetectedUrl MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc\WpadDecisionReason = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\WpadDecisionReason = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc\WpadDecisionTime = 302b651b8878db01 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\MigrateProxy = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\WpadDecisionTime = 302b651b8878db01 MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\WpadDecisionTime = 5075241f8878db01 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\a2-ab-f2-bd-02-dc MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc\WpadDecisionTime = 90a058168878db01 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD} MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\WpadDecisionTime = 90a058168878db01 MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\CLSID\ = "{77857D02-7A25-4B67-9266-3E122A8F39E4}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32\ = "{C7931E4D-82F7-486C-9FFB-E44AB90B021F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{C7931E4D-82F7-486C-9FFB-E44AB90B021F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.39\\psmachine.dll" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{42580F9E-2678-4BB9-A2BC-F22A1D432A1A} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{C7931E4D-82F7-486C-9FFB-E44AB90B021F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.CoreClass" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ = "IProcessLauncher" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ = "IGoogleUpdate3" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{C7931E4D-82F7-486C-9FFB-E44AB90B021F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\CLSID\ = "{B5977F34-9264-4AC3-9B31-1224827FF6E8}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc.1.0\CLSID\ = "{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{C7931E4D-82F7-486C-9FFB-E44AB90B021F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32\ = "{C7931E4D-82F7-486C-9FFB-E44AB90B021F}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C7931E4D-82F7-486C-9FFB-E44AB90B021F}\ = "PSFactoryBuffer" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7931E4D-82F7-486C-9FFB-E44AB90B021F}\ = "PSFactoryBuffer" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine.1.0\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42580F9E-2678-4BB9-A2BC-F22A1D432A1A}\InprocHandler32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.39\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher.1.0\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc\CurVer MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.PolicyStatusMachine" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2684 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1164 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 2292 MicrosoftEdgeUpdate.exe 2292 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe 1164 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1164 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2292 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1164 MicrosoftEdgeUpdate.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2684 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2816 2896 MicrosoftEdgeWebview2Setup.exe 30 PID 2896 wrote to memory of 2816 2896 MicrosoftEdgeWebview2Setup.exe 30 PID 2896 wrote to memory of 2816 2896 MicrosoftEdgeWebview2Setup.exe 30 PID 2896 wrote to memory of 2816 2896 MicrosoftEdgeWebview2Setup.exe 30 PID 2896 wrote to memory of 2816 2896 MicrosoftEdgeWebview2Setup.exe 30 PID 2896 wrote to memory of 2816 2896 MicrosoftEdgeWebview2Setup.exe 30 PID 2896 wrote to memory of 2816 2896 MicrosoftEdgeWebview2Setup.exe 30 PID 2896 wrote to memory of 2636 2896 MicrosoftEdgeWebview2Setup.exe 31 PID 2896 wrote to memory of 2636 2896 MicrosoftEdgeWebview2Setup.exe 31 PID 2896 wrote to memory of 2636 2896 MicrosoftEdgeWebview2Setup.exe 31 PID 2896 wrote to memory of 2636 2896 MicrosoftEdgeWebview2Setup.exe 31 PID 2896 wrote to memory of 2636 2896 MicrosoftEdgeWebview2Setup.exe 31 PID 2896 wrote to memory of 2636 2896 MicrosoftEdgeWebview2Setup.exe 31 PID 2896 wrote to memory of 2636 2896 MicrosoftEdgeWebview2Setup.exe 31 PID 2816 wrote to memory of 1164 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 32 PID 2816 wrote to memory of 1164 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 32 PID 2816 wrote to memory of 1164 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 32 PID 2816 wrote to memory of 1164 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 32 PID 2816 wrote to memory of 1164 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 32 PID 2816 wrote to memory of 1164 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 32 PID 2816 wrote to memory of 1164 2816 ._cache_MicrosoftEdgeWebview2Setup.exe 32 PID 2636 wrote to memory of 2172 2636 Synaptics.exe 33 PID 2636 wrote to memory of 2172 2636 Synaptics.exe 33 PID 2636 wrote to memory of 2172 2636 Synaptics.exe 33 PID 2636 wrote to memory of 2172 2636 Synaptics.exe 33 PID 2636 wrote to memory of 2172 2636 Synaptics.exe 33 PID 2636 wrote to memory of 2172 2636 Synaptics.exe 33 PID 2636 wrote to memory of 2172 2636 Synaptics.exe 33 PID 1164 wrote to memory of 1520 1164 MicrosoftEdgeUpdate.exe 34 PID 1164 wrote to memory of 1520 1164 MicrosoftEdgeUpdate.exe 34 PID 1164 wrote to memory of 1520 1164 MicrosoftEdgeUpdate.exe 34 PID 1164 wrote to memory of 1520 1164 MicrosoftEdgeUpdate.exe 34 PID 1164 wrote to memory of 1520 1164 MicrosoftEdgeUpdate.exe 34 PID 1164 wrote to memory of 1520 1164 MicrosoftEdgeUpdate.exe 34 PID 1164 wrote to memory of 1520 1164 MicrosoftEdgeUpdate.exe 34 PID 2172 wrote to memory of 2292 2172 ._cache_Synaptics.exe 35 PID 2172 wrote to memory of 2292 2172 ._cache_Synaptics.exe 35 PID 2172 wrote to memory of 2292 2172 ._cache_Synaptics.exe 35 PID 2172 wrote to memory of 2292 2172 ._cache_Synaptics.exe 35 PID 2172 wrote to memory of 2292 2172 ._cache_Synaptics.exe 35 PID 2172 wrote to memory of 2292 2172 ._cache_Synaptics.exe 35 PID 2172 wrote to memory of 2292 2172 ._cache_Synaptics.exe 35 PID 2292 wrote to memory of 2800 2292 MicrosoftEdgeUpdate.exe 36 PID 2292 wrote to memory of 2800 2292 MicrosoftEdgeUpdate.exe 36 PID 2292 wrote to memory of 2800 2292 MicrosoftEdgeUpdate.exe 36 PID 2292 wrote to memory of 2800 2292 MicrosoftEdgeUpdate.exe 36 PID 2292 wrote to memory of 2800 2292 MicrosoftEdgeUpdate.exe 36 PID 2292 wrote to memory of 2800 2292 MicrosoftEdgeUpdate.exe 36 PID 2292 wrote to memory of 2800 2292 MicrosoftEdgeUpdate.exe 36 PID 1164 wrote to memory of 2912 1164 MicrosoftEdgeUpdate.exe 37 PID 1164 wrote to memory of 2912 1164 MicrosoftEdgeUpdate.exe 37 PID 1164 wrote to memory of 2912 1164 MicrosoftEdgeUpdate.exe 37 PID 1164 wrote to memory of 2912 1164 MicrosoftEdgeUpdate.exe 37 PID 1164 wrote to memory of 2912 1164 MicrosoftEdgeUpdate.exe 37 PID 1164 wrote to memory of 2912 1164 MicrosoftEdgeUpdate.exe 37 PID 1164 wrote to memory of 2912 1164 MicrosoftEdgeUpdate.exe 37 PID 1164 wrote to memory of 2568 1164 MicrosoftEdgeUpdate.exe 41 PID 1164 wrote to memory of 2568 1164 MicrosoftEdgeUpdate.exe 41 PID 1164 wrote to memory of 2568 1164 MicrosoftEdgeUpdate.exe 41 PID 1164 wrote to memory of 2568 1164 MicrosoftEdgeUpdate.exe 41 PID 1164 wrote to memory of 2568 1164 MicrosoftEdgeUpdate.exe 41 PID 1164 wrote to memory of 2568 1164 MicrosoftEdgeUpdate.exe 41 PID 1164 wrote to memory of 2568 1164 MicrosoftEdgeUpdate.exe 41 PID 1164 wrote to memory of 2736 1164 MicrosoftEdgeUpdate.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\._cache_MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Temp\._cache_MicrosoftEdgeWebview2Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU6651.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1520
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2912 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1624
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2908
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2780
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2568
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{E190C922-39B8-411C-9C6F-0831268183FB}"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU691F.tmp\MicrosoftEdgeUpdate.exe" InjUpdate "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2292" "432"5⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2616 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2190C96C-19CC-4178-8660-610969D3B035}\MicrosoftEdge_X64_109.0.1518.140.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2190C96C-19CC-4178-8660-610969D3B035}\MicrosoftEdge_X64_109.0.1518.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:2912 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2190C96C-19CC-4178-8660-610969D3B035}\EDGEMITMP_5B819.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2190C96C-19CC-4178-8660-610969D3B035}\EDGEMITMP_5B819.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2190C96C-19CC-4178-8660-610969D3B035}\MicrosoftEdge_X64_109.0.1518.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:592
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-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_UDE9MTczOTQ0NTE1MiZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1OcFBmOUR2VlZVM0hzS1lkUlJVTXBCdEFlaVZGczB4JTJmcVFuUnZlTldlQ2JJcTdHNUk0RXQlMmZSZmdrOWdaS1VYTnpsS2RTUmhtYlhmV2lWZU9nNm85dXclM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIxNDA2OTYwMDgiIHRvdGFsPSIxNDA2OTYwMDgiIGRvd25sb2FkX3RpbWVfbXM9IjE2NDczIi8-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies data under HKEY_USERS
PID:704
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
182KB
MD5d6092c49adbe6e336129589db40dd865
SHA1f2727da0cd0fff082401adaf779c4ba8c961e3c7
SHA2566474d531f1b8788451f9a0d9e421dfa236279466c09d783c3e6bdadf7306b909
SHA512ff2a7ab954fec2c75e5e61bf752c23e127417eda22a332a40c0e0e7a44757645308c74f7852268eb7de1307907234421e0cf684bab2fea24e1e7a653e601bf1c
-
Filesize
215KB
MD5d09470f63c3b544d68480425950c6954
SHA1413c9b4059278aef05eb124028cda19329f9d5de
SHA25616f4836dfd0647421e492b789928b5aa116f74b85ca91b46ba5873890d008334
SHA512d47d74e1a80efc6ee775a664269c961f5514b15670d682e1c6e50771a55643b0a2e2b4945a36793a2fcde7d488370275a58ac5552f119e273bb6c84411f46938
-
Filesize
262KB
MD5db5cf5b7795b922a9f07561e7213ba01
SHA1152552ce0f0bb080287b8a9b830577399a6814ee
SHA256a8ce896d4e64a0246b1cfbba3d3f39a11350c017c7dc19e5bc4dabf0109fb0ef
SHA5122a2df6ed810ce8fe30f1c42bec81ce8237609d8a490a8bceb31af22eaa6dbe17c39083b20c5100a0ee8b206632fc77854b3ecaac2a76de6ffda2d3d94c92a3e2
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD53f84ac83fa44fb5e069640648e1660e7
SHA1d54e05bbef5f9abad7f6b506cd699a281305ee73
SHA25617c62e9ed5bebdcce2ac0cb41a255c5f63f6544fb5ab148b6810617b854f6319
SHA5123c23d6d616249c20759ea3cdf8221dbab0684c745aa362fdf1e505547fb651b08ee33acc3471af27e32bc66e7b1397eb56cded5650b5f43da52291569d48a813
-
Filesize
29KB
MD5c3485f9e2bbd4462f969c1a2b1ade357
SHA1a7884e39cb43e8272f586be7193211703ffd8a81
SHA2566dc5593c42c16ebc1765afa6e8ef2af3fac6602a62197e0d614be330109e74cb
SHA5120d7c1ed739e586e8a371e04117de6a5d4ee7d273ba550c13fb7b84e0500405a9fa4202bb8b96fa2a310baa639e3c4d0bc52764417bf7d75324c988b684d64628
-
Filesize
24KB
MD5908bbadc3ea726e2610ef6632b996694
SHA16246e19af8da064c725bcf384ececf1fe1aed43f
SHA256fc8ef54504842074382f27576a36c7437429cfb876ad5b5332160a8e26255f1c
SHA51260c05efc76f3bd1b4f1604d3f9c8d123752aa62726b6311ffd14cfb79d7c25023caad1932f5f146722bb0eb647e125277bec10cf1d18997c646b83f04d8e7de7
-
Filesize
26KB
MD501859e622da96bb235d0fd3a3e6b7871
SHA1f12555f480c12c1aa10911116a5e37446524c0b0
SHA25607718806c8a31133868cffaee5a07ca721e4f4c6ae4fd0deef67ef2a29eefae8
SHA51272b5a421f5ff15620cd5e15fd8763b69dc1e9c84701655651992fffd9b79f3e25e11c864c955a5f9beb2f678c03cd59e5a89c10e13a68c57b406971ec6345903
-
Filesize
29KB
MD596463afd6026b13c098019b02b0ad312
SHA196cfd64628e572db01d7fee237add6c48af43bfd
SHA256b8a2774f687eaa0f25da96e7cf1497d5e6d84e567f7d0c89d5bd33931b2674fa
SHA512df91cdcba5e6780fcc5ad9d24e25c3e714dd568f515a53dce3a05b9b49c3312a65860d7156fd5524c8ee907f15d3d9ad900b6ad37c0ff2a8631bc8932d397105
-
Filesize
29KB
MD59772dfcec02c842821cfccbf066f61b9
SHA1571326a12f51ee034ab9ce8224363c2050f3fbfc
SHA25627035173c82bde66600ee0cea45d98f6c000575b7deb9e670346a521caababab
SHA512d4104d310ddcf6ff7ac3a8f6df6b611848c0d0a0a716a958e2f1ce13a9096430081f99134068f0472a2a058d5e6ce2abf0f1ff9abcf4ce0bdbced07731de7f5f
-
Filesize
29KB
MD55c4c5b2c1dfe89adf51d753e5a83f6bd
SHA1e277714e69b3628586a4f74260e9c06ab00700d8
SHA256ac722db8cd409584c7529b4791773b56454d91c404222c7e9bc3f8a4d4aec448
SHA512d5fdbdaa9a0296262b37af95ba9e7f0bdd4de09e9b131f29afe37677ea9c22a9db374b4d2fa903875775a66a04543aed60661eabd1ad9d61cf40892bf593b1c6
-
Filesize
29KB
MD51771018a12f869ddfee465b4294d2b14
SHA19d13d4fe3ef612fe1cb55237eec340374f88f6c6
SHA2566ef242c7e8d2b1002f739cbf5485afd67c4972e36042c26b8dfd0133ae5122d5
SHA51223edf73610839ac089283306b54dad93975d64cfd799d64f71a330f184253565d7c90d452e9fe028c4b1ec4fca9296e98c524a1ca5eaf11e97738e4fe50fe3a8
-
Filesize
29KB
MD5987f13d745a887a41da69a0ce1db4c9c
SHA1133b52d1529183e5fb90b6c8eab5115419e592c1
SHA25608383c9fa45d4c1fe441cb259fa0722b55ec2236e8dea471e380fb4fa35977a1
SHA5126abc8caa7da1b59014098e17a6d71d19edeb91184c41e16025d02218a7e1e6b908c27bbd342ddf2a7bf3e75ef23d086cdb7cc7b11af8e13f1ff0b7a002d34312
-
Filesize
29KB
MD51f906baf25ce4d4a48ccbe4c912931d6
SHA116ccdf2b6c9dcc9fd143973945c3d12c7e4fc716
SHA256dff265bd7a3a50bd18212d9c58f1a61e32c6821e520e20e5d8a929fffd8ed65b
SHA512e06228f79abd81c493a68c620682924b6ecaf11b7879f1bf216d6260824c4f6a3d99e3468b14e23387d14a0338868c47ae145eb3f08cfc80a7cc6add20f5d6ed
-
Filesize
30KB
MD52dc7cdf70843a980a71adcc497d7f4b9
SHA1f71d6e6ae98dd7116d6b586466bb16d8d21507d9
SHA25620e69e1f8ddf7282d90b1c1c7593d7d3593eebb2e72b98bdd26d4c7a560cfecd
SHA512c4be6389d67bb4b4607380c21ceddcfac20f2f747a584d64753bbdbeca03b868464cb8237ae567bffc4109e1bd17c6cda96b5936f3314fee6461cc50f16b9789
-
Filesize
30KB
MD5d8ffca3af6de1085b758e43fa27d931f
SHA1151e778acab2149253b2de643c6f0ce1d5a7a582
SHA2563a5464f9dcbbdaa0248906a5595b7247fb59ac3eb1f3f22b27bb095430de8843
SHA5122d1182e5fc17e928d1eda4b1749cc1a0f214bedfb4bac844994543a8d031af01d474adce2c3bd96dc33e4d7852e69d4424c3077f82a2d661cf3b5e40ba7eae5e
-
Filesize
28KB
MD57a6d098cd7b6e8dfc510579d7c56e0e0
SHA1da70f2875e796c4fd8c6e8bf58eb1ce232193925
SHA256643163c67aa0f4e145c34a34e8fbf93a1a5779f8ebb30a91ac07032813695131
SHA5126995bea3f571381ba6ad8fe0e66400fd9c98963db0ebd4f7064e575c383b0150024aa29cd56224daccad2c79354a2d662637b472b518840ed9b7210d614bd632
-
Filesize
28KB
MD58d67274407499bf8991c444c064d8829
SHA1d02b897a797b019a1e70383b0797c751577bd3df
SHA256edf8f2c128e9c73553aff7b06dc0c91a05adf576d4970715dc1f168ed233c1ad
SHA512ce401b7b069ae27cafa7aa8efb5be4d01296307699c686a62da1a5556619a6ae88ecaa2fe4a3e03a6bd9651eaa1455695e08e46ef3771b581adf9c97f6d0b2b3
-
Filesize
29KB
MD5b2ccb7c497f7f253e6c5fd07450d4b7c
SHA11174e4dce062ed9cefd9e4ee6205dbbda80d116d
SHA25672538c238927c342f953beb6b7e2b7423e75d12b0ca5c33d4e1d8701e890badd
SHA5129838658d8f7e6073827ef614ca628b1883f79e9f0a78424e3c7779b972eff5549f9c4b9869c39c686eae9695268af9eb201d4b8320e97a53f629e48d8b835c75
-
Filesize
31KB
MD5d727efc2844c23ada09c756629250734
SHA1e1d383a2690ea6eaf573286f2a8fef82bc42b5db
SHA2567e06b7c22830140dcb56c0277541e789d115743e49c9410e6055f320bb88bbbc
SHA512b475fc13c371ee121ae8a469bffdba1c3d54166f46e328d431d1a3237e2deebf6963365026c2b2308020a09fcd16d898dfc621466364bcc2e988a4ef88289b89
-
Filesize
31KB
MD570cb181cedb9e7f2b7257f8347298886
SHA1e6c89473c4460adc4f1fedf2ae86041ba13d93f9
SHA256a845cf8f671920b538138717f40abddc5c830da4543cd9f7261245c3e3918824
SHA51214c6257ddee56be56e2af07d2dafa4eb0dd015c5ae066e616f91de38b45a4001c422de927c0b96ea25c16800fb0a544b11b535c0cbe42ae725d1492515bbd644
-
Filesize
27KB
MD509f45cfda08e88e34b51a62c23e0e748
SHA1c61fc721bb1db2a430ef76eaa95c82b513eda8d2
SHA25656fa3d934380c73b1e1c32a2bdeed64a26fc2de92612a201ef7306d4a00be0c8
SHA512b30b682647ce799c19a2a942d4e83d8438cf52da74f088802f9412ed4f18116736dccbcd8b230b7f3031455591e0eef7061a3ec379ef947a1ce207e6e9f08b4a
-
Filesize
29KB
MD5c94e2c9cb3f1b9ce990f131b32844db8
SHA198069c4e11f2ab03bce79717f208201c5549713a
SHA25634e3bd8b21adc60adc614ce32a39dd424acc7c998f8d7901af5193348830b84f
SHA51272f807a6786aa8c88b92a04aa19413412aff1d54218f31c942f40d42835267acb0249eb0fda0124efd0357b48a4c390cf0d7c1425b947e8f998b137e3ac03db0
-
Filesize
29KB
MD538559c9b8868faa3d5312aa9557ed1fc
SHA1b430533a534625ca67a4bfdcd04c7d346feb705f
SHA2569457f8915b6f1f644274c30f63831ebace766796cc9d570ed75575fd1dd88106
SHA512342858b52017128d601c5d27b465b8939fcc609272c4c5ea4942b49320c2ef47932aa3ae62b17bd401925a69184e16b1d6e2febbb263d344ed2d3a33fce7b2e0
-
Filesize
28KB
MD58549f0990897525e445acb553dee4250
SHA1f6a0549e6ce04c852a9593b430cf19556beb6277
SHA256224aa029d124cccac05d1c38dd7db1ae46fd17fdbe29c32692cd6dd4e1666728
SHA512729637b47d5ac009eb0cb5c12486879d4bad196ade6371f99d209fde74ec4ea5e231a4eb9f574ee7bb61605fe19fc9e035cb12cc8d93d05ec47a319c28d93085
-
Filesize
29KB
MD51f340c24a25186770479581d678a0f5f
SHA1df7f1e6a8a5447a244a4d9fd29d7c2a3435e3cf8
SHA2564db5fd9c0ccbbad69b90834e496a625fac6b479f561e2ecbdc2b5ee63ad35c66
SHA51272b9067f339172b1df2795cad3505bf442dd8b2e3a05ab9a392f470dd047dabb82efc9bbabc32acdcdea326cb4f7bbafdf8c1ac1a2e375a88f7e2c6014ed930a
-
Filesize
28KB
MD59c454c79124119f8b1293d0c50b1b9a6
SHA12b91f6dcbb7897f9b3560d806ce6c6a17a37fcfc
SHA256fcf333ce3065f755cf0033ee385a7f752132274a8c85da12ba5445f496875aac
SHA512d5dd9d24518a0acea4d16d79385a1a5743695f8d8bf5a9fce37b90398edba90aab0ac1e18da6f6d8b4bf1b0ce5efda394871914ab620ba0075fb4bdbe950af63
-
Filesize
28KB
MD5a72def19680fda48d3d526dcf3dee8e7
SHA137c9a46fc4483ee0d94ff5b92e4d9f462e5b232c
SHA2569fabe5d1abb1baa74b18d41ff28913b3eb9c3fa985f4335b36623463c0c7c09f
SHA5123fb8ff998053e74b9d18b29bb3626c3d10ab577227e1ec93964ad00b293ca23c92238dc5187646a3671b1fcfb4a192f5a031ef9d1796120c9e3020ab6398f196
-
Filesize
29KB
MD5489692566a15cec4eccce35afffeecb6
SHA1ca2711d9e70f9d4c41d1d98af33993bebb48e342
SHA256fda26d0135a07a7512811a8ad206056db70e0ea0fe9236096f2f622305e590c2
SHA51274e5090e2c7e8af1bdce7e544b3c15edabe54b577bea9c3b152003e361152bafce2a8e0e5c2cc55c6714004bffd33f4b793d51324b12abe9dfa6713d5e1f34d9
-
Filesize
30KB
MD5c52b6c282e5151fb9537d25275af31b5
SHA1519ff118d3429cba4096a20191ef2fd0ddeb4099
SHA256fe20198950089e92c74d42eb0353119165cc64ca4abc98446d73f0afd4757662
SHA512298f5e6a337e73ab697542fbb8efd33231d48f7845fe6db4f42721588e5d73b12a3fc81cb3e90634b62b6edb1f803807d81eddcef7fe3f0e6491220cb90520f2
-
Filesize
30KB
MD5a50e40e5fc5b4dc9d60815df15ac15f8
SHA1410930070643657aec955f5748dd26c84682bd95
SHA256138e5dc802fdf6072d6420521908a5951b16d62de318819a344e2bf615ba071c
SHA512e85608d23eff9919c27ddbe957198a38637fb8d8cbe9b17790ffc6e8a5e465b40014e9fbd0a8ba573195eed7d4d050e50f176ff46d3b6f5ae4c18410e9241507
-
Filesize
29KB
MD5dd73e427fd2b78ae375b2811b16cf354
SHA1b4cc4230ab5f1d0fedabba69498b85b5e704ed8c
SHA256e524a448471455deed6635a2163ca334898494c2c8e7dafc8f82fa64b870680e
SHA512f7f821c3721dda4eb848d3eadf309e31879b9ff37cf0f9185789a855b835ab993dc5ef9a752d8c257b1805ff3aba27d824e3cc9c03bfaed01c47335a0f86daf4
-
Filesize
30KB
MD591d3b120ef50e80372371cc7971cb517
SHA12c57a4cfe6607e6e25af84236635eba74b3d8bfa
SHA256589178a57e5b434aef8df88f846f4baeeb0e8609452daca455e6978833235000
SHA51276cd023d9fda7208c0ce8c4d48908ff8a6e210be582ae02fdde1ac2ff1a68801bb420aec52adac4358bdb664b4e0fb510cfc2ef7974553176904b42b37380db8
-
Filesize
29KB
MD5f018be9cb93ea30d64c32075cbad6896
SHA186655e473957526e2906ae91f7d19fa44cb2ee3f
SHA25664dd61bc661928249ca6de8074458f90ef7043c6687c223d99aaa69b41279ef0
SHA512501bada423a815073f8a510319204234966ada88726c850c264d5cc5ca039a49f95d7d3d0711d5e7be5fa1bef5ec18f74dfd5dbad67a26070fb36321390ce686
-
Filesize
29KB
MD5569a09382e5901f6d9aba5f7ee48c7f2
SHA1ab27c3cd5ed9814f13c94c4370f992bda0298eba
SHA256cfda4b12f03e0ca8dd1a208a3882b8c51ac1833d8f6b5677c707bb6a21a71f16
SHA5123dd9a4f7a85509a376d28c47cb4008bb6572b347b4486cbba5e6d7d61d9419a1d49347801068d73ff3f680e0886e6b9d34201b03da5e83c398f483b8d62481bd
-
Filesize
29KB
MD54b9eb0d35b4cd2f0b15db8df5f711c94
SHA174a4d4ea43dfc4f475d36f8d42d29d2c1765f96b
SHA256f827ea5b8dd6a90eceb72ef944706be65196c61c8c1b611497fe323c3e6addd3
SHA5121e7113ceb9205f0158fa5be0efc650c6f6249b681414fd2d203dd530960834de54471c430aea1ee8f51cf5d5060cac8359ffb245716889ffa0fa4b807c5a84b4
-
Filesize
29KB
MD50ec6b4c082d8ade2df7ee3444651f556
SHA10519287e215c7a963f9aeefb128ae798cfb62a30
SHA2560d5168dcc701ab29bc81346a3e9dae92a0dfdf39275d46c9b9484c7654d6c38d
SHA51202a45510b0b06a9901a9a00b81d4d0b1cb195828b581f3010cf654029c5995f8f6bb1a7631d8235f9c75468796fdf23464c2c71b60f8550fac823e8f7137a96c
-
Filesize
29KB
MD59f47ddd94ecaf45dca0cec89cfa44804
SHA155900ef9810fd7a248e13fca8a9f0deb85f81f08
SHA25689fe1cb0139d4c4901ddafe903a7662fc1d6309d88bf9ea30c88da5ed393a062
SHA5124d5e07ebe3165d42ad0fb3f8331afbd5d73f369dbd9aca6372143538773c30d5c30a5b07f455066c7c742aebd98ab123b9e1b5a3b37d2784bb4a7fa5127c69db
-
Filesize
28KB
MD53fe334d051c4601788aabf3f4496bea9
SHA153d49e4d0ed1c0fa12ea794f1ae7aac1a00d2183
SHA2568c679bb053da4d3eb1704526bde8e2556b7bd1accd4ef1d53453f0b62fede6d1
SHA512421c4c35bc6cbc62860e9db074cc6f8dd47144d26202b2374850e87055a076cb1ac065a441da548d401f5b81d0eb5112dad3d1a6c74c713aab71788e920516bd
-
Filesize
28KB
MD54c24ff5b72976c7869cb5ebcf4c56d06
SHA199e824cfb38a4a656b876e9bf988bcb73983f3e1
SHA2563b146d29a75d6ae40db7ea5cd78529a8a3d74e249abecd2103be306780ced845
SHA512e985a3c9b28cb5b12d23091dfc772714566ee0a49c2726e4ea814456e9424cdeb89e02c62f35eac188246873eeca792c64bbb3e9ed6fb0a2dc032cc46957f409
-
Filesize
30KB
MD5510d0bcee90ad8da281619cc942f0a11
SHA161183562338c842562220194789043ce73c78eac
SHA25641e09ecabacfe4a39e11d2ef3eeac600889b1484a57e0a56f54140c2e26c3890
SHA5129ed9f6560b8d49079e37bf40e725c3566c01463c043421871871a9748e95e99e0ecb3f24d927e197834b02e693eae85790428bc6e5bac181817de29ab3f86e57
-
Filesize
20KB
MD5c5b81b3303eca8bef9f1944c4b5f7af7
SHA11d411497aa85ff6f992148842deb3aa451121f77
SHA2565592129e44f3f40d43c4f373236b6e60493e84cca55dd858f97bdfc6818fba67
SHA512177b262191154ed6869e8cb91ead82a9978e969cb3966c51b9215a0cb992bba820c6366f02a1af138c3ce9ef118724b2880f2aa00d3bc8d9b1c1cf95445c1e98
-
Filesize
2.3MB
MD5a61250a4ca592ca4df63a735a9facc0e
SHA1ae06a5cc58eddec055c63c529e392afee2821854
SHA256a280044f416e832e17c5525334ed096f4714f0450ea9eb1526eac9bbbfe9b541
SHA5124177c9c25450abc7b9f21ce3976f8f634dfb698ab0f70a728ccf401d84748732455c7b89e3b1fb2813f42c3246f3d1cf4d74f41460b064647e2494bec73e2023
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD535ea757c3270c54fd144f09c92fa10ce
SHA13b025f3b9205dfa1e2038ae6405e0a59b2cfe4f2
SHA256d7bc888e57d9cfe5e57b2a5c7cdb60f1790e384f7e3dcbfea58626e265d19b38
SHA51269be20e97e3647382948f17a4069a2491d74d1b5bb7da7d8e5167e16a223de6ad718896b4640c9b3de86c0b6903988746ae395be0aac2454b69b87d2285684c2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD529118748b144026ebf4228569b5b6907
SHA1ddf998588cc3553f20fbb94077c0cd5187a0420a
SHA2565640cef84d3e26dc8750ad521ce99dca61b2d5a4a5a8bccb031958f046712f0a
SHA512e93b7e4e6ebe6c669ec94e042164f04291fb4e2a74c0778ff4674f394cb9f4ca5380b87ebc9b957895ba04e8d81dbdff06eca68b0e15d85a5eaa14eefad6db6b
-
Filesize
201KB
MD59da54f5a8726349124dbdca094448a11
SHA1a80642cf316be9570494a4c74949024f5d59f042
SHA256f04efee822f9b2baf2f9b4ea576b9908804b6990497b82c549a34ba54b1b4807
SHA512d84a5ac786f8bd0eabe4b1c50c7cbac8828ed2e3eb9a064936b65f0cf07f30e7362d44bda1c95a6652708ebb94e139781acf9cf7c0bdc642620136c6d01e2d62
-
Filesize
27KB
MD5ab3799e458126b774b1bc7a56e75fc5d
SHA1fb929347c1f92654943a3a0b7611fcc978718ec2
SHA256bdb3e5dbb6caa9fb77e23e1b5a363400402a6e88eed3e86e55bc9edae8b8bfad
SHA51225cde70b3d51b1c1cfa7102a745d90ceb5d9c6324c2f9045b213dec000e79fe419744f07e6c87c77e84c0d374259d72cf52ffee26da864e0959d2f3d35f2c851
-
Filesize
1.6MB
MD5ec5b2a3126f46e01e1fcbb215d4f9ec8
SHA177cfa2daad5e57e62d39c5f7323c4f68032c3152
SHA25609c2a441a22186cbcc90e0a79556c4c696446740955c9031f8b52e84c7cd4ec1
SHA512b0f5ec2cd2f120de85408a57070ffc078cad2eb8cc6f93874008c392a0f7629f6ecba9d74cd3462f7868f110b12664853eae11c64f3b2d237dd4f901a1f307b3