Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2025, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe
Resource
win10v2004-20250207-en
General
-
Target
4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe
-
Size
1.8MB
-
MD5
2a6e3f3275d854bf07aba2427baa6610
-
SHA1
37d6411844b5d8a9d997f38f7718168b33cbc564
-
SHA256
4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b
-
SHA512
a6054ab62fc7415dafaca1dc273b42edd9680541e964b7b20d6b7ed07d65fb2ee01ea833bfedec9abc3687814449bb65f7c041ba462aed5cc44397e0ae2d4ef0
-
SSDEEP
24576:4p8qWcx5AkyZrtziLafchZChMHTzC6SXYdzNyCzrgEctNjfRn5rEQi:wcJQLa0hs2HTbbtNhzrgZnp5rE
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7323575349:AAF8153fa71q5xpXhmOjB3L_BqSQXG8r32U/sendPhot
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Gurcu family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\spoolsv.exe\", \"C:\\Windows\\Offline Web Pages\\MicrosoftEdgeUpdate.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\spoolsv.exe\", \"C:\\Windows\\Offline Web Pages\\MicrosoftEdgeUpdate.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\spoolsv.exe\", \"C:\\Windows\\Offline Web Pages\\MicrosoftEdgeUpdate.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\dllhost.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\spoolsv.exe\", \"C:\\Windows\\Offline Web Pages\\MicrosoftEdgeUpdate.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\dllhost.exe\", \"C:\\Windows\\SystemApps\\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\\microsoft.system.package.metadata\\Autogen\\dllhost.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\spoolsv.exe\", \"C:\\Windows\\Offline Web Pages\\MicrosoftEdgeUpdate.exe\", \"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\dllhost.exe\", \"C:\\Windows\\SystemApps\\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\\microsoft.system.package.metadata\\Autogen\\dllhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\spoolsv.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5004 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3136 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2456 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3280 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4352 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1364 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4760 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3884 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4532 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1820 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 4004 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 4004 schtasks.exe 89 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4588 powershell.exe 3408 powershell.exe 3160 powershell.exe 5064 powershell.exe 2816 powershell.exe 372 powershell.exe 4752 powershell.exe 1088 powershell.exe 4764 powershell.exe 3152 powershell.exe 3500 powershell.exe 1824 powershell.exe 2436 powershell.exe 2440 powershell.exe 4792 powershell.exe 768 powershell.exe 3276 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 42 5924 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 10 IoCs
pid Process 2952 setup.exe 1364 setup.exe 3064 setup.exe 4392 setup.exe 4036 setup.exe 2752 setup.exe 1336 setup.exe 5136 setup.exe 1632 setup.exe 2764 setup.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\spoolsv.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpdate = "\"C:\\Windows\\Offline Web Pages\\MicrosoftEdgeUpdate.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Google\\Chrome\\Application\\dllhost.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\\microsoft.system.package.metadata\\Autogen\\dllhost.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\spoolsv.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpdate = "\"C:\\Windows\\Offline Web Pages\\MicrosoftEdgeUpdate.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Google\\Chrome\\Application\\dllhost.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\\microsoft.system.package.metadata\\Autogen\\dllhost.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe\"" 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ipinfo.io 16 ipinfo.io -
Drops file in System32 directory 3 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC39ECB2C634EB4F77B1ECCC4E8D16726E.TMP csc.exe File created \??\c:\Windows\System32\-oay6o.exe csc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\sk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\edge_game_assist\VERSION setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\hi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\mi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.VisualElementsManifest.xml setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\edge_feedback\mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ar.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\bn-IN.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Mu\Fingerprinting setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Sigma\Analytics setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\vk_swiftshader.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\es.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\eu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\is.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\elevated_tracing_service.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\mi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\sl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\zh-CN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\ka.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\sv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\tt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\as.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\gu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\ca-Es-VALENCIA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\hu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\ko.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Beta.msix setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Dev.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\edge_feedback\camera_mf_trace.wprp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\bn-IN.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\EdgeWebView.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Extensions\external_extensions.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\et.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\qu.pak setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ug.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\show_third_party_software_licenses.bat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\wns_push_client.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\2952_13383891549783430_2952.pma setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\et.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\internal.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\or.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\uk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\msedge_100_percent.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\telclient.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\pl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\edge_game_assist\EdgeGameAssist.msix setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\bg.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\fr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\sl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\VisualElements\SmallLogo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ml.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\km.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\el.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\es.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\km.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\te.pak setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\SystemApps\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\dllhost.exe 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\dllhost.exe 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe File created C:\Windows\SystemApps\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\5940a34987c991 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe File created C:\Windows\Offline Web Pages\MicrosoftEdgeUpdate.exe 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe File created C:\Windows\Offline Web Pages\cab239ce0bfa3a 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3992 PING.EXE 5512 MicrosoftEdgeUpdate.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Software\Microsoft\Internet Explorer\GPU wwahost.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Internet Explorer\GPU wwahost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\CLSID\ = "{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\notification_click_helper.exe\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" \"%1\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\ = "Microsoft Edge MHT Document" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib\ = "{C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\AppUserModelId = "MSEdge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\OpenWithProgIds\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.webp setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.webp\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ = "{2397ECFE-3237-400F-AE51-62B25B3F15B5}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\ = "Microsoft Edge PDF Document" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --single-argument %1" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.svg\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell\runas setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.pdf setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\runas\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --do-not-de-elevate --single-argument %1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\ApplicationIcon = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\msedge.exe,0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\AppUserModelId = "MSEdge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\AppID = "{1FCBE96C-1697-43AF-9140-2897C7C69767}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\ = "IEToEdgeBHO Class" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\DefaultIcon setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer\DomStorageState\EdpCleanupState = "0" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\Cookies wwahost.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" wwahost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/pdf setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\DefaultIcon setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithProgIds\MSEdgeMHT setup.exe Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer\DOMStorage wwahost.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\ApplicationDescription = "Browse the web" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.pdf\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithProgIds\MSEdgeMHT setup.exe Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer\EdpDomStorage wwahost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\LocalService = "MicrosoftEdgeElevationService" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win64 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\MIME setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\open setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer\DomStorageState\EdpState = "0" wwahost.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\AppUserModelId = "MSEdge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.shtml\OpenWithProgids\MSEdgeHTM setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\EnablePreviewHandler = "1" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer\EdpDomStorage\office.com\ = "0" wwahost.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\elevation_service.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\shell\runas\command setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\DisplayName = "PDF Preview Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\PdfPreview\\PdfPreviewHandler.dll" setup.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3992 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3280 schtasks.exe 4760 schtasks.exe 1000 schtasks.exe 2672 schtasks.exe 1556 schtasks.exe 3136 schtasks.exe 2456 schtasks.exe 1820 schtasks.exe 2324 schtasks.exe 5004 schtasks.exe 844 schtasks.exe 4532 schtasks.exe 1144 schtasks.exe 2284 schtasks.exe 1364 schtasks.exe 5116 schtasks.exe 4352 schtasks.exe 3884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Token: SeDebugPrivilege 2436 powershell.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 1824 powershell.exe Token: SeDebugPrivilege 4588 powershell.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeDebugPrivilege 1088 powershell.exe Token: SeDebugPrivilege 3160 powershell.exe Token: SeDebugPrivilege 3500 powershell.exe Token: SeDebugPrivilege 372 powershell.exe Token: SeDebugPrivilege 3276 powershell.exe Token: SeDebugPrivilege 4764 powershell.exe Token: SeDebugPrivilege 5064 powershell.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 3152 powershell.exe Token: SeDebugPrivilege 3408 powershell.exe Token: SeDebugPrivilege 768 powershell.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeDebugPrivilege 5468 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe Token: 33 2952 setup.exe Token: SeIncBasePriorityPrivilege 2952 setup.exe Token: SeDebugPrivilege 2744 wwahost.exe Token: SeDebugPrivilege 2744 wwahost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2744 wwahost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 2960 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 93 PID 4484 wrote to memory of 2960 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 93 PID 2960 wrote to memory of 3976 2960 csc.exe 95 PID 2960 wrote to memory of 3976 2960 csc.exe 95 PID 4484 wrote to memory of 4792 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 111 PID 4484 wrote to memory of 4792 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 111 PID 4484 wrote to memory of 372 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 112 PID 4484 wrote to memory of 372 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 112 PID 4484 wrote to memory of 3408 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 113 PID 4484 wrote to memory of 3408 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 113 PID 4484 wrote to memory of 2440 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 114 PID 4484 wrote to memory of 2440 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 114 PID 4484 wrote to memory of 3276 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 115 PID 4484 wrote to memory of 3276 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 115 PID 4484 wrote to memory of 2436 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 116 PID 4484 wrote to memory of 2436 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 116 PID 4484 wrote to memory of 1824 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 117 PID 4484 wrote to memory of 1824 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 117 PID 4484 wrote to memory of 2816 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 118 PID 4484 wrote to memory of 2816 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 118 PID 4484 wrote to memory of 5064 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 119 PID 4484 wrote to memory of 5064 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 119 PID 4484 wrote to memory of 3500 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 120 PID 4484 wrote to memory of 3500 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 120 PID 4484 wrote to memory of 4588 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 121 PID 4484 wrote to memory of 4588 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 121 PID 4484 wrote to memory of 3152 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 122 PID 4484 wrote to memory of 3152 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 122 PID 4484 wrote to memory of 4764 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 123 PID 4484 wrote to memory of 4764 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 123 PID 4484 wrote to memory of 1088 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 124 PID 4484 wrote to memory of 1088 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 124 PID 4484 wrote to memory of 3160 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 125 PID 4484 wrote to memory of 3160 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 125 PID 4484 wrote to memory of 4752 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 126 PID 4484 wrote to memory of 4752 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 126 PID 4484 wrote to memory of 768 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 128 PID 4484 wrote to memory of 768 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 128 PID 4484 wrote to memory of 3648 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 144 PID 4484 wrote to memory of 3648 4484 4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe 144 PID 3648 wrote to memory of 1016 3648 cmd.exe 147 PID 3648 wrote to memory of 1016 3648 cmd.exe 147 PID 3648 wrote to memory of 3992 3648 cmd.exe 148 PID 3648 wrote to memory of 3992 3648 cmd.exe 148 PID 3648 wrote to memory of 5468 3648 cmd.exe 150 PID 3648 wrote to memory of 5468 3648 cmd.exe 150 PID 4060 wrote to memory of 2952 4060 MicrosoftEdge_X64_133.0.3065.59.exe 157 PID 4060 wrote to memory of 2952 4060 MicrosoftEdge_X64_133.0.3065.59.exe 157 PID 2952 wrote to memory of 1364 2952 setup.exe 158 PID 2952 wrote to memory of 1364 2952 setup.exe 158 PID 2952 wrote to memory of 3064 2952 setup.exe 159 PID 2952 wrote to memory of 3064 2952 setup.exe 159 PID 3064 wrote to memory of 4392 3064 setup.exe 160 PID 3064 wrote to memory of 4392 3064 setup.exe 160 PID 2952 wrote to memory of 4036 2952 setup.exe 161 PID 2952 wrote to memory of 4036 2952 setup.exe 161 PID 2952 wrote to memory of 2752 2952 setup.exe 162 PID 2952 wrote to memory of 2752 2952 setup.exe 162 PID 4036 wrote to memory of 1336 4036 setup.exe 163 PID 4036 wrote to memory of 1336 4036 setup.exe 163 PID 2952 wrote to memory of 5136 2952 setup.exe 164 PID 2952 wrote to memory of 5136 2952 setup.exe 164 PID 2752 wrote to memory of 1632 2752 setup.exe 165 PID 2752 wrote to memory of 1632 2752 setup.exe 165 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe"C:\Users\Admin\AppData\Local\Temp\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\owkeyxog\owkeyxog.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9B27.tmp" "c:\Windows\System32\CSC39ECB2C634EB4F77B1ECCC4E8D16726E.TMP"3⤵PID:3976
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\en-US\spoolsv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Offline Web Pages\MicrosoftEdgeUpdate.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SystemApps\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NaZCbfZuP9.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe"C:\Users\Admin\AppData\Local\Temp\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5468
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MicrosoftEdgeUpdateM" /sc MINUTE /mo 12 /tr "'C:\Windows\Offline Web Pages\MicrosoftEdgeUpdate.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MicrosoftEdgeUpdate" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\MicrosoftEdgeUpdate.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MicrosoftEdgeUpdateM" /sc MINUTE /mo 10 /tr "'C:\Windows\Offline Web Pages\MicrosoftEdgeUpdate.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\Chrome\Application\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Google\Chrome\Application\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Windows\SystemApps\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\SystemApps\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b4" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\AppData\Local\Temp\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b4" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\AppData\Local\Temp\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTAyMjk3OTU1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5512
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\MicrosoftEdge_X64_133.0.3065.59.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2952 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff774526a68,0x7ff774526a74,0x7ff774526a803⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1364
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff774526a68,0x7ff774526a74,0x7ff774526a804⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4392
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6e2156a68,0x7ff6e2156a74,0x7ff6e2156a804⤵
- Executes dropped EXE
PID:1336
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6e2156a68,0x7ff6e2156a74,0x7ff6e2156a804⤵
- Executes dropped EXE
PID:1632
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level3⤵
- Executes dropped EXE
PID:5136 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6e2156a68,0x7ff6e2156a74,0x7ff6e2156a804⤵
- Executes dropped EXE
PID:2764
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness1⤵PID:4092
-
C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe"C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch1⤵PID:5068
-
C:\Windows\system32\wwahost.exe"C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2744
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3974F19-E8FE-4E09-B490-2501B99685E2}\EDGEMITMP_8919B.tmp\setup.exe
Filesize6.8MB
MD51b3e9c59f9c7a134ec630ada1eb76a39
SHA1a7e831d392e99f3d37847dcc561dd2e017065439
SHA256ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae
SHA512c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e
-
Filesize
3.9MB
MD5ad5f7dc7ca3e67dce70c0a89c04519e0
SHA1a10b03234627ca8f3f8034cd5637cda1b8246d83
SHA256663fe0f4e090583e6aa5204b9a80b7a76f677259066e56a7345aebc6bc3e7d31
SHA512ad5490e9865caa454c47ec2e96364b9c566b553e64801da60c295acd570017747be1aff6f22ca6c20c6eee6f6d05a058af72569fd6e656f66e48010978c7fd51
-
Filesize
1.8MB
MD52a6e3f3275d854bf07aba2427baa6610
SHA137d6411844b5d8a9d997f38f7718168b33cbc564
SHA2564aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b
SHA512a6054ab62fc7415dafaca1dc273b42edd9680541e964b7b20d6b7ed07d65fb2ee01ea833bfedec9abc3687814449bb65f7c041ba462aed5cc44397e0ae2d4ef0
-
Filesize
73KB
MD55a664f04eedcbf1e54420c029a672939
SHA1bbfca99805ef2316c1ec096299fb6a4ca545a3a4
SHA256c1791df8d06f7bb4a6edf86fbdcce1f50303a5f6af121c2261a76ebb40a42671
SHA51252496fa22efe001da472c631e69a56432d292437fa1f9b62d3ea0fd9b9ec276c858b2716ec5915e04a2bdcd47fb25de164d967cddfac5296721218202d49393a
-
Filesize
99KB
MD541477d37537d814c306cbd651a074eef
SHA11b3780e547061059045a4ea9b3640430d3896c16
SHA25620ead648169e651b17d42aa55b791406be24420ffe6c5b43c220d207db21a92e
SHA5128d3ff19e1902b989f867689e9a1dd794e9e4c6cb70fbad551c4e02fac1c5b258c93ae75f018f894a28a48adcf98cafa74a53453652fe4ae0e9be492f7268cff4
-
Filesize
102KB
MD56449ca2a062e2cf2f5f7fbb099843c10
SHA188cd0615fbdfd07e7e5bc2dfd6f98b8c2b130cd4
SHA2564eb5098ac971a0b8178dbd639f38e3f6d7f603fa52b3b03fd6f4346e2c5219e1
SHA51216e32ecb679b198877746aed8e08c802fae726a5da1582d5f8141c7a883c1bbe1a28c3cb569970dc20ca24c4bc000a5e8614424728e7b08a35fd10472a4719c1
-
Filesize
105KB
MD5dfd0671dff7a086610f2cb2c2e3d4154
SHA1ea3b0aa4ea5de217a30ce1d6d081f60cd822a046
SHA25625bd533629a3263ec04b61aa4b85faf5102190fb1ef7dde051bae34fe0cb69b5
SHA512887e7a6ac1539e3c744acb61ed4e968f01954820f3d28f7d0816b97be44ee05091ed20f57fe21bcf0b6f12d4ea302951b0a191c1cf1b7862957875eb6e6e8cad
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b.exe.log
Filesize1KB
MD518da49c97c362515aa00f9d0b966f403
SHA11974d473a06114342e171ca707c86c8303ab168a
SHA2561747424c1eba45d3539d08f84a8f02149ea969ef380a6c6d13a5cc3fe963e684
SHA512d1ca8005f1f5ac652696ae1b03d5c27b243300525e2dbd6db89da1f1c43cc55553982f3edc5501261e461aa9e8063418c1760f070366d1dddec4e6dc159a6d87
-
Filesize
2KB
MD509c38bf09493920e93b25f37f1ae4efe
SHA142e5d800056f08481870c4ca2d0d48181ca8edc8
SHA25637874b332a80efcccee52825b3d71d1faaae3820e09b47c3f161628bf35cc255
SHA51291eacaafc2cd9f80338302d6b3cc3a1aa957752f63a449fb2c1ebcac2bcc59fd8624d4e042c488b5fbe73b881da86c9de819d500de8c7eb6bc0d3951a2bf9123
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5eeb3d64208575f4d57e7d5f4975f432e
SHA1518771c783208749779711985f3bac8f242d66cb
SHA256274e9c421cb721c8151e27b096f8064fe91f94cfd5dea1515f0d3ef77d002ce9
SHA512acc26d6ed86f201a956feb538d802f2edd2add3709d7aa8f1ec9ccddfb7bfdea3e47a99d2cc09f85e4d7449259cfb672ef5f7e1f589ae026590351d2415598e5
-
Filesize
944B
MD5707e029ca15f1f68d35503f2e97d01a0
SHA162edfc3afe7a6bcda5a4b8c5f6b285ad2db222e1
SHA256980b55671f81c15d6618be0a50898c3f2f2e358270dee44d5a6ff0ad76ee94a9
SHA5121247bb3b3d746f79e6f3c0fc00e9765c0a259c69367cc92ba3f1d6cbda6aac17e0aaf7cc1f06da909b8902bf12c806cdfc1f742c4a5bf8ff6570b282d3ddbda1
-
Filesize
944B
MD559aca03635d6353829f73a6ab2199b1b
SHA164798a4dfbc580d2ef35f70ab45c3b09b836fd91
SHA256600ef901c253d8c8e1a92d178ee84522c6b6f61d2ecc83dd34a7bb2e86b1b50b
SHA512e7cb75200e7aab2b0bc1595b15c8927e563de9af1927d2b2de5ee3b25de24e589d1a488a3732ac40811854491ee9359b96363bff12bef7bbe88d64efe6d9b428
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
Filesize
944B
MD56c47b3f4e68eebd47e9332eebfd2dd4e
SHA167f0b143336d7db7b281ed3de5e877fa87261834
SHA2568c48b1f2338e5b24094821f41121d2221f1cb3200338f46df49f64d1c4bc3e0c
SHA5120acf302a9fc971ef9df65ed42c47ea17828e54dff685f4434f360556fd27cdc26a75069f00dcdc14ba174893c6fd7a2cfd8c6c07be3ce35dafee0a006914eaca
-
Filesize
230B
MD52193e10d44dc700194a32c88c609ee6e
SHA1920d00a3fa0aec39dcd46713bbc853dc832441db
SHA25604d1f159752be38bdaa86abd68ed045be428db9dddbb639b10f2c0fe61065362
SHA51266a64c484c9a58131296c48694fe458e89cc34dbab5acf4ed346890399a3c55ca5915fce8d2c0fd2ffc7cf2b76fd48e144974fea16e933ffca51f493804f9fbe
-
Filesize
1KB
MD573b7bcd5c0eb512a3cc29e4aef41b656
SHA162dbd6f1ae814538235b476627688e6c780b339a
SHA2567922a1e14e9bcd6acc995135bcaba593b1324a19c6e3b427d7bfcda2508fa407
SHA512ff6f145d529ef366f77bb77375febb7bd9b03e0ff8530d852cbced0239be050bc81b1d010a45d55d01ac4bfdb1bc924f11f12bb57786c9297f5ac6f4b159332a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
393B
MD5fb08df8a7adf07991bd2d5d60caaac60
SHA1d6c57cc6533cf9ccd0dadb547b3186f4358ecaeb
SHA25616424bf1605a6237fd1ac2485a0129c692bf8c2f139137f70b23e67cbbf59118
SHA512208036ef785ec428b7e55eec489ae6ffbc6c18f79ba37a819d8575239de1613ae6db3bef4de53539d5f53ca1697f30e2861bc7934ad5673c4f63f89255327041
-
Filesize
235B
MD5097002ab2879ef4015444067d0d91703
SHA1693963992af91c2db1e6ed0cd144feea860e3f3d
SHA256d8af9bfee25d4082bfc32087187b5e93f2339cb8347822e46dab23e675aa1d58
SHA51256779825eee153e40653b605e8f763713f046fd353a8c30bc21aabf16c1bbfe235da0248122800ff43488ce313fd9cbc64aca3dfaed3d6b7931a3e650d5bb06c
-
Filesize
1KB
MD5fbc235e20b211046ecf870b1adffaabb
SHA1244faf1f0b1e882f7264c46cdbb95d10efa0629c
SHA256d419c39e20188edf6a5d35a44c33b21d63b60ba7837205ba23f20f3b39e3fc5d
SHA5120a4f8d872a162f80f862d449b704150166d13a9fd18b8b4c2886085bd46dc441c8b04aa4632fbfb1e8c752c3e8390f1436f6358d27ccc737be8daf131ec1bedb