Resubmissions

13/02/2025, 02:52

250213-dczvha1rgq 10

Analysis

  • max time kernel
    244s
  • max time network
    245s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250211-en
  • resource tags

    arch:x64arch:x86image:win11-20250211-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/02/2025, 02:52

General

  • Target

    random.exe

  • Size

    4.0MB

  • MD5

    ae16ff5b21a1c2d36b76c02835915c6a

  • SHA1

    093124ea4bdf7a3d6db0c5f1e1325977a7405079

  • SHA256

    464cd1111eae4547347b035a95e82747e2f32d4082414ef1de2fd03ce514c481

  • SHA512

    9204c328cfd655c67090cf79b0ebabdbd0818e31ed3001885d6f39c488c37912dc36ccbab153dea0d32e0797c43ecaf81e2bae190b7b6601ce137ac43da83320

  • SSDEEP

    98304:LNGI/om0EXNSMQJ7BHXojWYokmCMIlZWV:LwIgI9xQtB3oBN

Malware Config

Extracted

Family

gcleaner

C2

185.156.73.73

Signatures

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 23 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 24 IoCs
  • Checks BIOS information in registry 2 TTPs 46 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 23 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
  • Suspicious use of SetThreadContext 23 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 48 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
      2⤵
      • Downloads MZ/PE file
      • System Location Discovery: System Language Discovery
      PID:1544
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /0
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2184
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4816
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjEiIGluc3RhbGxkYXRldGltZT0iMTczOTI4MjMwMiIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNzUzNTk3Mjc0MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUyMTYwNTIwMTgiLz48L2FwcD48L3JlcXVlc3Q-
      1⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2812
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k SDRSVC
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1708
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3220
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:3912
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6272
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6632
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6764
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:704
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6720
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6744
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6788
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6736
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4424
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6772
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6780
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:4920
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6848
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6808
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:1432
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6856
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:5024
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:6924
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:5180
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6916
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:5200
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6884
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:5352
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6892
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:5480
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6900
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:5708
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6908
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:5836
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6932
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:5988
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6864
    • C:\Users\Admin\AppData\Local\Temp\random.exe
      "C:\Users\Admin\AppData\Local\Temp\random.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:6120
      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        2⤵
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        PID:6876
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\MicrosoftEdge_X64_133.0.3065.59.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      1⤵
        PID:5280
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
          2⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Installs/modifies Browser Helper Object
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:4220
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff675646a68,0x7ff675646a74,0x7ff675646a80
            3⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            PID:3656
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
            3⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            PID:6412
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff675646a68,0x7ff675646a74,0x7ff675646a80
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:6436
          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Drops file in Windows directory
            PID:1472
            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6ec876a68,0x7ff6ec876a74,0x7ff6ec876a80
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:6592
          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
            3⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            PID:1852
            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6ec876a68,0x7ff6ec876a74,0x7ff6ec876a80
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:6684
          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
            3⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            PID:6652
            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6ec876a68,0x7ff6ec876a74,0x7ff6ec876a80
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:6088
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MzlBQkQ3MkEtNTBCOC00RjcxLUEzNzYtNzk4MzgwOUVBNDlBfSIgdXNlcmlkPSJ7OTMzMDQwOEMtNjAwRS00M0ZGLUFDMEMtRUQwNEU3RjUxODM1fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntBOTI0NTM1NC0zQUI5LTQ0NkItOUI2Ni0zRTdFRjgzOUUyOUN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjQzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMSIgY29ob3J0PSJycmZAMC40NCI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSIyIiByZD0iNjYxNiIgcGluZ19mcmVzaG5lc3M9Ins1MkQ0NjVGOS0wMUYxLTQ1MTQtODVCMi0zRkU1QjVEMzlERUZ9Ii8-PC9hcHA-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-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_UDE9MTc0MDAyMDAyNSZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1Fa3VVR0pIJTJmV0pYQ1E3a2RwYmVtOENuWFNJTVRhcHY2aGFiZnB2R3BaNTBlME5rQlp1YzRPbVBISzZOVjZPVzZHdjdoekRCQm1SY0p2dlFoNGZ5SGl3JTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMCIgdG90YWw9IjAiIGRvd25sb2FkX3RpbWVfbXM9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjQ4NDgwNTQyNyIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvZmVkNTU4MDUtMmU4NS00MWQ4LWI0ZTMtNGVmNmI1ZWJmNjNhP1AxPTE3NDAwMjAwMjUmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9RWt1VUdKSCUyZldKWENRN2tkcGJlbThDblhTSU1UYXB2NmhhYmZwdkdwWjUwZTBOa0JadWM0T21QSEs2TlY2T1c2R3Y3aHpEQkJtUmNKdnZRaDRmeUhpdyUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IiIgY2RuX2NpZD0iLTEiIGNkbl9jY2M9IiIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjE3ODYwNDA4OCIgdG90YWw9IjE3ODYwNDA4OCIgZG93bmxvYWRfdGltZV9tcz0iMTEwOTM4Ii8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjY0ODQ5NjE2MjYiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjQ5ODM5OTMwMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5Njc1NyIgc3lzdGVtX3VwdGltZV90aWNrcz0iNzEyMzQwNTQ3MSIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9Ijk0NjgiIGRvd25sb2FkX3RpbWVfbXM9IjExNjg5MSIgZG93bmxvYWRlZD0iMTc4NjA0MDg4IiB0b3RhbD0iMTc4NjA0MDg4IiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSI2MjUwMSIvPjxwaW5nIGFjdGl2ZT0iMSIgYT0iMiIgcj0iMiIgYWQ9IjY2MTYiIHJkPSI2NjE2IiBwaW5nX2ZyZXNobmVzcz0iezNBNDYzQURCLUExNTMtNDZGNS1CNjIxLTU4NDVBRTAzQ0JFMH0iLz48L2FwcD48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iMTMyLjAuMjk1Ny4xNDAiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBjb2hvcnQ9InJyZkAwLjU3IiB1cGRhdGVfY291bnQ9IjEiPjx1cGRhdGVjaGVjay8-PHBpbmcgcj0iMiIgcmQ9IjY2MTYiIHBpbmdfZnJlc2huZXNzPSJ7NTY0REJGNkQtMzg1My00NDg0LUIxNjgtNTQ3REQ0OTg2NDQ2fSIvPjwvYXBwPjwvcmVxdWVzdD4
        1⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:3476

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{435FC629-238B-420F-893C-B1ED709C5408}\EDGEMITMP_B0730.tmp\setup.exe

        Filesize

        6.8MB

        MD5

        1b3e9c59f9c7a134ec630ada1eb76a39

        SHA1

        a7e831d392e99f3d37847dcc561dd2e017065439

        SHA256

        ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae

        SHA512

        c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e

      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

        Filesize

        3.9MB

        MD5

        ad5f7dc7ca3e67dce70c0a89c04519e0

        SHA1

        a10b03234627ca8f3f8034cd5637cda1b8246d83

        SHA256

        663fe0f4e090583e6aa5204b9a80b7a76f677259066e56a7345aebc6bc3e7d31

        SHA512

        ad5490e9865caa454c47ec2e96364b9c566b553e64801da60c295acd570017747be1aff6f22ca6c20c6eee6f6d05a058af72569fd6e656f66e48010978c7fd51

      • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

        Filesize

        658KB

        MD5

        c549eec74d37ec23c11a7d1b6f3efb0d

        SHA1

        8a0bb323de93fdde89e06192d3afd7f24db470fd

        SHA256

        25316e3661055e9d44b8b59144e6319669650af3c5ac11664d235195ef2db22c

        SHA512

        68e5ecc9b6b96daf983bfc08fb7420a096716de3a0c2091117abfda283860ad6ff5f8546448d51591ace9c764dca6e6d8e884a69bf4e79cf9436149878646686

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6RE3B9WV\soft[1]

        Filesize

        987KB

        MD5

        f49d1aaae28b92052e997480c504aa3b

        SHA1

        a422f6403847405cee6068f3394bb151d8591fb5

        SHA256

        81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

        SHA512

        41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JE748OL2\info[1].htm

        Filesize

        21B

        MD5

        fe9b08252f126ddfcb87fb82f9cc7677

        SHA1

        93e2607dac726a747928ac56956de240b93fe798

        SHA256

        e63e7ebe4c2db7e61ffc71af0675e870bcde0a9d8916e5b3be0cb252478030bf

        SHA512

        bbc7da99df2277967a48c62961ca502619949c6d3d2d3e6fe539792ebae8cb6b9eb1ef4b5ce3651854b25682e900ecf2cd4930a91aada916b710502c0872fb10

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KLW6KTZZ\fuckingdllENCR[3].dll

        Filesize

        97KB

        MD5

        4bc1ef6688690af3dd8d3d70906a9f98

        SHA1

        04c3e362fd3341e048aaa6bfa8bd7c76beab2670

        SHA256

        6bbfc32b36972b252587914130ff5018e20b4327d28a4ae6db06395b80aca4ce

        SHA512

        790fc9d4385dc160f52ceb269c9193400f41e5035d2f98dfce5c78abe800df7787daf534971f7c681329319d4436f5ee9a871874933e9f60f40d7f6cf73ecb26

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KLW6KTZZ\service[1].htm

        Filesize

        1B

        MD5

        cfcd208495d565ef66e7dff9f98764da

        SHA1

        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

        SHA256

        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

        SHA512

        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VY9J3PP9\dll[1]

        Filesize

        236KB

        MD5

        2ecb51ab00c5f340380ecf849291dbcf

        SHA1

        1a4dffbce2a4ce65495ed79eab42a4da3b660931

        SHA256

        f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

        SHA512

        e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

      • C:\Users\Admin\Desktop\YCL.lnk

        Filesize

        2KB

        MD5

        a22ef645b45f2bfb64132e5d67a7e3d4

        SHA1

        daea58aa79d642b43c85ec3d2c958bf6bdb03d52

        SHA256

        8f4177188eba7701bde6a4eee32d2958e8fb32c3cbf3c6623339112f90a7a990

        SHA512

        1e98032b25965a5f005b36b46e0e3891cf9d9393990cd85a5cf67dfa2dd8c7320ec12070169ec0f5329b1c0295889db5ebaf7de67a5987a8acb6c346894d8065

      • C:\Users\Admin\Desktop\YCL.lnk

        Filesize

        2KB

        MD5

        3afcfdc60ed5fd1a731b865021711a32

        SHA1

        563bf70d6700a803347c45b48d6ca5a974d29d6f

        SHA256

        d1ec8672667db4b5f7ed7d0fdba94b87917a148dab23efcbb13babc1ca04ba88

        SHA512

        b55dd031ce57a0944a8264f08b869751613788d7e511e5d2d1e459e072ae51a599823c7beb4f50348eb5c4f2363c0cc30f97650eaed11d4e9524ef20de919a12

      • C:\Users\Admin\Desktop\YCL.lnk

        Filesize

        2KB

        MD5

        57c551538fb612582542223cdcaabd7a

        SHA1

        9116ff91c2cc7fcd61aef7e790ac931514912fdb

        SHA256

        9748a737af5ca13e2bf1f054349e597e07ea646a10a460f614de5977dd491ace

        SHA512

        30c4b84c45709007b40194225d16e630198b4ae92f6b242f98e1e3249dde4f8ea63c617d55cc485303fabb829e8408de7c319e1c34a0df05c6702a829800d60e

      • C:\Users\Admin\Desktop\YCL.lnk

        Filesize

        2KB

        MD5

        324550b70282021f0c9b7d1f26f43bdf

        SHA1

        e9f14a9448a245d8cc0223e98165b0bb98842571

        SHA256

        78a488d40e7eab4060ef3e75683cc9476cc62552975fb0975c207bb49a64c960

        SHA512

        214f4c9de9e4e8a09e6e92d6afc77794420ab53bff44009294d9c49e3bc399c1445d98bc13ef38f567041330d2b339a36caf2354f106741c36beae8f5d5ff3ab

      • C:\Users\Admin\Desktop\YCL.lnk

        Filesize

        2KB

        MD5

        bd4ab93ac39c23a4a9d25fdd2a4675eb

        SHA1

        f37bf29fd92f5d32be133c6fd89472cfc80545e7

        SHA256

        597db5f111b53ca26b31a5f46c479ef983680ce1eb46b5d58cab8f331654dcd8

        SHA512

        09f5236e579030eb0631b7b500e8110109999ad7b83bf5d3f039cb1b3c1532dcd13c906bc57b0a5b89a67f7ab5b0d33a25c48de47fde9659a66514b7e261d908

      • C:\Users\Admin\Desktop\YCL.lnk

        Filesize

        2KB

        MD5

        724ec7cf9566cf7dea897f5f421a63df

        SHA1

        48be757ad311b00eb721b520a24cc05cdf4f5914

        SHA256

        2c61ef3f305d1f6480358b70b144cd09d408540a46f36beda598b494874a52eb

        SHA512

        943da55a3bfdc506ee250cd3ab190d9cf8ac45a9453657a22f6065b67ad9a1d6f98519e79a0b7fbfe4ca6a304e77bf2a69254711acdac4949f4493dbc638eae9

      • C:\Users\Admin\Desktop\YCL.lnk

        Filesize

        2KB

        MD5

        591ec83162848fd3c7df069ef99a706b

        SHA1

        1b359b2bea2f3e144e38b19f65257177e1e05109

        SHA256

        07aad04dc12285630aaa1793ba1000ca47825639920e11c3e4ffbc23f37975bf

        SHA512

        4536bd4d3c10c2d51478d2b10503bcf9372e52781ce9dc8e236e163a6db1a789171b6ccf89a6c30970eb374ec4fc6c1bc0395d1ffe786bf1cc174b32fee7914c

      • C:\Users\Admin\Desktop\YCL.lnk

        Filesize

        2KB

        MD5

        a39f573c6b7651f08331e5875d285f8b

        SHA1

        ae4a38bb3a81815a3376d1cef19f4332c151a9b0

        SHA256

        7f24e4f6fa3ee4da6ce474651ffc5cd184863895360445713797624dacf9ca8f

        SHA512

        8a458aedd6b1d9973a1334650d3b4e217da103e8ba5fd94685f957f6f58f6e7ecf6a36291885977291e36828317e52b944501e5f1db0620bbe0560344724f1cf

      • C:\Windows\SystemTemp\msedge_installer.log

        Filesize

        74KB

        MD5

        90f298671092178d55d5d8ee2e400eb6

        SHA1

        3e377837a5a097767d4ca65d4f35d66f787923c5

        SHA256

        2467483fb789fbd0ff44e0fe9d6327d72b030a25f4416ba700a7065bfd98ca73

        SHA512

        79124097c5baf3f624d4cdaddd3704596ea9e1ec7ce4d4857cc63ae481744c2347b7487c227890d6eab5bed0921e6e7e612ec56e04517244c066bb8ff880f2f8

      • C:\Windows\SystemTemp\msedge_installer.log

        Filesize

        101KB

        MD5

        dcbafa397b493a83a70b93fcb0428c26

        SHA1

        1010680daf063bab581557741af1c88c735afc1e

        SHA256

        82fc991afad5d4c9e19dbf9e791c55f48f3fb83405aa0b3be3d4096af89dd538

        SHA512

        5aecb71c0d8f1ae7dac1201357d91e04a078759cd2eca14efc3158566d326b1f9887942a15e412b5adfca988a11fe92f072ce90a0af5d00197388bc60ce12469

      • C:\Windows\SystemTemp\msedge_installer.log

        Filesize

        106KB

        MD5

        acae8dfb843075caa80381ef38d8ac8d

        SHA1

        4485502f205c3c52ecec7b606556c98a524ab020

        SHA256

        3eba139f53486bdc0cf244a9926d4ef5635d7098aedf71e38dabc711c3f90410

        SHA512

        86fb83c89210e4c2c02315ed52b4e5c588f9ca7e2fed2123c1e1b88fab17f39bdb3b61be8cc615f2f57bc8730095fee10cc32d523d349afd3679af5df6313eea

      • memory/604-153-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/604-94-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/604-118-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/704-150-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/704-92-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/704-115-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/704-119-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/872-117-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/872-174-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/872-135-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/872-95-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/916-121-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/956-140-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/956-90-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/956-112-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/956-107-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/1432-124-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/1544-30-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/1544-25-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1544-52-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1544-23-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1544-24-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1544-37-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1544-21-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2184-13-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/2184-6-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/2184-18-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/2184-12-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/2184-17-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/2184-14-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/2184-15-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/2184-7-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/2184-16-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/2184-8-0x0000025E202B0000-0x0000025E202B1000-memory.dmp

        Filesize

        4KB

      • memory/3220-61-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3220-56-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3220-55-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3220-57-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3844-93-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3844-178-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3844-116-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3912-65-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3912-60-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3980-114-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3980-105-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3980-91-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/3980-176-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/4424-120-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/4496-77-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/4496-82-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/4496-83-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/4496-103-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/4920-122-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/4936-123-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5024-125-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5064-0-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5064-5-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5064-4-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5064-3-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5064-26-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5064-20-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5064-2-0x0000000000DF1000-0x000000000102E000-memory.dmp

        Filesize

        2.2MB

      • memory/5064-19-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5064-1-0x0000000077B66000-0x0000000077B68000-memory.dmp

        Filesize

        8KB

      • memory/5180-126-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5200-127-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5352-128-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5480-130-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5708-131-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5836-132-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/5988-133-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/6120-134-0x0000000000DF0000-0x00000000018C3000-memory.dmp

        Filesize

        10.8MB

      • memory/6272-102-0x00000000004B0000-0x00000000004DF000-memory.dmp

        Filesize

        188KB

      • memory/6272-98-0x00000000004B0000-0x00000000004DF000-memory.dmp

        Filesize

        188KB

      • memory/6632-138-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB