Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10241105-dtx...ed.zip
windows7-x64
1241105-dtx...ed.zip
windows10-2004-x64
8d91912b4b9...37.rar
windows7-x64
1d91912b4b9...37.rar
windows10-2004-x64
808751be484...2d.dll
windows7-x64
1008751be484...2d.dll
windows10-2004-x64
100a9f79abd4...51.exe
windows7-x64
30a9f79abd4...51.exe
windows10-2004-x64
80di3x.exe
windows7-x64
100di3x.exe
windows10-2004-x64
10201106-9sx...ed.zip
windows7-x64
1201106-9sx...ed.zip
windows10-2004-x64
82019-09-02...10.exe
windows7-x64
102019-09-02...10.exe
windows10-2004-x64
102c01b00772...eb.exe
windows7-x64
102c01b00772...eb.exe
windows10-2004-x64
1031.exe
windows7-x64
1031.exe
windows10-2004-x64
103DMark 11 ...on.exe
windows7-x64
33DMark 11 ...on.exe
windows10-2004-x64
842f9729255...61.exe
windows7-x64
1042f9729255...61.exe
windows10-2004-x64
105da0116af4...18.exe
windows7-x64
105da0116af4...18.exe
windows10-2004-x64
106306868794.bin.zip
windows7-x64
16306868794.bin.zip
windows10-2004-x64
869c56d12ed...6b.exe
windows7-x64
1069c56d12ed...6b.exe
windows10-2004-x64
10905d572f23...50.exe
windows7-x64
10905d572f23...50.exe
windows10-2004-x64
10948340be97...54.exe
windows7-x64
10948340be97...54.exe
windows10-2004-x64
10Analysis
-
max time kernel
900s -
max time network
900s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2025, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
241105-dtxrgatbpg_pw_infected.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
241105-dtxrgatbpg_pw_infected.zip
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
d91912b4b945e88e881e54573390e6723cfc41916b6546453b59e60f9beee337.rar
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
d91912b4b945e88e881e54573390e6723cfc41916b6546453b59e60f9beee337.rar
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
0di3x.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
0di3x.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral11
Sample
201106-9sxjh7tvxj_pw_infected.zip
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
201106-9sxjh7tvxj_pw_infected.zip
Resource
win10v2004-20250211-en
Behavioral task
behavioral13
Sample
2019-09-02_22-41-10.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
2019-09-02_22-41-10.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral15
Sample
2c01b007729230c415420ad641ad92eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
2c01b007729230c415420ad641ad92eb.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral17
Sample
31.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
31.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral19
Sample
3DMark 11 Advanced Edition.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
3DMark 11 Advanced Edition.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral21
Sample
42f972925508a82236e8533567487761.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
42f972925508a82236e8533567487761.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral23
Sample
5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral25
Sample
6306868794.bin.zip
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
6306868794.bin.zip
Resource
win10v2004-20250207-en
Behavioral task
behavioral27
Sample
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral29
Sample
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral31
Sample
948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
Resource
win10v2004-20250211-en
General
-
Target
42f972925508a82236e8533567487761.exe
-
Size
3.7MB
-
MD5
9d2a888ca79e1ff3820882ea1d88d574
-
SHA1
112c38d80bf2c0d48256249bbabe906b834b1f66
-
SHA256
8b5b38085f12d51393ed5a481a554074d3c482d53ecd917f2f5dffdf3d2ee138
-
SHA512
17a9f74ecf9f118ed0252fa0bc6ce0f9758a4dc75f238cae304def9c37cd94623818dd4aef38826642ff9e549b7e6047318f8bf6de7edff2d61a298d0bf5c840
-
SSDEEP
98304:Nn1CVf+y/EFc7DvOUxlpq2JdnQ+O2M7hlXKUmkbtT2TMI:A/EqaUFqItO2M7PXKUmkbtT2T
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
warzonerat
sandyclark255.hopto.org:5200
Extracted
babylonrat
sandyclark255.hopto.org
Extracted
asyncrat
0.5.6A
null
sandyclark255.hopto.org:6606
sandyclark255.hopto.org:8808
sandyclark255.hopto.org:7707
adweqsds56332
-
delay
5
-
install
true
-
install_file
prndrvest.exe
-
install_folder
%AppData%
Extracted
darkcomet
2020NOV1
sandyclark255.hopto.org:35887
DC_MUTEX-6XT818D
-
InstallPath
excelsl.exe
-
gencode
n7asq0Dbu7D2
-
install
true
-
offline_keylogger
true
-
password
hhhhhh
-
persistence
true
-
reg_key
office
Signatures
-
Asyncrat family
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Babylonrat family
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\k4Xq51JTS0f2R98Z\\eiUehCedN8hB.exe\",explorer.exe" lPmftrjo4f4XVUvl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\excelsl.exe" svuhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\k4Xq51JTS0f2R98Z\\6ybycbIPY66p.exe\",explorer.exe" svbhost.exe -
Njrat family
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral22/memory/4508-119-0x00000000048D0000-0x00000000048E2000-memory.dmp family_asyncrat -
Warzone RAT payload 2 IoCs
resource yara_rule behavioral22/memory/3984-104-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral22/memory/3984-101-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svuhost.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file 3 IoCs
flow pid Process 37 2848 Process not Found 90 2848 Process not Found 57 4744 Process not Found -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts svuhost.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4796 netsh.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\Control Panel\International\Geo\Nation 42f972925508a82236e8533567487761.exe Key value queried \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\Control Panel\International\Geo\Nation svuhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\Control Panel\International\Geo\Nation 51EZFdY4dfCSa7Ei.exe Key value queried \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\Control Panel\International\Geo\Nation Ab6tt2WvkWkv7kKU.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2d790bed038373d95093d4db590b9997.exe svehosts.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2d790bed038373d95093d4db590b9997.exe svehosts.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 29 IoCs
pid Process 3980 51EZFdY4dfCSa7Ei.exe 4160 lPmftrjo4f4XVUvl.exe 5080 bnGrgxSLvC7FoIQ7.exe 4508 Ab6tt2WvkWkv7kKU.exe 2468 SHUaLHWdDcqW3loY.exe 1256 34ALL5kXXkA7RWQp.exe 2964 svthost.exe 4808 svbhost.exe 3984 eridjeht.exe 3720 svrhost.exe 4020 svbhost.exe 3700 svuhost.exe 3564 excelsl.exe 4516 svehosts.exe 4272 svuhost.exe 4588 svbhost.exe 4968 prndrvest.exe 2224 setup.exe 2084 setup.exe 4584 setup.exe 4380 setup.exe 4692 setup.exe 1992 setup.exe 644 setup.exe 4912 setup.exe 3040 setup.exe 3344 setup.exe 1748 setup.exe 4376 setup.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\office = "C:\\Users\\Admin\\Documents\\excelsl.exe" svuhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\office = "C:\\Users\\Admin\\Documents\\excelsl.exe" svuhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2d790bed038373d95093d4db590b9997 = "\"C:\\Windows\\svehosts.exe\" .." svehosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2d790bed038373d95093d4db590b9997 = "\"C:\\Windows\\svehosts.exe\" .." svehosts.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4696 set thread context of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4160 set thread context of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 1256 set thread context of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 2468 set thread context of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 5080 set thread context of 3700 5080 bnGrgxSLvC7FoIQ7.exe 104 PID 3564 set thread context of 4272 3564 excelsl.exe 112 PID 4020 set thread context of 4588 4020 svbhost.exe 116 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\bn-IN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\fr-CA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\fa.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\notification_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\lv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedge_200_percent.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\en-GB.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Sigma\Advertising setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\ml.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\MEIPreload\manifest.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedge_200_percent.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Sigma\LICENSE setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\lb.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedge_wer.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\ga.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\dxil.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\et.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\eu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ne.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedge_elf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\as.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\EDGEMITMP_0BB6E.tmp\setup.exe MicrosoftEdge_X64_133.0.3065.69_132.0.2957.140.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.69\VisualElements\SmallLogoDev.png setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\canary.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Sigma\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\th.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\mk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.69\Trust Protection Lists\Mu\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.69\Locales\ka.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\az.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Edge.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\msedge.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\am.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\cy.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\webview2_integration.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\elevation_service.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\nb.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\dual_engine_adapter_x64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\edge_game_assist\VERSION setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\mi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\EdgeWebView.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedge.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Sigma\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\eu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.69\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.69\identity_proxy\resources.pri setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Temp\source2224_1711092354\MSEDGE.7z setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\onramp.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Mu\Analytics setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\vccorlib140.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\VisualElements\LogoBeta.png setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedgewebview2.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\sv.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\BHO\ie_to_edge_bho_64.dll setup.exe File opened for modification C:\Program Files\msedge_installer.log setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ug.pak setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.69\Trust Protection Lists\Mu\Entities setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\zh-TW.pak setup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svehosts.exe 51EZFdY4dfCSa7Ei.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 3120 4696 WerFault.exe 85 4628 1256 WerFault.exe 90 964 2468 WerFault.exe 91 2268 5080 WerFault.exe 88 3724 3564 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eridjeht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svuhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51EZFdY4dfCSa7Ei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lPmftrjo4f4XVUvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language excelsl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svehosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svbhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svuhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnGrgxSLvC7FoIQ7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SHUaLHWdDcqW3loY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34ALL5kXXkA7RWQp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svbhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prndrvest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42f972925508a82236e8533567487761.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ab6tt2WvkWkv7kKU.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 432 MicrosoftEdgeUpdate.exe 4592 MicrosoftEdgeUpdate.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 640 timeout.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\Software\Microsoft\Internet Explorer\GPU wwahost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\SOFTWARE\Microsoft\Internet Explorer\GPU wwahost.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\ApplicationDescription = "Browse the web" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\MIME\Database\Content Type\ setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheVersion = "1" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer\DomStorageState wwahost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\History wwahost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithProgIds\MSEdgeMHT setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO\\ie_to_edge_bho.dll" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable\ setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\runas\command setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.webp\OpenWithProgids\MSEdgeHTM setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xml\OpenWithProgIds\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/html setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\ = "Microsoft Edge HTML Document" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\AppUserModelId = "MSEdge" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\DefaultIcon setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win64\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\elevation_service.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13}\ = "ie_to_edge_bho" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\CLSID\ = "{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.html\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.svg\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer\DOMStorage\office.com\ = "0" wwahost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\PdfPreview\\PdfPreviewHandler.dll" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\shell\open setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\AppUserModelId = "MSEdge" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.html setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.shtml setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\AppId = "{628ACE20-B77A-456F-A88D-547DB6CEEDD5}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/pdf setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\runas\ProgrammaticAccessOnly setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib\ = "{C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\elevation_service.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\DefaultIcon setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\DefaultIcon setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svuhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\AppID = "{6d2b5079-2f0b-48dd-ab7f-97cec514d30b}" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheVersion = "1" wwahost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\DefaultIcon\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\msedge.exe,0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\ApplicationDescription = "Browse the web" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.shtml\OpenWithProgids\MSEdgeHTM setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ = "ie_to_edge_bho.IEToEdgeBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\ApplicationIcon = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\msedge.exe,0" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.htm setup.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 4696 42f972925508a82236e8533567487761.exe 4696 42f972925508a82236e8533567487761.exe 4696 42f972925508a82236e8533567487761.exe 4160 lPmftrjo4f4XVUvl.exe 4160 lPmftrjo4f4XVUvl.exe 1256 34ALL5kXXkA7RWQp.exe 1256 34ALL5kXXkA7RWQp.exe 1256 34ALL5kXXkA7RWQp.exe 2468 SHUaLHWdDcqW3loY.exe 2468 SHUaLHWdDcqW3loY.exe 2468 SHUaLHWdDcqW3loY.exe 2468 SHUaLHWdDcqW3loY.exe 5080 bnGrgxSLvC7FoIQ7.exe 5080 bnGrgxSLvC7FoIQ7.exe 5080 bnGrgxSLvC7FoIQ7.exe 5080 bnGrgxSLvC7FoIQ7.exe 3564 excelsl.exe 3564 excelsl.exe 3564 excelsl.exe 4020 svbhost.exe 4020 svbhost.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4508 Ab6tt2WvkWkv7kKU.exe 4968 prndrvest.exe 4692 setup.exe 4692 setup.exe 1152 LocalBridge.exe 1152 LocalBridge.exe 1152 LocalBridge.exe 1152 LocalBridge.exe 1152 LocalBridge.exe 1152 LocalBridge.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3720 svrhost.exe 4808 svbhost.exe 4516 svehosts.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4696 42f972925508a82236e8533567487761.exe Token: SeDebugPrivilege 4696 42f972925508a82236e8533567487761.exe Token: SeDebugPrivilege 3980 51EZFdY4dfCSa7Ei.exe Token: SeDebugPrivilege 3980 51EZFdY4dfCSa7Ei.exe Token: SeDebugPrivilege 4160 lPmftrjo4f4XVUvl.exe Token: SeDebugPrivilege 4160 lPmftrjo4f4XVUvl.exe Token: SeDebugPrivilege 1256 34ALL5kXXkA7RWQp.exe Token: SeDebugPrivilege 2468 SHUaLHWdDcqW3loY.exe Token: SeShutdownPrivilege 4808 svbhost.exe Token: SeDebugPrivilege 4808 svbhost.exe Token: SeTcbPrivilege 4808 svbhost.exe Token: SeDebugPrivilege 4508 Ab6tt2WvkWkv7kKU.exe Token: SeDebugPrivilege 5080 bnGrgxSLvC7FoIQ7.exe Token: SeIncreaseQuotaPrivilege 3700 svuhost.exe Token: SeSecurityPrivilege 3700 svuhost.exe Token: SeTakeOwnershipPrivilege 3700 svuhost.exe Token: SeLoadDriverPrivilege 3700 svuhost.exe Token: SeSystemProfilePrivilege 3700 svuhost.exe Token: SeSystemtimePrivilege 3700 svuhost.exe Token: SeProfSingleProcessPrivilege 3700 svuhost.exe Token: SeIncBasePriorityPrivilege 3700 svuhost.exe Token: SeCreatePagefilePrivilege 3700 svuhost.exe Token: SeBackupPrivilege 3700 svuhost.exe Token: SeRestorePrivilege 3700 svuhost.exe Token: SeShutdownPrivilege 3700 svuhost.exe Token: SeDebugPrivilege 3700 svuhost.exe Token: SeSystemEnvironmentPrivilege 3700 svuhost.exe Token: SeChangeNotifyPrivilege 3700 svuhost.exe Token: SeRemoteShutdownPrivilege 3700 svuhost.exe Token: SeUndockPrivilege 3700 svuhost.exe Token: SeManageVolumePrivilege 3700 svuhost.exe Token: SeImpersonatePrivilege 3700 svuhost.exe Token: SeCreateGlobalPrivilege 3700 svuhost.exe Token: 33 3700 svuhost.exe Token: 34 3700 svuhost.exe Token: 35 3700 svuhost.exe Token: 36 3700 svuhost.exe Token: SeDebugPrivilege 3564 excelsl.exe Token: SeIncreaseQuotaPrivilege 4272 svuhost.exe Token: SeSecurityPrivilege 4272 svuhost.exe Token: SeTakeOwnershipPrivilege 4272 svuhost.exe Token: SeLoadDriverPrivilege 4272 svuhost.exe Token: SeSystemProfilePrivilege 4272 svuhost.exe Token: SeSystemtimePrivilege 4272 svuhost.exe Token: SeProfSingleProcessPrivilege 4272 svuhost.exe Token: SeIncBasePriorityPrivilege 4272 svuhost.exe Token: SeCreatePagefilePrivilege 4272 svuhost.exe Token: SeBackupPrivilege 4272 svuhost.exe Token: SeRestorePrivilege 4272 svuhost.exe Token: SeShutdownPrivilege 4272 svuhost.exe Token: SeDebugPrivilege 4272 svuhost.exe Token: SeSystemEnvironmentPrivilege 4272 svuhost.exe Token: SeChangeNotifyPrivilege 4272 svuhost.exe Token: SeRemoteShutdownPrivilege 4272 svuhost.exe Token: SeUndockPrivilege 4272 svuhost.exe Token: SeManageVolumePrivilege 4272 svuhost.exe Token: SeImpersonatePrivilege 4272 svuhost.exe Token: SeCreateGlobalPrivilege 4272 svuhost.exe Token: 33 4272 svuhost.exe Token: 34 4272 svuhost.exe Token: 35 4272 svuhost.exe Token: 36 4272 svuhost.exe Token: SeDebugPrivilege 4516 svehosts.exe Token: SeDebugPrivilege 4516 svehosts.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4808 svbhost.exe 4272 svuhost.exe 1552 wwahost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 3980 4696 42f972925508a82236e8533567487761.exe 86 PID 4696 wrote to memory of 3980 4696 42f972925508a82236e8533567487761.exe 86 PID 4696 wrote to memory of 3980 4696 42f972925508a82236e8533567487761.exe 86 PID 4696 wrote to memory of 4160 4696 42f972925508a82236e8533567487761.exe 87 PID 4696 wrote to memory of 4160 4696 42f972925508a82236e8533567487761.exe 87 PID 4696 wrote to memory of 4160 4696 42f972925508a82236e8533567487761.exe 87 PID 4696 wrote to memory of 5080 4696 42f972925508a82236e8533567487761.exe 88 PID 4696 wrote to memory of 5080 4696 42f972925508a82236e8533567487761.exe 88 PID 4696 wrote to memory of 5080 4696 42f972925508a82236e8533567487761.exe 88 PID 4696 wrote to memory of 4508 4696 42f972925508a82236e8533567487761.exe 89 PID 4696 wrote to memory of 4508 4696 42f972925508a82236e8533567487761.exe 89 PID 4696 wrote to memory of 4508 4696 42f972925508a82236e8533567487761.exe 89 PID 4696 wrote to memory of 1256 4696 42f972925508a82236e8533567487761.exe 90 PID 4696 wrote to memory of 1256 4696 42f972925508a82236e8533567487761.exe 90 PID 4696 wrote to memory of 1256 4696 42f972925508a82236e8533567487761.exe 90 PID 4696 wrote to memory of 2468 4696 42f972925508a82236e8533567487761.exe 91 PID 4696 wrote to memory of 2468 4696 42f972925508a82236e8533567487761.exe 91 PID 4696 wrote to memory of 2468 4696 42f972925508a82236e8533567487761.exe 91 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4696 wrote to memory of 2964 4696 42f972925508a82236e8533567487761.exe 92 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 4160 wrote to memory of 4808 4160 lPmftrjo4f4XVUvl.exe 96 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 1256 wrote to memory of 3984 1256 34ALL5kXXkA7RWQp.exe 97 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 2468 wrote to memory of 3720 2468 SHUaLHWdDcqW3loY.exe 100 PID 4808 wrote to memory of 4020 4808 svbhost.exe 102 PID 4808 wrote to memory of 4020 4808 svbhost.exe 102 PID 4808 wrote to memory of 4020 4808 svbhost.exe 102 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\42f972925508a82236e8533567487761.exe"C:\Users\Admin\AppData\Local\Temp\42f972925508a82236e8533567487761.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\51EZFdY4dfCSa7Ei.exe"C:\Users\Admin\AppData\Local\Temp\51EZFdY4dfCSa7Ei.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3980 -
C:\Windows\svehosts.exe"C:\Windows\svehosts.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4516 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\svehosts.exe" "svehosts.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\lPmftrjo4f4XVUvl.exe"C:\Users\Admin\AppData\Local\Temp\lPmftrjo4f4XVUvl.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe"C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe"C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe" 48084⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe"C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe"5⤵
- Executes dropped EXE
PID:4588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bnGrgxSLvC7FoIQ7.exe"C:\Users\Admin\AppData\Local\Temp\bnGrgxSLvC7FoIQ7.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe"C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe"3⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3700 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:440
-
-
C:\Users\Admin\Documents\excelsl.exe"C:\Users\Admin\Documents\excelsl.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe"C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe"5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4272 -
C:\Windows\SysWOW64\notepad.exenotepad6⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 11565⤵
- Program crash
PID:3724
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 11643⤵
- Program crash
PID:2268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Ab6tt2WvkWkv7kKU.exe"C:\Users\Admin\AppData\Local\Temp\Ab6tt2WvkWkv7kKU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'prndrvest"' /tr "'C:\Users\Admin\AppData\Roaming\prndrvest.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC7DF.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:640
-
-
C:\Users\Admin\AppData\Roaming\prndrvest.exe"C:\Users\Admin\AppData\Roaming\prndrvest.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\34ALL5kXXkA7RWQp.exe"C:\Users\Admin\AppData\Local\Temp\34ALL5kXXkA7RWQp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\fI87ltOJhCNhEwlw\eridjeht.exe"C:\Users\Admin\AppData\Local\Temp\fI87ltOJhCNhEwlw\eridjeht.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 11603⤵
- Program crash
PID:4628
-
-
-
C:\Users\Admin\AppData\Local\Temp\SHUaLHWdDcqW3loY.exe"C:\Users\Admin\AppData\Local\Temp\SHUaLHWdDcqW3loY.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\9Wr8gF4Xq79ka0w0\svrhost.exe"C:\Users\Admin\AppData\Local\Temp\9Wr8gF4Xq79ka0w0\svrhost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 11283⤵
- Program crash
PID:964
-
-
-
C:\Users\Admin\AppData\Local\Temp\6ax0Yc8236t6EQMa\svthost.exe"C:\Users\Admin\AppData\Local\Temp\6ax0Yc8236t6EQMa\svthost.exe"2⤵
- Executes dropped EXE
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 15802⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4696 -ip 46961⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1256 -ip 12561⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2468 -ip 24681⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5080 -ip 50801⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3564 -ip 35641⤵PID:3140
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODIxNjkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1MzE4NTEwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NjU0NTM5MzQ1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:432
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\MicrosoftEdge_X64_133.0.3065.59.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵PID:2264
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
PID:2224 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6b8b76a68,0x7ff6b8b76a74,0x7ff6b8b76a803⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2084
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4584 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6b8b76a68,0x7ff6b8b76a74,0x7ff6b8b76a804⤵
- Executes dropped EXE
PID:4380
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4692 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6cb026a68,0x7ff6cb026a74,0x7ff6cb026a804⤵
- Executes dropped EXE
PID:4912
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level3⤵
- Executes dropped EXE
PID:1992 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x228,0x22c,0x230,0x200,0x234,0x7ff6cb026a68,0x7ff6cb026a74,0x7ff6cb026a804⤵
- Executes dropped EXE
PID:3040
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level3⤵
- Executes dropped EXE
PID:644 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6cb026a68,0x7ff6cb026a74,0x7ff6cb026a804⤵
- Executes dropped EXE
PID:3344
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness1⤵PID:1012
-
C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe"C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
C:\Windows\system32\wwahost.exe"C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1552
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\MicrosoftEdge_X64_133.0.3065.69_132.0.2957.140.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\MicrosoftEdge_X64_133.0.3065.69_132.0.2957.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level1⤵
- Drops file in Program Files directory
PID:3192 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\EDGEMITMP_0BB6E.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\EDGEMITMP_0BB6E.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\MicrosoftEdge_X64_133.0.3065.69_132.0.2957.140.exe" --previous-version="132.0.2957.140" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1748 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\EDGEMITMP_0BB6E.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\EDGEMITMP_0BB6E.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\EDGEMITMP_0BB6E.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff7e6966a68,0x7ff7e6966a74,0x7ff7e6966a803⤵
- Executes dropped EXE
PID:4376
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping <?xml version="1.0" encoding="UTF-8"?><request protocol="3.0" updater="Omaha" updaterversion="1.3.195.43" shell_version="1.3.195.43" ismachine="1" sessionid="{5A9A34F1-61F9-47EF-863B-638D08445F62}" userid="{5290AA76-E42C-48F2-83A5-43473AFC256F}" installsource="scheduler" requestid="{4A981546-A3CB-4E15-A519-D91C5548EF29}" dedup="cr" domainjoined="0"><hw logical_cpus="2" physmemory="4" disk_type="2" sse="1" sse2="1" sse3="1" ssse3="1" sse41="1" sse42="1" avx="1"/><os platform="win" version="10.0.19041.1288" sp="" arch="x64" product_type="48" is_wip="0" is_in_lockdown_mode="0"/><oem product_manufacturer="" product_name=""/><exp etag="&quot;VPQoP1F+fq15wRzh1kPL4PMpWh8ORMB5izvrOC/chjQ=&quot;"/><app appid="{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}" version="1.3.195.43" nextversion="" lang="" brand="INBX" client="" installage="4" cohort="rrf@0.70"><updatecheck/><ping r="5" rd="6616" ping_freshness="{1CB27BFF-0A58-466E-8695-F44E9292EA5C}"/></app><app appid="{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}" version="92.0.902.67" nextversion="133.0.3065.59" lang="" brand="INBX" client="" experiments="consent=false" installage="4" is_pinned_system="true" last_launch_count="1" last_launch_time="133837570297043710"><updatecheck/><event eventtype="12" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="5742820569" done_before_oobe_complete="0"/><event eventtype="13" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="5742820569" done_before_oobe_complete="0"/><event eventtype="14" eventresult="0" errorcode="-2147023838" extracode1="0" system_uptime_ticks="11511101656" source_url_index="0" done_before_oobe_complete="0" downloader="do" url="http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/fed55805-2e85-41d8-b4e3-4ef6b5ebf63a?P1=1740272895&amp;P2=404&amp;P3=2&amp;P4=Ld15RsA8Ebsu4cjQTY4xEUb%2bDWjekYQQWDQv6uvwkhSPRbhvmldpFSMc%2f0WONPhHuD35RCzn60SMTJf%2bRnMRog%3d%3d" server_ip_hint="" cdn_cid="-1" cdn_ccc="" cdn_msedge_ref="" cdn_azure_ref_origin_shield="" cdn_cache="" cdn_p3p="" downloaded="0" total="0" download_time_ms="0"/><event eventtype="14" eventresult="0" errorcode="-2147012894" extracode1="0" system_uptime_ticks="11511101656" source_url_index="0" done_before_oobe_complete="0" downloader="bits" url="http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/fed55805-2e85-41d8-b4e3-4ef6b5ebf63a?P1=1740272895&amp;P2=404&amp;P3=2&amp;P4=Ld15RsA8Ebsu4cjQTY4xEUb%2bDWjekYQQWDQv6uvwkhSPRbhvmldpFSMc%2f0WONPhHuD35RCzn60SMTJf%2bRnMRog%3d%3d" server_ip_hint="" cdn_cid="-1" cdn_ccc="" cdn_msedge_ref="" cdn_azure_ref_origin_shield="" cdn_cache="" cdn_p3p="" downloaded="15850126" total="178604088" download_time_ms="543890"/><event eventtype="14" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="11511101656" source_url_index="0" done_before_oobe_complete="0" downloader="winhttp" url="http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/fed55805-2e85-41d8-b4e3-4ef6b5ebf63a?P1=1740272895&amp;P2=404&amp;P3=2&amp;P4=Ld15RsA8Ebsu4cjQTY4xEUb%2bDWjekYQQWDQv6uvwkhSPRbhvmldpFSMc%2f0WONPhHuD35RCzn60SMTJf%2bRnMRog%3d%3d" server_ip_hint="96.17.178.190" cdn_cid="2" cdn_ccc="GB" cdn_msedge_ref="" cdn_azure_ref_origin_shield="" cdn_cache="" cdn_p3p="" downloaded="178604088" total="178604088" download_time_ms="26594"/><event eventtype="14" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="11511258248" source_url_index="0" done_before_oobe_complete="0"/><event eventtype="15" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="11526414503" done_before_oobe_complete="0"/><event eventtype="3" eventresult="1" errorcode="0" extracode1="196757" system_uptime_ticks="12269382947" source_url_index="0" done_before_oobe_complete="0" update_check_time_ms="3453" download_time_ms="576843" downloaded="178604088" total="178604088" package_cache_result="0" install_time_ms="74297"/><ping active="1" a="5" r="5" ad="6616" rd="6616" ping_freshness="{602D66D8-BF2A-41B8-BD62-96C36D770AD4}"/></app><app appid="{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}" version="132.0.2957.140" nextversion="133.0.3065.69" lang="" brand="GGLS" client="" installage="4" installdate="6615" cohort="rrf@0.42"><updatecheck/><event eventtype="12" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="5742820569" done_before_oobe_complete="0"/><event eventtype="13" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="12269382947" done_before_oobe_complete="0"/><event eventtype="14" eventresult="0" errorcode="-2147023838" extracode1="0" system_uptime_ticks="12624852153" source_url_index="0" done_before_oobe_complete="0" downloader="do" url="http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/b6242057-98d0-4bab-98e1-7014561dc663?P1=1740272897&amp;P2=404&amp;P3=2&amp;P4=JLCrQGIrdzQd4fhZSmttyvcuY7lxxb%2fqNpJfWf4DDs%2b%2fXZidL9C9zPJ8ufBAeCdCDdUrWPP8aFJc%2b4vQNZWY5Q%3d%3d" server_ip_hint="" cdn_cid="-1" cdn_ccc="" cdn_msedge_ref="" cdn_azure_ref_origin_shield="" cdn_cache="" cdn_p3p="" downloaded="0" total="0" download_time_ms="0"/><event eventtype="14" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="12624852153" source_url_index="0" done_before_oobe_complete="0" downloader="bits" url="http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/b6242057-98d0-4bab-98e1-7014561dc663?P1=1740272897&amp;P2=404&amp;P3=2&amp;P4=JLCrQGIrdzQd4fhZSmttyvcuY7lxxb%2fqNpJfWf4DDs%2b%2fXZidL9C9zPJ8ufBAeCdCDdUrWPP8aFJc%2b4vQNZWY5Q%3d%3d" server_ip_hint="" cdn_cid="-1" cdn_ccc="" cdn_msedge_ref="" cdn_azure_ref_origin_shield="" cdn_cache="" cdn_p3p="" downloaded="58499664" total="58499664" download_time_ms="34844"/><event eventtype="14" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="12625008494" source_url_index="0" done_before_oobe_complete="0"/><event eventtype="15" eventresult="1" errorcode="0" extracode1="0" system_uptime_ticks="12632976697" done_before_oobe_complete="0"/><event eventtype="3" eventresult="1" errorcode="0" extracode1="196757" system_uptime_ticks="13350164468" source_url_index="0" done_before_oobe_complete="0" update_check_time_ms="3453" download_time_ms="35546" downloaded="58499664" total="58499664" package_cache_result="0" install_time_ms="71719"/><ping r="5" rd="6616" ping_freshness="{16FAFB9A-E842-47B4-BB26-C6FDBE083F87}"/></app></request>5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4592
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a43e9ce8d33ed6eb2b8f5133450d64dd
SHA1f2b9a2eab4b80d7bef0a6e076423993b77f66332
SHA25639bace95aa685a42bb379404c0e4f2a11254a7d5ab9a9b5551d311d1dbc05bb6
SHA5129db1c9de9521cd7bd4af5062693d3557ab196fd552bb6000c1d4266426127c9c7c6eada263e90f99bf941fb1c863d10463940e164a03e0742ee070a35fbcdf6e
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01E136B-2103-4CFE-8353-B990059ACBD9}\EDGEMITMP_0BB6E.tmp\setup.exe
Filesize6.8MB
MD5bdb1aecedc15fc82a63083452dad45c2
SHA1a074fcd78665ff90ee3e50ffcccad5f6c3e7ddcb
SHA2564ea0907c3fc2c2f6a4259002312671c82e008846d49957bb3b9915612e35b99f
SHA51250909640c2957fc35dd5bcac3b51797aa5daa2fb95364e69df95d3577482e13f0c36a70ae098959cb9c2aaeb4cfe43025c1d8d55b5f8858b474bcb702609749d
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F3A49AE9-6B70-4C22-8779-258C9EC879B8}\EDGEMITMP_DD1C6.tmp\setup.exe
Filesize6.8MB
MD51b3e9c59f9c7a134ec630ada1eb76a39
SHA1a7e831d392e99f3d37847dcc561dd2e017065439
SHA256ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae
SHA512c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e
-
Filesize
3.9MB
MD5ad5f7dc7ca3e67dce70c0a89c04519e0
SHA1a10b03234627ca8f3f8034cd5637cda1b8246d83
SHA256663fe0f4e090583e6aa5204b9a80b7a76f677259066e56a7345aebc6bc3e7d31
SHA512ad5490e9865caa454c47ec2e96364b9c566b553e64801da60c295acd570017747be1aff6f22ca6c20c6eee6f6d05a058af72569fd6e656f66e48010978c7fd51
-
Filesize
74KB
MD5e259618d2c3c554969e66d07419c4e3b
SHA171ccb757c56bcb5a9ab3e6b8c882bd3cc223bfc9
SHA25621c1f0273d9e2459f94fc36027fb35367736b4af03ccad8101f0143b7b63a348
SHA5121435dd4a4facd4f1012504faf3a39827df71df799150aedb832da8355db332ed347904fa5470da5bf92b953807b665f72a28e73f8a4a0dbbeac3854714e7d1c0
-
Filesize
104KB
MD536b28b2280e5cb725d0846f61691ceb9
SHA124b29e78df9d3f72df1809d3affe3ddf113e6ba0
SHA2562d0394e14ff0ce93dfdc4822436552de5af9c0963b0208b9b234679bc09b5cc5
SHA5127e6bff265e9b9255ce5e11656f2c2b9dbc9c57b4b40d690e4497bcfe3e81d1a4c7f7fc43c8d1837775d587ba6630f05161071ec22ccf32b2f96e5805e8d37291
-
Filesize
104KB
MD5107fe610c0264cbd9c7044fcb5b7946c
SHA1e7cba727a16fa78921e2bbb53b7e237e77e57eba
SHA2569786ea77ea1df06831959e7feae91522507b136e38a6857c368f6b910539b200
SHA512de6aa60cbd12e7d1805e427313d2e332b7418a4c8c3337ae43822886cd9ee3051d8b362628fda0634f66b43d2317b631c4546248c0de3db2cf5a79b9438ded17
-
Filesize
112KB
MD52488a826f8d94b43b3a90f6cb0f6ea60
SHA18cf7c6df31dcfefa6c8a13788ef70ea1dadefe7c
SHA256cc9835b6853fe05edff4624df47c3589d0aad90eb17d8cab84979c5d9b81dda8
SHA512252608f7063c2eb820766d26c606903def0558670b90bbde30f6cd3f1aa7faf5f4c4f3dbbd49131cfe4f700702c6d57c81563ce919e0c5c2b9456662d1c3621f
-
Filesize
955KB
MD5f29a79038e47db5b4b54adb1addf9b10
SHA1885619788dd9e0b156db4350fdab218ab6b412a6
SHA2569f9dc7de52ecba7bae65eb7b6f997931cb367d341b5f7382440662ae874feb21
SHA512bac1bf86d9e9be13fe56bccec8117e08ce1d946d8efafa72aa61b859679dd406f166592deddb9a70f65cdcd2a3750a57aa63be29aced5019bdbff808a1c57de5
-
Filesize
400B
MD50a9b4592cd49c3c21f6767c2dabda92f
SHA1f534297527ae5ccc0ecb2221ddeb8e58daeb8b74
SHA256c7effe9cb81a70d738dee863991afefab040290d4c4b78b4202383bcb9f88fcd
SHA5126b878df474e5bbfb8e9e265f15a76560c2ef151dcebc6388c82d7f6f86ffaf83f5ade5a09f1842e493cb6c8fd63b0b88d088c728fd725f7139f965a5ee332307
-
Filesize
366KB
MD5f07d2c33e4afe36ec6f6f14f9a56e84a
SHA13ebed0c1a265d1e17ce038dfaf1029387f0b53ee
SHA256309385e6cd68c0dd148905c3147f77383edaf35da9609c0717da7df1a894e3ca
SHA512b4fbf0e6b8e7e8e1679680039e4ac0aebdf7967a9cc36d9ddac35fa31d997253384a51656d886afb2ded9f911b7b8b44c2dcb8ebe71962e551c5025a4d75ebe2
-
Filesize
472KB
MD52819e45588024ba76f248a39d3e232ba
SHA108a797b87ecfbee682ce14d872177dae1a5a46a2
SHA256b82b23059e398b39f183ec833d498200029033b0fd3a138b6c2064a6fa3c4b93
SHA512a38b58768daf58fa56ca7b8c37826d57e9dbfcd2dedf120a5b7b9aa36c4e10f64ec07c11dbd77b5861236c005fe5d453523911906dd77a302634408f1d78503a
-
Filesize
3.7MB
MD59d2a888ca79e1ff3820882ea1d88d574
SHA1112c38d80bf2c0d48256249bbabe906b834b1f66
SHA2568b5b38085f12d51393ed5a481a554074d3c482d53ecd917f2f5dffdf3d2ee138
SHA51217a9f74ecf9f118ed0252fa0bc6ce0f9758a4dc75f238cae304def9c37cd94623818dd4aef38826642ff9e549b7e6047318f8bf6de7edff2d61a298d0bf5c840
-
Filesize
376KB
MD5590acb5fa6b5c3001ebce3d67242aac4
SHA15df39906dc4e60f01b95783fc55af6128402d611
SHA2567bf9b7b25cf1671e5640f8eeac149f9a4e8c9f6c63415f4bd61bccb10ddf8509
SHA5124ac518140ee666491132525853f2843357d622fe351e59cca7ce3b054d665f77ad8987adddd601e6b1afe6903222d77cf3c41a5aa69e8caf0dcdc7656a43e9ba
-
Filesize
336KB
MD5e87459f61fd1f017d4bd6b0a1a1fc86a
SHA130838d010aad8c9f3fd0fc302e71b4cbe6f138c0
SHA256ec1b56551036963a425f6a0564d75980054e01d251c88eb29c81c1b2182f5727
SHA512dd13993174d234d60ec98124b71bfefcf556c069e482a2e1f127f81f6738b71cd37cee95bf0119d3a61513c01438055767d480e26d6ed260ee16a96533d0cfa2
-
Filesize
742KB
MD53e804917c454ca31c1cbd602682542b7
SHA11df3e81b9d879e21af299f5478051b98f3cb7739
SHA256f9f7b6f7b8c5068f9e29a5b50afca609018c50ffd61929e1b78124f5381868f1
SHA51228e59bc545179c2503771b93d947930bd56f8ebd0402ecbb398335c5ac89f40051e93fbfd84d35b8c625b253bb4cafea6a5360914b8d54d1bc121977f1eadbaf
-
Filesize
801KB
MD59133c2a5ebf3e25aceae5a001ca6f279
SHA1319f911282f3cded94de3730fa0abd5dec8f14be
SHA2567c3615c405f7a11f1c217b9ecd1000cf60a37bca7da1f2d12da21cc110b16b4d
SHA5121d1af3fcfcdba41874e3eb3e2571d25798acfd49b63b7fcf9393be2f59c9ba77e563da1717abcd6445fc52fd6d948bf4c0dd5978a192c8e32e0a9279fd0be33e
-
Filesize
153B
MD524a4f8537a8426f7bbc3a8d9aa524503
SHA1032fa477a327847bec912a58d88c62ba28034b56
SHA2564bd05ee2ff43249ea8f4f28e0bca78c7bb15f75edb1e07c60e4fac105d0d8cc2
SHA512ebc8fc4fdf895df53342737795b2b2c470fbc95f04ef5c65cfe501b3e536b5da616e4d0b6ededc7c9725f63ac2bb339d96ae37571f747be79734b90c6ae85202
-
Filesize
46.4MB
MD572611fb57daa0f97c0a1d70fa83e3cdd
SHA1f1f81f8920a227e08eb6ca31b6821eaa0f5b04bf
SHA256c8405d3e4dfcb20d3b9e22c518de2d29670ee2db96a44e4d032d77cc8f2e9e5f
SHA512a13ab702ca6380c0465c446cce9eb059e416a9953d1c5fe647e187dadd747f27d717a3ebfb13001c3d31581849a60f02c1d4adb72bd7f3a8a66bd8eb567ff84e