Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2025, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe
Resource
win10v2004-20250207-en
General
-
Target
55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe
-
Size
204KB
-
MD5
57756f480f4971db3eeb0325045d6760
-
SHA1
5c6766e8124eff43b34eab27bd1fdb23b489e98f
-
SHA256
55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295
-
SHA512
50d84ee7050cd8ac62fa7d32b6bca54058d8b575dbf73b34b08a53633c548597c5e8324465371a03d6ba37e77f40f28bf7cf8f8ce203c8a9e4cc8b4bee1e4b46
-
SSDEEP
3072:F5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:FLexkuRaX41xoyJV65gzyZko+ucR
Malware Config
Extracted
simda
-
dga
gatyfus.com
lyvyxor.com
vojyqem.com
qetyfuv.com
puvyxil.com
gahyqah.com
lyryfyd.com
vocyzit.com
qegyqaq.com
purydyv.com
gacyzuz.com
lygymoj.com
vowydef.com
qexylup.com
pufymoq.com
gaqydeb.com
lyxylux.com
vofymik.com
qeqysag.com
puzylyp.com
gadyniw.com
lymysan.com
volykyc.com
qedynul.com
pumypog.com
galykes.com
lysynur.com
vonypom.com
qekykev.com
pupybul.com
ganypih.com
lykyjad.com
vopybyt.com
qebytiq.com
pujyjav.com
gatyvyz.com
lyvytuj.com
vojyjof.com
qetyvep.com
puvytuq.com
gahyhob.com
lyryvex.com
vocyruk.com
qegyhig.com
purycap.com
gacyryw.com
lygygin.com
vowycac.com
qexyryl.com
pufygug.com
gaqycos.com
lyxywer.com
vofygum.com
qeqyxov.com
puzywel.com
gadyfuh.com
lymyxid.com
volyqat.com
qedyfyq.com
pumyxiv.com
galyqaz.com
lysyfyj.com
vonyzuf.com
qekyqop.com
pupydeq.com
ganyzub.com
lykymox.com
vopydek.com
qebylug.com
pujymip.com
gatydaw.com
lyvylyn.com
vojymic.com
qetysal.com
puvylyg.com
gahynus.com
lyrysor.com
vocykem.com
qegynuv.com
purypol.com
gacykeh.com
lygynud.com
vowypit.com
qexykaq.com
pufybyv.com
gaqypiz.com
lyxyjaj.com
vofybyf.com
qeqytup.com
puzyjoq.com
gadyveb.com
lymytux.com
volyjok.com
qedyveg.com
pumytup.com
galyhiw.com
lysyvan.com
vonyryc.com
qekyhil.com
pupycag.com
ganyrys.com
lykygur.com
vopycom.com
qebyrev.com
pujygul.com
gatycoh.com
lyvywed.com
vojygut.com
qetyxiq.com
puvywav.com
gahyfyz.com
lyryxij.com
vocyqaf.com
qegyfyp.com
puryxuq.com
gacyqob.com
lygyfex.com
vowyzuk.com
qexyqog.com
pufydep.com
gaqyzuw.com
lyxymin.com
vofydac.com
qeqylyl.com
puzymig.com
gadydas.com
lymylyr.com
volymum.com
qedysov.com
pumylel.com
galynuh.com
lysysod.com
vonyket.com
qekynuq.com
pupypiv.com
ganykaz.com
lykynyj.com
vopypif.com
qebykap.com
pujybyq.com
gatypub.com
lyvyjox.com
vojybek.com
qetytug.com
puvyjop.com
gahyvew.com
lyrytun.com
vocyjic.com
qegyval.com
purytyg.com
gacyhis.com
lygyvar.com
vowyrym.com
qexyhuv.com
pufycol.com
gaqyreh.com
lyxygud.com
vofycot.com
qeqyreq.com
puzyguv.com
gadyciz.com
lymywaj.com
volygyf.com
qedyxip.com
pumywaq.com
galyfyb.com
lysyxux.com
vonyqok.com
qekyfeg.com
pupyxup.com
ganyqow.com
lykyfen.com
vopyzuc.com
qebyqil.com
pujydag.com
gatyzys.com
lyvymir.com
vojydam.com
qetylyv.com
puvymul.com
gahydoh.com
lyryled.com
vocymut.com
qegysoq.com
purylev.com
gacynuz.com
lygysij.com
vowykaf.com
qexynyp.com
pufypiq.com
gaqykab.com
lyxynyx.com
vofypuk.com
qeqykog.com
puzybep.com
gadypuw.com
lymyjon.com
volybec.com
qedytul.com
pumyjig.com
galyvas.com
lysytyr.com
vonyjim.com
qekyvav.com
pupytyl.com
ganyhuh.com
lykyvod.com
vopyret.com
qebyhuq.com
pujycov.com
gatyrez.com
lyvyguj.com
vojycif.com
qetyrap.com
puvygyq.com
gahycib.com
lyrywax.com
vocygyk.com
qegyxug.com
purywop.com
gacyfew.com
lygyxun.com
vowyqoc.com
qexyfel.com
pufyxug.com
gaqyqis.com
lyxyfar.com
vofyzym.com
qeqyqiv.com
puzydal.com
gadyzyh.com
lymymud.com
volydot.com
qedyleq.com
pumymuv.com
galydoz.com
lysylej.com
vonymuf.com
qekysip.com
pupylaq.com
ganynyb.com
lykysix.com
vopykak.com
qebynyg.com
pujypup.com
gatykow.com
lyvynen.com
vojypuc.com
qetykol.com
puvybeg.com
gahypus.com
lyryjir.com
vocybam.com
qegytyv.com
puryjil.com
gacyvah.com
lygytyd.com
vowyjut.com
qexyvoq.com
pufytev.com
gaqyhuz.com
lyxyvoj.com
vofyref.com
qeqyhup.com
puzyciq.com
gadyrab.com
lymygyx.com
volycik.com
qedyrag.com
pumygyp.com
galycuw.com
lysywon.com
vonygec.com
qekyxul.com
pupywog.com
ganyfes.com
lykyxur.com
vopyqim.com
qebyfav.com
pujyxyl.com
gatyqih.com
lyvyfad.com
vojyzyt.com
qetyquq.com
puvydov.com
gahyzez.com
lyrymuj.com
vocydof.com
qegylep.com
purymuq.com
gacydib.com
lygylax.com
vowymyk.com
qexysig.com
pufylap.com
gaqynyw.com
lyxysun.com
vofykoc.com
qeqynel.com
puzypug.com
gadykos.com
lymyner.com
volypum.com
qedykiv.com
pumybal.com
galypyh.com
lysyjid.com
vonybat.com
qekytyq.com
pupyjuv.com
ganyvoz.com
lykytej.com
vopyjuf.com
qebyvop.com
pujyteq.com
gatyhub.com
lyvyvix.com
vojyrak.com
qetyhyg.com
puvycip.com
gahyraw.com
lyrygyn.com
vocycuc.com
qegyrol.com
purygeg.com
gacycus.com
lygywor.com
vowygem.com
qexyxuv.com
pufywil.com
gaqyfah.com
lyxyxyd.com
vofyqit.com
qeqyfaq.com
puzyxyv.com
gadyquz.com
lymyfoj.com
volyzef.com
qedyqup.com
pumydoq.com
galyzeb.com
lysymux.com
vonydik.com
qekylag.com
pupymyp.com
ganydiw.com
lykylan.com
vopymyc.com
qebysul.com
pujylog.com
gatynes.com
lyvysur.com
vojykom.com
qetynev.com
puvypul.com
gahykih.com
lyrynad.com
vocypyt.com
qegykiq.com
purybav.com
gacypyz.com
lygyjuj.com
vowybof.com
qexytep.com
pufyjuq.com
gaqyvob.com
lyxytex.com
vofyjuk.com
qeqyvig.com
puzytap.com
gadyhyw.com
lymyvin.com
volyrac.com
qedyhyl.com
pumycug.com
galyros.com
lysyger.com
vonycum.com
qekyrov.com
pupygel.com
ganycuh.com
lykywid.com
vopygat.com
qebyxyq.com
pujywiv.com
gatyfaz.com
lyvyxyj.com
vojyquf.com
qetyfop.com
puvyxeq.com
gahyqub.com
lyryfox.com
vocyzek.com
qegyqug.com
purydip.com
gacyzaw.com
lygymyn.com
vowydic.com
qexylal.com
pufymyg.com
gaqydus.com
lyxylor.com
vofymem.com
qeqysuv.com
puzylol.com
gadyneh.com
lymysud.com
volykit.com
qedynaq.com
pumypyv.com
galykiz.com
lysynaj.com
vonypyf.com
qekykup.com
pupyboq.com
ganypeb.com
lykyjux.com
vopybok.com
qebyteg.com
pujyjup.com
gatyviw.com
lyvytan.com
vojyjyc.com
qetyvil.com
puvytag.com
gahyhys.com
lyryvur.com
vocyrom.com
qegyhev.com
purycul.com
gacyroh.com
lygyged.com
vowycut.com
qexyriq.com
pufygav.com
gaqycyz.com
lyxywij.com
vofygaf.com
qeqyxyp.com
puzywuq.com
gadyfob.com
lymyxex.com
volyquk.com
qedyfog.com
pumyxep.com
galyquw.com
lysyfin.com
vonyzac.com
qekyqyl.com
pupydig.com
ganyzas.com
lykymyr.com
vopydum.com
qebylov.com
pujymel.com
gatyduh.com
lyvylod.com
vojymet.com
qetysuq.com
puvyliv.com
gahynaz.com
lyrysyj.com
vocykif.com
qegynap.com
purypyq.com
gacykub.com
lygynox.com
vowypek.com
qexykug.com
pufybop.com
gaqypew.com
lyxyjun.com
vofybic.com
qeqytal.com
puzyjyg.com
gadyvis.com
lymytar.com
volyjym.com
qedyvuv.com
pumytol.com
galyheh.com
lysyvud.com
vonyrot.com
qekyheq.com
pupycuv.com
ganyriz.com
lykygaj.com
vopycyf.com
qebyrip.com
pujygaq.com
gatycyb.com
lyvywux.com
vojygok.com
qetyxeg.com
puvywup.com
gahyfow.com
lyryxen.com
vocyquc.com
qegyfil.com
puryxag.com
gacyqys.com
lygyfir.com
vowyzam.com
qexyqyv.com
pufydul.com
gaqyzoh.com
lyxymed.com
vofydut.com
qeqyloq.com
puzymev.com
gadyduz.com
lymylij.com
volymaf.com
qedysyp.com
pumyliq.com
galynab.com
lysysyx.com
vonykuk.com
qekynog.com
pupypep.com
ganykuw.com
lykynon.com
vopypec.com
qebykul.com
pujybig.com
gatypas.com
lyvyjyr.com
vojybim.com
qetytav.com
puvyjyl.com
gahyvuh.com
lyrytod.com
vocyjet.com
qegyvuq.com
purytov.com
gacyhez.com
lygyvuj.com
vowyrif.com
qexyhap.com
pufycyq.com
gaqyrib.com
lyxygax.com
vofycyk.com
qeqyrug.com
puzygop.com
gadycew.com
lymywun.com
volygoc.com
qedyxel.com
pumywug.com
galyfis.com
lysyxar.com
vonyqym.com
qekyfiv.com
pupyxal.com
ganyqyh.com
lykyfud.com
vopyzot.com
qebyqeq.com
pujyduv.com
gatyzoz.com
lyvymej.com
vojyduf.com
qetylip.com
puvymaq.com
gahydyb.com
lyrylix.com
vocymak.com
qegysyg.com
purylup.com
gacynow.com
lygysen.com
vowykuc.com
qexynol.com
pufypeg.com
gaqykus.com
lyxynir.com
vofypam.com
qeqykyv.com
puzybil.com
gadypah.com
lymyjyd.com
volybut.com
qedytoq.com
pumyjev.com
galyvuz.com
lysytoj.com
vonyjef.com
qekyvup.com
pupytiq.com
ganyhab.com
lykyvyx.com
vopyrik.com
qebyhag.com
pujycyp.com
gatyruw.com
lyvygon.com
vojycec.com
qetyrul.com
puvygog.com
gahyces.com
lyrywur.com
vocygim.com
qegyxav.com
purywyl.com
gacyfih.com
lygyxad.com
vowyqyt.com
qexyfuq.com
pufyxov.com
gaqyqez.com
lyxyfuj.com
vofyzof.com
qeqyqep.com
puzyduq.com
gadyzib.com
lymymax.com
volydyk.com
qedylig.com
pumymap.com
galydyw.com
lysylun.com
vonymoc.com
qekysel.com
pupylug.com
ganynos.com
lykyser.com
vopykum.com
qebyniv.com
pujypal.com
gatykyh.com
lyvynid.com
vojypat.com
qetykyq.com
puvybuv.com
gahypoz.com
lyryjej.com
vocybuf.com
qegytop.com
puryjeq.com
gacyvub.com
lygytix.com
vowyjak.com
qexyvyg.com
pufytip.com
gaqyhaw.com
lyxyvyn.com
vofyruc.com
qeqyhol.com
puzyceg.com
gadyrus.com
lymygor.com
volycem.com
qedyruv.com
pumygil.com
galycah.com
lysywyd.com
vonygit.com
qekyxaq.com
pupywyv.com
ganyfuz.com
lykyxoj.com
vopyqef.com
qebyfup.com
pujyxoq.com
gatyqeb.com
lyvyfux.com
vojyzik.com
qetyqag.com
puvydyp.com
gahyziw.com
lyryman.com
vocydyc.com
qegylul.com
purymog.com
gacydes.com
lygylur.com
vowymom.com
qexysev.com
pufylul.com
gaqynih.com
lyxysad.com
vofykyt.com
qeqyniq.com
puzypav.com
gadykyz.com
lymynuj.com
volypof.com
qedykep.com
pumybuq.com
galypob.com
lysyjex.com
vonybuk.com
qekytig.com
pupyjap.com
ganyvyw.com
lykytin.com
vopyjac.com
qebyvyl.com
pujytug.com
gatyhos.com
lyvyver.com
vojyrum.com
qetyhov.com
puvycel.com
gahyruh.com
lyrygid.com
vocycat.com
qegyryq.com
purygiv.com
gacycaz.com
lygywyj.com
vowyguf.com
qexyxop.com
pufyweq.com
gaqyfub.com
lyxyxox.com
vofyqek.com
qeqyfug.com
puzyxip.com
gadyqaw.com
lymyfyn.com
volyzic.com
qedyqal.com
pumydyg.com
galyzus.com
lysymor.com
vonydem.com
qekyluv.com
pupymol.com
ganydeh.com
lykylud.com
vopymit.com
qebysaq.com
pujylyv.com
gatyniz.com
lyvysaj.com
vojykyf.com
qetynup.com
puvypoq.com
gahykeb.com
lyrynux.com
vocypok.com
qegykeg.com
purybup.com
gacypiw.com
lygyjan.com
vowybyc.com
qexytil.com
pufyjag.com
gaqyvys.com
lyxytur.com
vofyjom.com
qeqyvev.com
puzytul.com
gadyhoh.com
lymyved.com
volyrut.com
qedyhiq.com
pumycav.com
galyryz.com
lysygij.com
vonycaf.com
qekyryp.com
pupyguq.com
ganycob.com
lykywex.com
vopyguk.com
qebyxog.com
pujywep.com
gatyfuw.com
lyvyxin.com
vojyqac.com
qetyfyl.com
puvyxig.com
gahyqas.com
lyryfyr.com
vocyzum.com
qegyqov.com
purydel.com
gacyzuh.com
lygymod.com
vowydet.com
qexyluq.com
pufymiv.com
gaqydaz.com
lyxylyj.com
vofymif.com
qeqysap.com
puzylyq.com
gadynub.com
lymysox.com
volykek.com
qedynug.com
pumypop.com
galykew.com
lysynun.com
vonypic.com
qekykal.com
pupybyg.com
ganypis.com
lykyjar.com
vopybym.com
qebytuv.com
pujyjol.com
gatyveh.com
lyvytud.com
vojyjot.com
qetyveq.com
puvytuv.com
gahyhiz.com
lyryvaj.com
vocyryf.com
qegyhip.com
purycaq.com
gacyryb.com
lygygux.com
vowycok.com
qexyreg.com
pufygup.com
gaqycow.com
lyxywen.com
vofyguc.com
qeqyxil.com
puzywag.com
gadyfys.com
lymyxir.com
volyqam.com
qedyfyv.com
pumyxul.com
galyqoh.com
lysyfed.com
vonyzut.com
qekyqoq.com
pupydev.com
ganyzuz.com
lykymij.com
vopydaf.com
qebylyp.com
pujymiq.com
gatydab.com
lyvylyx.com
vojymuk.com
qetysog.com
puvylep.com
gahynuw.com
lyryson.com
vocykec.com
qegynul.com
purypig.com
gacykas.com
lygynyr.com
vowypim.com
qexykav.com
pufybyl.com
gaqypuh.com
lyxyjod.com
vofybet.com
qeqytuq.com
puzyjov.com
gadyvez.com
lymytuj.com
volyjif.com
qedyvap.com
pumytyq.com
galyhib.com
lysyvax.com
vonyryk.com
qekyhug.com
pupycop.com
ganyrew.com
lykygun.com
vopycoc.com
qebyrel.com
pujygug.com
gatycis.com
lyvywar.com
vojygym.com
qetyxiv.com
puvywal.com
gahyfyh.com
lyryxud.com
vocyqot.com
qegyfeq.com
puryxuv.com
gacyqoz.com
lygyfej.com
vowyzuf.com
qexyqip.com
pufydaq.com
gaqyzyb.com
lyxymix.com
vofydak.com
qeqylyg.com
puzymup.com
gadydow.com
lymylen.com
volymuc.com
qedysol.com
pumyleg.com
galynus.com
lysysir.com
vonykam.com
qekynyv.com
pupypil.com
ganykah.com
lykynyd.com
vopyput.com
qebykoq.com
pujybev.com
gatypuz.com
lyvyjoj.com
vojybef.com
qetytup.com
puvyjiq.com
gahyvab.com
lyrytyx.com
vocyjik.com
qegyvag.com
purytyp.com
gacyhuw.com
lygyvon.com
vowyrec.com
qexyhul.com
pufycog.com
gaqyres.com
lyxygur.com
vofycim.com
qeqyrav.com
puzygyl.com
gadycih.com
lymywad.com
volygyt.com
qedyxuq.com
pumywov.com
galyfez.com
lysyxuj.com
vonyqof.com
qekyfep.com
pupyxuq.com
ganyqib.com
lykyfax.com
vopyzyk.com
qebyqig.com
pujydap.com
gatyzyw.com
lyvymun.com
vojydoc.com
qetylel.com
puvymug.com
gahydos.com
lyryler.com
vocymum.com
qegysiv.com
purylal.com
gacynyh.com
lygysid.com
vowykat.com
qexynyq.com
pufypuv.com
gaqykoz.com
lyxynej.com
vofypuf.com
qeqykop.com
puzybeq.com
gadypub.com
lymyjix.com
volybak.com
qedytyg.com
pumyjip.com
galyvaw.com
lysytyn.com
vonyjuc.com
qekyvol.com
pupyteg.com
ganyhus.com
lykyvor.com
vopyrem.com
qebyhuv.com
pujycil.com
gatyrah.com
lyvygyd.com
vojycit.com
qetyraq.com
puvygyv.com
gahycuz.com
lyrywoj.com
vocygef.com
qegyxup.com
purywoq.com
gacyfeb.com
lygyxux.com
vowyqik.com
qexyfag.com
pufyxyp.com
gaqyqiw.com
lyxyfan.com
vofyzyc.com
qeqyqul.com
puzydog.com
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Simda family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 148 3536 Process not Found -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 11 IoCs
pid Process 376 svchost.exe 2492 setup.exe 536 setup.exe 1732 setup.exe 396 setup.exe 3216 setup.exe 4452 setup.exe 4024 setup.exe 2244 setup.exe 2060 setup.exe 3460 setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\51fff85b = "NYIªå»É›š™ÑDLí|áÙvÜÈ^kîü\rã\t“I›Ç\x1c½\x13\x05µ\\Eœ¤8\rýåÌÅ\r\rMð \r\x1cEpò\u00adeEÕ$\u009dÍ%" 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\51fff85b = "NYIªå»É›š™ÑDLí|áÙvÜÈ^kîü\rã\t“I›Ç\x1c½\x13\x05µ\\Eœ¤8\rýåÌÅ\r\rMð \r\x1cEpò\u00adeEÕ$\u009dÍ%" svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\sr-Cyrl-BA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Mu\TransparentAdvertisers setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\gu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\lt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Mu\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\c443ddbf-02a0-4fe3-904a-dadfb7e9a80f.tmp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\hu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\nb.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\te.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\wdag.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Temp\source2492_2055247587\msedge_7z.data setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Mu\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Trust Protection Lists\Sigma\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\en-US.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\pa.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedge_100_percent.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\onnxruntime.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\BHO\ie_to_edge_stub.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\fil.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Sigma\Staging setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\AdSelectionAttestationsPreloaded\ad-selection-attestations.dat setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\5b645083-5beb-4c6c-bd1a-304b5715f0db.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Mu\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\lv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Trust Protection Lists\Mu\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\it.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\edge_game_assist\EdgeGameAssist.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\VisualElements\Logo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\ga.pak setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\eventlog_provider.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\mr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\nn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\edge_feedback\mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\es-419.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\fi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\icudtl.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\sk.pak setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\6c46a891-4457-48a8-8b77-b44f1c207f6e.tmp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\hi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\vcruntime140_1.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\sv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\qu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\zh-TW.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Extensions\external_extensions.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\onnxruntime.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\notification_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\bg.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\eu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\pt-BR.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Sigma\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\telclient.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\qu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\stable.identity_helper.exe.manifest setup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe File opened for modification C:\Windows\apppatch\svchost.exe 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2144 MicrosoftEdgeUpdate.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\SOFTWARE\Microsoft\Internet Explorer\GPU wwahost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Microsoft\Internet Explorer\GPU wwahost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.htm\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.shtml setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.mhtml\OpenWithProgids setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "51200" wwahost.exe Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer wwahost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer\DOMStorage\office.com\NumberOfSubdomains = "1" wwahost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\AppUserModelId = "MSEdge" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\shell\runas setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\shell\runas\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --do-not-de-elevate --single-argument %1" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" wwahost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" \"%1\"" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\open\command setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\AppID = "{6d2b5079-2f0b-48dd-ab7f-97cec514d30b}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheVersion = "1" wwahost.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\ApplicationName = "Microsoft Edge" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open\command setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\OpenWithProgIds\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/html setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.webp\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\LocalService = "MicrosoftEdgeElevationService" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\ApplicationDescription = "Browse the web" setup.exe Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache wwahost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ = "{2397ECFE-3237-400F-AE51-62B25B3F15B5}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\ = "PDF Preview Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\ApplicationIcon = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\msedge.exe,0" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LoadUserSettings = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\MIME\Database\Content Type\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win64 setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" wwahost.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\ = "Microsoft Edge PDF Document" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\image/svg+xml setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.xht setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.xml\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftofficehub_8wekyb3d8bbwe\Internet Explorer\EdpDomStorage\office.com wwahost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13}\ = "ie_to_edge_bho" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\CLSID\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\PdfPreview\\PdfPreviewHandler.dll" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xhtml\OpenWithProgIds\MSEdgeHTM setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2492 setup.exe Token: SeIncBasePriorityPrivilege 2492 setup.exe Token: SeDebugPrivilege 5392 wwahost.exe Token: SeDebugPrivilege 5392 wwahost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5392 wwahost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4376 wrote to memory of 376 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 88 PID 4376 wrote to memory of 376 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 88 PID 4376 wrote to memory of 376 4376 55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe 88 PID 5008 wrote to memory of 2492 5008 MicrosoftEdge_X64_133.0.3065.59.exe 107 PID 5008 wrote to memory of 2492 5008 MicrosoftEdge_X64_133.0.3065.59.exe 107 PID 2492 wrote to memory of 536 2492 setup.exe 108 PID 2492 wrote to memory of 536 2492 setup.exe 108 PID 2492 wrote to memory of 1732 2492 setup.exe 109 PID 2492 wrote to memory of 1732 2492 setup.exe 109 PID 1732 wrote to memory of 396 1732 setup.exe 110 PID 1732 wrote to memory of 396 1732 setup.exe 110 PID 2492 wrote to memory of 3216 2492 setup.exe 111 PID 2492 wrote to memory of 3216 2492 setup.exe 111 PID 2492 wrote to memory of 4452 2492 setup.exe 112 PID 2492 wrote to memory of 4452 2492 setup.exe 112 PID 3216 wrote to memory of 4024 3216 setup.exe 113 PID 3216 wrote to memory of 4024 3216 setup.exe 113 PID 2492 wrote to memory of 2244 2492 setup.exe 114 PID 2492 wrote to memory of 2244 2492 setup.exe 114 PID 4452 wrote to memory of 2060 4452 setup.exe 115 PID 4452 wrote to memory of 2060 4452 setup.exe 115 PID 2244 wrote to memory of 3460 2244 setup.exe 116 PID 2244 wrote to memory of 3460 2244 setup.exe 116 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe"C:\Users\Admin\AppData\Local\Temp\55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:376
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource core1⤵
- System Location Discovery: System Language Discovery
PID:404
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI4IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjcyNDE3NjE3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2144
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\MicrosoftEdge_X64_133.0.3065.59.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2492 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff622406a68,0x7ff622406a74,0x7ff622406a803⤵
- Executes dropped EXE
PID:536
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff622406a68,0x7ff622406a74,0x7ff622406a804⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:396
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff714d86a68,0x7ff714d86a74,0x7ff714d86a804⤵
- Executes dropped EXE
PID:4024
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff714d86a68,0x7ff714d86a74,0x7ff714d86a804⤵
- Executes dropped EXE
PID:2060
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff714d86a68,0x7ff714d86a74,0x7ff714d86a804⤵
- Executes dropped EXE
PID:3460
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness1⤵PID:3488
-
C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe"C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch1⤵PID:5232
-
C:\Windows\system32\wwahost.exe"C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Winlogon Helper DLL
2Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Winlogon Helper DLL
2Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AC54A23F-1356-41A9-8245-0B953A07FE68}\EDGEMITMP_440C2.tmp\setup.exe
Filesize6.8MB
MD51b3e9c59f9c7a134ec630ada1eb76a39
SHA1a7e831d392e99f3d37847dcc561dd2e017065439
SHA256ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae
SHA512c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e
-
Filesize
3.9MB
MD5ad5f7dc7ca3e67dce70c0a89c04519e0
SHA1a10b03234627ca8f3f8034cd5637cda1b8246d83
SHA256663fe0f4e090583e6aa5204b9a80b7a76f677259066e56a7345aebc6bc3e7d31
SHA512ad5490e9865caa454c47ec2e96364b9c566b553e64801da60c295acd570017747be1aff6f22ca6c20c6eee6f6d05a058af72569fd6e656f66e48010978c7fd51
-
Filesize
73KB
MD58243a138a04ec93238296893b5d4f65b
SHA10b988a75028bc45f6c6629739ccd5b87209e3565
SHA256fdf414f92e632ca04d141e74e5ada4e595068aa115fc25b424263268f380a438
SHA512897021c92f101efa2f11d55a0ac8d3af8b17c9d32c8830b988b1965c81ed4958e89e1179c2d70c4d3f7272a1e04e10eea9cbc72fcd59c1b63ecd5294cdcb65b9
-
Filesize
102KB
MD56435d982eadc441f8489ffbd690f9b0a
SHA1d4723dc2d281c7b920dc442736de1ffa4633f80e
SHA2560fe68c1000fe99399ecdff427cf14ec1d686f42a0a2cc3f092d85ea0a948515a
SHA5126493e83e422c5db136789df82d2b485d582cd433361c99bd0c84010e1336c1a4f6c85681cc0855fdbd090b4173071588910819f0d579b238e8c19722a49d3840
-
Filesize
103KB
MD536f87c0f17b037c45d89dadd837901e6
SHA119b331fa647e2e0677ce3dd97aa772969906989d
SHA25644135ca9f1b7b4a9696876c8a72320efc6693ed0f896098aa6f42e7d5d09ee3f
SHA5120720d487f39806fd694856362460d9317179b3e0cd8287730027096b4f09f51f54001558e4f65a9306f7c72809306e82d2b6ac95d2ecc634f991eae7fbf40531
-
Filesize
105KB
MD5d9eb1575d2150b6106e49fd0f5294001
SHA1fcba78887c1a2775a535f271f27ed4abbef2005e
SHA256e4f867f7834606b9f82e5d4d046365dd2972f5f5ed9209bf483293e8f39bf187
SHA512c685c97a54dcd420b2310e94af85042663f80e95d393003ab4095dbd293fd7021f961a4f176b57833c6231bad468b6855bdc19add1ef12af4a76f6617d43cfb7
-
Filesize
427KB
MD5fe79f71f4c6f35431b441fc9bcc71f9a
SHA15cffa111d3d67e29ae4016d8943ecd503470b1e3
SHA2568cf1df723e7dc934a81dcb98ca3ae2009fd980ad73a92be200255d1926594c79
SHA5122456637e344f1999ff7604956ae46cf2b54ed71b82f4331e215eb46ef2730cbacc16da21a81e4edc81dc33579984eaf3bc3721b429e0faa9e00ab4a19c25790b
-
Filesize
162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
61KB
MD54e3e43443418e3910a77d0e449affbcf
SHA1d8451c09c3d61bf682e440be7435b1b3bd7572bb
SHA25660d71088c5303c3c1d97a7d661894457483da6e41c041bcab294537b15ba2389
SHA512a10695621d8391eaa712ef43272c2b39381cfcd53bad3a32ecca9da9c6d7a063301573768ac925616e7ecf78d0a7a0ed604c8c1f190b9a0cc90b7aecdf2db6dd
-
Filesize
24KB
MD5b4ef28991b239176d1553d36265d2e26
SHA1bc251e6a5cba24df60fc80e8e449ed53aa8c45c6
SHA25692677a5d8b0090426d2c300b317dd9bace8d1bb17fb0934ebb563480cdb3db88
SHA51220d64bada4662d36b98222752838880d5a98c8277dccccdefd433ecfca2596b483026be2e59bc78c3c0d38b96c33de6653f4e6e24fc141263c0cf221ba874353
-
Filesize
41KB
MD5eb47a7cee2595fd4a096ab95be378df5
SHA1c9cb8e4c95a938b018efdfd7ff26926e5884bd7e
SHA256da0aa0ecf136d1b033d741efaf0bf41321bdb4dfe583be4b1767999dfabb6e17
SHA512018cc7346bd0f6e3946a2fb5a8fa32f9deecbfd6c6c9bb79c88b99cc1d9b62eaf5a85f4c4c91131c7c010d5defb285c74cb0ff082b47fec83684780a7eafad6e
-
Filesize
204KB
MD580f34ad11c8f76366bbff14ecae81b2c
SHA14912916ed09b264545829fda73621da43adfd3a1
SHA256289abbd06e4095f89cacd5504b9bfe56101d67750d7f32e84df9202dc193f4a0
SHA5126c7c9060d06b8eb0ab94890fe7f42fd0aa5e8b75f82372bfa927638229f89fd4a306f44d440bf08345b9f0cff932d40a0f8b779c802d641ee9c929ed2fede16e