Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20250218-en -
resource tags
arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/03/2025, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
MirsoftEde-Seup.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
MirsoftEde-Seup.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
MirsoftEde-Seup.exe
Resource
win11-20250218-en
General
-
Target
MirsoftEde-Seup.exe
-
Size
113.8MB
-
MD5
437e77a81f65b728961540a13564f4ab
-
SHA1
141ef5d76fc21c8958edfb9e903a9719cdb3bee5
-
SHA256
5ef443293aafe44fcc69d4aeb8a43ab7f1b93e3e0591c52f86ab66bde6dd8c6c
-
SHA512
669955f564b94035afc9d748639454449de52c9e2630efde3f631422dedf07d1cb7ba69b999d3b3f4e2081f617326f08a297be8b94a29192cfbc06ff4242215c
-
SSDEEP
3145728:P+vX0Hb5gQb2fL9qcIqX/XoUtrsRum+ETy43AkG+AKpqG33O6k:W87GSmsR6EdAkkKpqGHY
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral3/memory/1908-26-0x0000000010000000-0x0000000010057000-memory.dmp family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\134.0.3124.51\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 13 2600 Process not Found -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 12 IoCs
pid Process 1908 libcef.exe 3028 MicrosoftEdgeSetup.exe 4276 MicrosoftEdgeUpdate.exe 3420 MicrosoftEdge_X64_134.0.3124.51.exe 976 setup.exe 2372 setup.exe 4288 setup.exe 2096 setup.exe 1632 setup.exe 4908 setup.exe 2064 setup.exe 1200 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 4276 MicrosoftEdgeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Program Files (x86)\\libcef.exe" libcef.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: libcef.exe File opened (read-only) \??\G: libcef.exe File opened (read-only) \??\H: libcef.exe File opened (read-only) \??\L: libcef.exe File opened (read-only) \??\N: libcef.exe File opened (read-only) \??\S: libcef.exe File opened (read-only) \??\X: libcef.exe File opened (read-only) \??\B: libcef.exe File opened (read-only) \??\K: libcef.exe File opened (read-only) \??\T: libcef.exe File opened (read-only) \??\U: libcef.exe File opened (read-only) \??\P: libcef.exe File opened (read-only) \??\Q: libcef.exe File opened (read-only) \??\J: libcef.exe File opened (read-only) \??\M: libcef.exe File opened (read-only) \??\O: libcef.exe File opened (read-only) \??\I: libcef.exe File opened (read-only) \??\V: libcef.exe File opened (read-only) \??\W: libcef.exe File opened (read-only) \??\Y: libcef.exe File opened (read-only) \??\Z: libcef.exe File opened (read-only) \??\R: libcef.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_ja.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\km.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\EdgeWebView.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Locales\ro.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Locales\sr-Cyrl-BA.pak setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\168ca814-75b4-41f5-84e2-e40d8ad515ae.tmp setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_th.dll MicrosoftEdgeSetup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\libEGL.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\wns_push_client.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Locales\am.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Locales\gu.pak setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\new_delegatedWebFeatures.sccd setup.exe File created C:\Program Files (x86)\__tmp_rar_sfx_access_check_240679906 MirsoftEde-Seup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\qu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\prefs_enclave_x64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\resources.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\msedge.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\identity_proxy\stable.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\new_msedge.exe setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_kk.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\af.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\identity_proxy\win11\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_sv.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe MicrosoftEdge_X64_134.0.3124.51.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\en-US.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\mt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\sr-Latn-RS.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\v8_context_snapshot.bin setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\sk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\4288_13385848474321033_4288.pma setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_cy.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\msedge_pwa_launcher.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Trust Protection Lists\Sigma\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Trust Protection Lists\Sigma\Social setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\ms.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\VisualElements\Logo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\notification_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Locales\bs.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Locales\zh-TW.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\msedgewebview2.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\icudtl.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\notification_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\976_13385848474545875_976.pma setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_el.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_sr-Latn-RS.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\ffmpeg.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\libEGL.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\pa.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\th.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\MEIPreload\preloaded_data.pb setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_es-419.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_fil.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_lv.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\identity_proxy\canary.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\134.0.3124.51\Locales\pt-PT.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\msedgeupdateres_nn.dll MicrosoftEdgeSetup.exe -
Drops file in Windows directory 28 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wermgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language libcef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4288 MicrosoftEdgeUpdate.exe 1700 MicrosoftEdgeUpdate.exe 3152 MicrosoftEdgeUpdate.exe 1192 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision wermgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 libcef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz libcef.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\134.0.3124.51\\BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\134.0.3124.51\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\ = "PDF Preview Handler" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.xht\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.mhtml\OpenWithProgids setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\AppID = "{1FCBE96C-1697-43AF-9140-2897C7C69767}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open\command setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\DefaultIcon setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\ApplicationCompany = "Microsoft Corporation" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.svg\OpenWithProgIds\MSEdgeHTM setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\ = "TypeLib for Interface {C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ = "ie_to_edge_bho.IEToEdgeBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\ = "IEToEdgeBHO Class" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\open\command setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\ApplicationName = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\ApplicationDescription = "浏览 Web" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\134.0.3124.51\\EBWebView\\x64\\EmbeddedBrowserWebView.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\URL Protocol setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\Application setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\AppUserModelId = "MSEdge" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.webp setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ = "{2397ECFE-3237-400F-AE51-62B25B3F15B5}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\DisplayName = "PDF Preview Handler" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.svg\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\LocalService = "MicrosoftEdgeElevationService" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\134.0.3124.51\\PdfPreview\\PdfPreviewHandler.dll" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\134.0.3124.51\\notification_click_helper.exe\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/pdf\Extension = ".pdf" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\ApplicationCompany = "Microsoft Corporation" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xhtml\OpenWithProgIds\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\shell\open setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\ApplicationName = "Microsoft Edge" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\134.0.3124.51\\elevation_service.exe" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell\open setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.mht setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\ie_to_edge_bho.dll\AppID = "{31575964-95F7-414B-85E4-0E9A93699E13}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ = "{2397ECFE-3237-400F-AE51-62B25B3F15B5}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\ = "IEToEdgeBHO Class" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.xhtml\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\AppId = "{628ACE20-B77A-456F-A88D-547DB6CEEDD5}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\image/svg+xml setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\DefaultIcon\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\134.0.3124.51\\msedge.exe,0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\shell\runas\ProgrammaticAccessOnly setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.htm\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --single-argument %1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.htm setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xml\OpenWithProgIds\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32 setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe 1908 libcef.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 5028 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 5028 MicrosoftEdgeUpdate.exe Token: SeRestorePrivilege 5028 MicrosoftEdgeUpdate.exe Token: SeBackupPrivilege 5028 MicrosoftEdgeUpdate.exe Token: 33 1908 libcef.exe Token: SeIncBasePriorityPrivilege 1908 libcef.exe Token: 33 1908 libcef.exe Token: SeIncBasePriorityPrivilege 1908 libcef.exe Token: SeDebugPrivilege 4276 MicrosoftEdgeUpdate.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1908 libcef.exe 1908 libcef.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4632 wrote to memory of 1908 4632 MirsoftEde-Seup.exe 85 PID 4632 wrote to memory of 1908 4632 MirsoftEde-Seup.exe 85 PID 4632 wrote to memory of 1908 4632 MirsoftEde-Seup.exe 85 PID 4632 wrote to memory of 3028 4632 MirsoftEde-Seup.exe 88 PID 4632 wrote to memory of 3028 4632 MirsoftEde-Seup.exe 88 PID 4632 wrote to memory of 3028 4632 MirsoftEde-Seup.exe 88 PID 3028 wrote to memory of 4276 3028 MicrosoftEdgeSetup.exe 89 PID 3028 wrote to memory of 4276 3028 MicrosoftEdgeSetup.exe 89 PID 3028 wrote to memory of 4276 3028 MicrosoftEdgeSetup.exe 89 PID 4276 wrote to memory of 2972 4276 MicrosoftEdgeUpdate.exe 90 PID 4276 wrote to memory of 2972 4276 MicrosoftEdgeUpdate.exe 90 PID 4276 wrote to memory of 2972 4276 MicrosoftEdgeUpdate.exe 90 PID 4276 wrote to memory of 4288 4276 MicrosoftEdgeUpdate.exe 91 PID 4276 wrote to memory of 4288 4276 MicrosoftEdgeUpdate.exe 91 PID 4276 wrote to memory of 4288 4276 MicrosoftEdgeUpdate.exe 91 PID 4276 wrote to memory of 5028 4276 MicrosoftEdgeUpdate.exe 92 PID 4276 wrote to memory of 5028 4276 MicrosoftEdgeUpdate.exe 92 PID 4276 wrote to memory of 5028 4276 MicrosoftEdgeUpdate.exe 92 PID 5028 wrote to memory of 1700 5028 MicrosoftEdgeUpdate.exe 93 PID 5028 wrote to memory of 1700 5028 MicrosoftEdgeUpdate.exe 93 PID 5028 wrote to memory of 1700 5028 MicrosoftEdgeUpdate.exe 93 PID 5028 wrote to memory of 1668 5028 MicrosoftEdgeUpdate.exe 94 PID 5028 wrote to memory of 1668 5028 MicrosoftEdgeUpdate.exe 94 PID 5028 wrote to memory of 1668 5028 MicrosoftEdgeUpdate.exe 94 PID 5028 wrote to memory of 3152 5028 MicrosoftEdgeUpdate.exe 96 PID 5028 wrote to memory of 3152 5028 MicrosoftEdgeUpdate.exe 96 PID 5028 wrote to memory of 3152 5028 MicrosoftEdgeUpdate.exe 96 PID 5028 wrote to memory of 3420 5028 MicrosoftEdgeUpdate.exe 97 PID 5028 wrote to memory of 3420 5028 MicrosoftEdgeUpdate.exe 97 PID 3420 wrote to memory of 976 3420 MicrosoftEdge_X64_134.0.3124.51.exe 98 PID 3420 wrote to memory of 976 3420 MicrosoftEdge_X64_134.0.3124.51.exe 98 PID 976 wrote to memory of 2372 976 setup.exe 99 PID 976 wrote to memory of 2372 976 setup.exe 99 PID 976 wrote to memory of 4288 976 setup.exe 100 PID 976 wrote to memory of 4288 976 setup.exe 100 PID 4288 wrote to memory of 2096 4288 setup.exe 101 PID 4288 wrote to memory of 2096 4288 setup.exe 101 PID 976 wrote to memory of 1632 976 setup.exe 103 PID 976 wrote to memory of 1632 976 setup.exe 103 PID 976 wrote to memory of 4908 976 setup.exe 104 PID 976 wrote to memory of 4908 976 setup.exe 104 PID 1632 wrote to memory of 2064 1632 setup.exe 105 PID 1632 wrote to memory of 2064 1632 setup.exe 105 PID 4908 wrote to memory of 1200 4908 setup.exe 106 PID 4908 wrote to memory of 1200 4908 setup.exe 106 PID 5028 wrote to memory of 1192 5028 MicrosoftEdgeUpdate.exe 108 PID 5028 wrote to memory of 1192 5028 MicrosoftEdgeUpdate.exe 108 PID 5028 wrote to memory of 1192 5028 MicrosoftEdgeUpdate.exe 108 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\MirsoftEde-Seup.exe"C:\Users\Admin\AppData\Local\Temp\MirsoftEde-Seup.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\libcef.exe"C:\Program Files (x86)\libcef.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
C:\Program Files (x86)\MicrosoftEdgeSetup.exe"C:\Program Files (x86)\MicrosoftEdgeSetup.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU7E82.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}&appname=Microsoft%20Edge&needsadmin=prefers&lang=zh-cn&brand=M100"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /healthcheck4⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xOTUuNDMiIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjM1IiBsYW5nPSJ6aC1jbiIgYnJhbmQ9Ik0xMDAiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjUxMjYwMjYzIiBpbnN0YWxsX3RpbWVfbXM9IjE3MiIvPjwvYXBwPjwvcmVxdWVzdD44⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4288
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}&appname=Microsoft%20Edge&needsadmin=prefers&lang=zh-cn&brand=M100" /installsource taggedmi /sessionid "{F6F8D737-BFE5-4E37-93E2-BEB099D86D51}"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1700
-
-
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5028" "1132" "1136" "1228" "0" "0" "0" "0" "0" "0" "0" "0"5⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:1668
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjEzMy4wLjMwNjUuNjkiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxNyIgaW5zdGFsbGRhdGV0aW1lPSIxNzM5ODY4OTgzIj48ZXZlbnQgZXZlbnR0eXBlPSIzMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iNCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTI2NDIyOTA0OSIvPjwvYXBwPjwvcmVxdWVzdD45⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3152
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\MicrosoftEdge_X64_134.0.3124.51.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\MicrosoftEdge_X64_134.0.3124.51.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\MicrosoftEdge_X64_134.0.3124.51.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:976 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=134.0.6998.45 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=134.0.3124.51 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff737d2cd48,0x7ff737d2cd54,0x7ff737d2cd607⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2372
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=17⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=134.0.6998.45 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=134.0.3124.51 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff737d2cd48,0x7ff737d2cd54,0x7ff737d2cd608⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2096
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=134.0.6998.45 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=134.0.3124.51 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff6d7d8cd48,0x7ff6d7d8cd54,0x7ff6d7d8cd608⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2064
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=134.0.6998.45 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\134.0.3124.51\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=134.0.3124.51 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff6d7d8cd48,0x7ff6d7d8cd54,0x7ff6d7d8cd608⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1200
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEzNC4wLjMxMjQuNTEiIGxhbmc9InpoLWNuIiBicmFuZD0iTTEwMCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJjb25zZW50PWZhbHNlIiBpbnN0YWxsYWdlPSIxNyIgbGFzdF9sYXVuY2hfY291bnQ9IjEiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzg0MzQ1NjcyMzgwMTM4MCI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjY5Mzg1NDQyIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjAyNzA0MTc0NiIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjYiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjYwNDAwMTEwNzQiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIxOTY3NTciIHN5c3RlbV91cHRpbWVfdGlja3M9IjY2NjY1NzMwMTkiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSIzNTkiIGRvd25sb2FkX3RpbWVfbXM9Ijc1NzM1IiBkb3dubG9hZGVkPSIxNzk1MjA1NjgiIHRvdGFsPSIxNzk1MjA1NjgiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjYyNjI1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1192
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4104,i,8156301195647385391,612045039718669237,262144 --variations-seed-version --mojo-platform-channel-handle=3780 /prefetch:141⤵PID:1100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5300,i,8156301195647385391,612045039718669237,262144 --variations-seed-version --mojo-platform-channel-handle=3768 /prefetch:141⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD56488f42e7cbac0c674942359e92ec4bb
SHA1fd5df680d286ec05937c83f9af3b43a79ec8b45f
SHA25695550d9a0e0cca2f447f841a0522f6c5273162941db7d56d41605b556fda8b1f
SHA512cb687f76bdc943a1b0dad4c80ad8e959434fc1995d7bbb95fc054eed05acd8bf275c7ecb09860d945f11d01872a03887a108c6fecfa43a86d21f539e85f74353
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E506F5D7-718F-4764-885E-2BED80700ACC}\EDGEMITMP_65BF6.tmp\setup.exe
Filesize7.2MB
MD5913fb6340d755d6c33c304c60b5c7838
SHA116d70344bd6d74ba611a57c59d6c227fcf1a3a9f
SHA2568500967b53304d83c3a12f92b89b45d804d73de9d9b3721f1efe09f000ede789
SHA512370473b6409b476a3d9194a50d21e53d359e40fb535fa68354bdea23c47ccd04e08b9fdbdd7ee030ac507b358b4f2b4daf64637ad0ffa89bda2bf862449e34ab
-
Filesize
201KB
MD5db1acd5625c82435c72dfe120e0fddd7
SHA1b8cad7b3f9efec8b4ff3c8c344481ba509096021
SHA256f8cbc120b6d4536300838ffb510b0a4dbff19086065d0ddd015386a73bcb5a09
SHA51213c8cbcdfb72f6a220825d35f5bc0d1a31046e32fb2258ae55f6538e4b0779fe20f2b92c0ad264256d9268f24e0480468e7f90985a5ba3e8c2a62211e760a010
-
Filesize
2.1MB
MD5396fe7495ec53d354cc4383e3590c296
SHA122f1c3b7b21a1f80f8d53b0e69e7df740e811bf4
SHA25666dd98d249287e7707b8f1ee181bfb7ab1e2d1d96a5a8a4605d2cc4065a516ec
SHA512c9826a18b5e4e8ff60d9960835c513d82c84c9fd864fb9e5ca99b276d32c88d1362beb870f3d7faab36009b7a430000d603483b1e7d4f124f87e366b0455ec1b
-
Filesize
21KB
MD5ceec929905877773cecd70ae48f77da4
SHA1139bb299a3dbc71d4f3aad86f6c4aa8ea2526035
SHA256fcd455c3983f3f7ac233c02170b1fba2d4dc93b34c0169176b4c92bd34d4527a
SHA51228c946b6d342b2301012c480fed4a817e220c57a5e406448cfee6514d723567c1f5e33eabc83370c53c103e4c8b8adf331492b43b3d2ef0bb6a4709f572c0aca
-
Filesize
440KB
MD571efcad545b463046639217a13374130
SHA16dab64e59b94adb4a76984e0b8364d352b2566ec
SHA2567d411b417c49604305ce9661da23b49a3a3e1ed1bd9d4c5986b4bf5e5f6da5e9
SHA512b9292d619dc2638a1df252371b100bc25ea52eba0316577cb299c7456875d629e2f8de4abe99cc77e17479665b50d1627342a712f7b7350a150f4628d27f99f2
-
Filesize
323KB
MD54cb788262fa59c4be8f0b1cb1ddddc4e
SHA1f3b89abb10b5bce78414e0dafb2f9bf05a0c3d90
SHA256e033730b673aeaa76a67341ee025a873e1c84019d5163ba56637a8754c420002
SHA512dd13cb0049e884461f9e2c9ef593c6673771d9e6ce5ad4fee7761adc63791a2e545c81299664b7e0e717d9a0a6b37a3b6bd574fbb18defa8dfa85ccf9c048723
-
Filesize
329KB
MD55d7a0ba41bd648103370bdf2c0f519a6
SHA132e444544a308be732bf26c8bdde41b35cdc940a
SHA256096edca798bc1fd536679bbf346dcae2c3f78488662dc22e28651b70b6d5c55a
SHA512142c83e0b802b1690b6dcfc27a01eb7e34eeaed07a2d0c1693c213b0dde190dcc76eb41de999a54f921013e69b212467d0f79b8444853654663d0f6fbea403e4
-
Filesize
334KB
MD5fd1f85a6dc3119e0a4f5455f01012f82
SHA1deb5bb2209c833386f4754fd5a073da0934f29da
SHA256c6eb0c7a7581ef4c00c8b433eec62ba8ebaa2b66e285eac7c85e8762ce9a95e9
SHA512b316fdcee66b3cf5de5efd7a24cac443bf3250846db8a7bb75c1c6d6528748a525d765c99b29f43a251c1660e9692342b18485b3ad03031d370da7c553f86e05
-
Filesize
342KB
MD5a76397571803d230d615bfc0b448d9a6
SHA10179ff1e454cab0670a9b1e1e501bdbafb103db9
SHA25636c76caadd27f18f27a34580111dc749fd0d00aca0337ff0afe2cfe182f825f6
SHA512b672ca36811cd1fb594b05d5e3e66e6801f837cf3b9dca85223777964aeb84c5dbc28794bcf2952fed3e67766700dd30c54847e9dfbc89cd60edf51296316003
-
Filesize
346KB
MD5c812dcba59ad9ceb357d53f12448361b
SHA1e16adfa6329d1ba76ec4c1d6263ded6d9b95c509
SHA2565aaed4905d31eeb439235ecc48ac08840e2c1ed810a22ab2095f890f1a5cb244
SHA51234115bff95595ed3b16b26c8ff95d51d9840eedcdc8f2c001c0dd91a14d23bef809b081e1fbbabe41b4763f680ffbd7e0603e5b841a5968fa08bde80b4d1e941
-
Filesize
351KB
MD5637aba53a6cae73b5010ed0dddbcd799
SHA167430bea1a033b7dc2aa877b1058b51f08f1b2e2
SHA25650a51ef31525e3227459cdff564ea3ef28497477b829c006cea3b69f6fd1a754
SHA51226522d401f1626e2a42185391f8ebb99f91b08d1910e0e99fea114fc75ab56244d291f7aa1d7b2059d641e9ec00bac5c834a8e368910f4579f49daf11b70aa44
-
Filesize
492KB
MD57c9581b0e6fdd05370d727acaecdff6a
SHA17e4eab534f97648779be30f8ad7d10d0f128f0d6
SHA25611328f379990d9b1f2b05c6dc3ff29dd278273a8c0d94cc373acc63001a3183d
SHA512eb6a65d70ca0af641c0d7c591dc066835745d4598b83e271f537b4da12b7a2101d67fdaeb518d43b49b8e23747d8ff5bc5476d314cfdff4b57ac6bd1b609ea35
-
Filesize
497KB
MD52b8310249f00fff88c79eaea65905ed6
SHA17fc65e2e985a380d5a8b65aa38e03022b15114f1
SHA256397d8d7dbbd4f08eba223dc4682b58835dbcd714f4d6a044aa0a8a310d9ff8ad
SHA5125cce864f6ffdec180848e3ec941966693476f33d38b80752861ba888e9716a5d23442b8daa509f17c378ef18378464afb37c35fceb2deb65c0f789510d36e03f
-
Filesize
184KB
MD5970e8e60f8fd182e2ac6278ed4588bba
SHA17d35dd6e51562a666869cc367dd61d4d370b1de4
SHA256a72b67f35624bb6dd17bb1ae0461940e9da9c1b5ec7b0b64c2f6bb9a566fdefa
SHA512323df948503ad6811993db19ce1f14b1705f324fddac450833ee87a54b9ed9d0b522edddafd46d485b7de52fee29a2b9aac51ff89ae25c8ec0550b1afdb73a46
-
Filesize
216KB
MD50da3b73ede1eca1ac1622832aeb43dc9
SHA10f93fc90692b8700563ccddab3a179de7b1d7b29
SHA2560f31a9dd82343452c5d6546c9256a605e7268824f565d6fe0490173d3c015339
SHA51230fbfca70c795c332a8cf51f2433fe9a2da1ae1266e3a09818a44a0cb699bb431d50bf5c2984f64a1e58cd759508b106d5bff3db0aeb942a3bf8dddc7f213a38