Analysis
-
max time kernel
227s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 19:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mx-app-blob-prod.maxon.net/mx-package-production/website/windows/maxon/maxonapp/releases/2023.2.1/Maxon_App_2023.2.1_Win.exe
Resource
win10v2004-20230220-en
General
-
Target
https://mx-app-blob-prod.maxon.net/mx-package-production/website/windows/maxon/maxonapp/releases/2023.2.1/Maxon_App_2023.2.1_Win.exe
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Maxon_App_2023.2.1_Win.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Executes dropped EXE 29 IoCs
pid Process 404 Maxon_App_2023.2.1_Win.exe 2332 Maxon App Installer.exe 2036 Red Giant Service.exe 3288 VC_redist.x64.19.exe 3916 VC_redist.x64.19.exe 4012 MxNotify.exe 2040 mxredirect.exe 4668 MicrosoftEdgeWebview2Setup.exe 4980 MicrosoftEdgeUpdate.exe 2872 MicrosoftEdgeUpdate.exe 2056 MicrosoftEdgeUpdate.exe 1620 MicrosoftEdgeUpdateComRegisterShell64.exe 388 MicrosoftEdgeUpdateComRegisterShell64.exe 1540 MicrosoftEdgeUpdateComRegisterShell64.exe 3896 MicrosoftEdgeUpdate.exe 2408 MicrosoftEdgeUpdate.exe 972 MicrosoftEdgeUpdate.exe 3872 MicrosoftEdge_X64_112.0.1722.39.exe 4824 setup.exe 1352 MicrosoftEdgeUpdate.exe 2892 Maxon.exe 4132 msedgewebview2.exe 856 msedgewebview2.exe 1408 msedgewebview2.exe 1000 msedgewebview2.exe 1740 msedgewebview2.exe 4020 msedgewebview2.exe 2392 msedgewebview2.exe 4280 msedgewebview2.exe -
Loads dropped DLL 48 IoCs
pid Process 3916 VC_redist.x64.19.exe 4980 MicrosoftEdgeUpdate.exe 2872 MicrosoftEdgeUpdate.exe 2056 MicrosoftEdgeUpdate.exe 1620 MicrosoftEdgeUpdateComRegisterShell64.exe 2056 MicrosoftEdgeUpdate.exe 388 MicrosoftEdgeUpdateComRegisterShell64.exe 2056 MicrosoftEdgeUpdate.exe 1540 MicrosoftEdgeUpdateComRegisterShell64.exe 2056 MicrosoftEdgeUpdate.exe 3896 MicrosoftEdgeUpdate.exe 2408 MicrosoftEdgeUpdate.exe 972 MicrosoftEdgeUpdate.exe 972 MicrosoftEdgeUpdate.exe 2408 MicrosoftEdgeUpdate.exe 1352 MicrosoftEdgeUpdate.exe 2892 Maxon.exe 4132 msedgewebview2.exe 856 msedgewebview2.exe 4132 msedgewebview2.exe 4132 msedgewebview2.exe 4132 msedgewebview2.exe 1408 msedgewebview2.exe 1408 msedgewebview2.exe 1408 msedgewebview2.exe 1000 msedgewebview2.exe 1000 msedgewebview2.exe 1000 msedgewebview2.exe 4132 msedgewebview2.exe 1740 msedgewebview2.exe 1740 msedgewebview2.exe 1740 msedgewebview2.exe 1408 msedgewebview2.exe 4020 msedgewebview2.exe 1408 msedgewebview2.exe 1408 msedgewebview2.exe 1408 msedgewebview2.exe 1408 msedgewebview2.exe 1408 msedgewebview2.exe 4020 msedgewebview2.exe 4020 msedgewebview2.exe 2392 msedgewebview2.exe 2392 msedgewebview2.exe 2392 msedgewebview2.exe 4280 msedgewebview2.exe 4280 msedgewebview2.exe 4280 msedgewebview2.exe 4132 msedgewebview2.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 4584 icacls.exe 4468 icacls.exe 4144 icacls.exe 1016 icacls.exe -
Registers COM server for autorun 1 TTPs 35 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\CLSID\{a398e697-bd60-4066-9498-8488353f3a21}\LocalServer32\ = "C:\\Program Files\\Maxon\\Tools\\MxNotify.exe" MxNotify.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\CLSID\{a398e697-bd60-4066-9498-8488353f3a21}\LocalServer32 MxNotify.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Maxon.exe -
Checks system information in the registry 2 TTPs 8 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\WidevineCdm\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\ja.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\th.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\EBWebView\x64\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\pl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\ta.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Notifications\SoftLandingAssetLight.gif setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\nacl_irt_x86_64.nexe setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\msedgeupdateres_tt.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\zh-TW.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\msvcp140_codecvt_ids.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\msedge.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Installer\msedge_7z.data setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\mk.pak setup.exe File created C:\Program Files\Red Giant\Services\rguninstaller.exe Maxon App Installer.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\msedgeupdateres_ca-Es-VALENCIA.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\msedgeupdateres_sr-Cyrl-RS.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\es.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Extensions\external_extensions.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\resources.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\identity_proxy\beta.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\tr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{447267A9-4418-447B-84F8-8C222289E8D2}\EDGEMITMP_8E266.tmp\setup.exe MicrosoftEdge_X64_112.0.1722.39.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\d3dcompiler_47.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\vk_swiftshader.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\ja.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\kk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Trust Protection Lists\Sigma\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\zh-CN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\identity_proxy\dev.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\msedgeupdateres_bn.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\msedgeupdateres_kok.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\msedgeupdateres_mi.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\ne.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\learning_tools.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\sl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\az.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\id.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\te.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\mi.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\msedgeupdateres_es.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\msedgeupdateres_uk.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\eu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\VisualElements\SmallLogo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\onnxruntime.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\edge_feedback\mf_trace.wprp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\pt-BR.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\msedge.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\ca-Es-VALENCIA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\delegatedWebFeatures.sccd setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\fr-CA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\en-GB.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\112.0.1722.39.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\ug.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\Locales\zh-TW.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\msedgeupdateres_mt.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\bg.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\112.0.1722.39\Locales\sr.pak setup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local Red Giant Service.exe -
Launches sc.exe 12 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3916 sc.exe 3148 sc.exe 1620 sc.exe 3084 sc.exe 4240 sc.exe 3748 sc.exe 1636 sc.exe 5108 sc.exe 2172 sc.exe 556 sc.exe 4244 sc.exe 1816 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 11 IoCs
pid Process 828 timeout.exe 4716 timeout.exe 4728 timeout.exe 1352 timeout.exe 3740 timeout.exe 2580 timeout.exe 3752 timeout.exe 3892 timeout.exe 4124 timeout.exe 3672 timeout.exe 3792 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Kills process with taskkill 1 IoCs
pid Process 1240 taskkill.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = d42e80ebae45d901 iexplore.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2805313916" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31026765" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2805313916" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{058F1B0B-EDE7-43CB-B214-F632E88BD4AF}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31026765" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D22ED26A-DA40-11ED-9EF6-D660CAC54930} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388185721" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5} MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\lastrun = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\Elevation MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FEF5409-327B-46FF-830B-1F9FCC96DA4E} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc\CurVer\ = "MicrosoftEdgeUpdate.Update3WebSvc.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\ = "Microsoft Edge Update Process Launcher Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.ProcessLauncher" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ = "ServiceModule" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusMachine.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ = "IPackage" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ = "ICoCreateAsync" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine\CLSID\ = "{5F6A18BB-6231-424B-8242-19E5BB94F8ED}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods\ = "24" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A} MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods\ = "6" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods\ = "24" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebSvc.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\CurVer\ = "MicrosoftEdgeUpdate.ProcessLauncher.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher.1.0\CLSID\ = "{08D832B9-D2FD-481F-98CF-904D00DF63CC}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\ProgID\ = "MicrosoftEdgeUpdate.ProcessLauncher.1.0" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\ProgID\ = "MicrosoftEdgeUpdate.Update3COMClassService.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods\ = "23" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine.1.0\CLSID\ = "{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine.dll" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2332 Maxon App Installer.exe 2332 Maxon App Installer.exe 2332 Maxon App Installer.exe 2332 Maxon App Installer.exe 2332 Maxon App Installer.exe 2332 Maxon App Installer.exe 2332 Maxon App Installer.exe 2332 Maxon App Installer.exe 4980 MicrosoftEdgeUpdate.exe 4980 MicrosoftEdgeUpdate.exe 2040 mxredirect.exe 2040 mxredirect.exe 4980 MicrosoftEdgeUpdate.exe 4980 MicrosoftEdgeUpdate.exe 4980 MicrosoftEdgeUpdate.exe 4980 MicrosoftEdgeUpdate.exe 1352 MicrosoftEdgeUpdate.exe 1352 MicrosoftEdgeUpdate.exe 2040 mxredirect.exe 2040 mxredirect.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4132 msedgewebview2.exe 4132 msedgewebview2.exe 4132 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1240 taskkill.exe Token: SeDebugPrivilege 4980 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4980 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1352 MicrosoftEdgeUpdate.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 4132 msedgewebview2.exe 4132 msedgewebview2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 4948 IEXPLORE.EXE 4948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2560 wrote to memory of 4948 2560 iexplore.exe 84 PID 2560 wrote to memory of 4948 2560 iexplore.exe 84 PID 2560 wrote to memory of 4948 2560 iexplore.exe 84 PID 2560 wrote to memory of 404 2560 iexplore.exe 86 PID 2560 wrote to memory of 404 2560 iexplore.exe 86 PID 2560 wrote to memory of 404 2560 iexplore.exe 86 PID 404 wrote to memory of 2332 404 Maxon_App_2023.2.1_Win.exe 88 PID 404 wrote to memory of 2332 404 Maxon_App_2023.2.1_Win.exe 88 PID 2332 wrote to memory of 2552 2332 Maxon App Installer.exe 97 PID 2332 wrote to memory of 2552 2332 Maxon App Installer.exe 97 PID 2552 wrote to memory of 4584 2552 cmd.exe 98 PID 2552 wrote to memory of 4584 2552 cmd.exe 98 PID 2552 wrote to memory of 4468 2552 cmd.exe 99 PID 2552 wrote to memory of 4468 2552 cmd.exe 99 PID 2552 wrote to memory of 1816 2552 cmd.exe 100 PID 2552 wrote to memory of 1816 2552 cmd.exe 100 PID 2552 wrote to memory of 1352 2552 cmd.exe 101 PID 2552 wrote to memory of 1352 2552 cmd.exe 101 PID 2552 wrote to memory of 1636 2552 cmd.exe 102 PID 2552 wrote to memory of 1636 2552 cmd.exe 102 PID 2552 wrote to memory of 4124 2552 cmd.exe 103 PID 2552 wrote to memory of 4124 2552 cmd.exe 103 PID 2552 wrote to memory of 5108 2552 cmd.exe 104 PID 2552 wrote to memory of 5108 2552 cmd.exe 104 PID 2552 wrote to memory of 3740 2552 cmd.exe 105 PID 2552 wrote to memory of 3740 2552 cmd.exe 105 PID 2552 wrote to memory of 3916 2552 cmd.exe 106 PID 2552 wrote to memory of 3916 2552 cmd.exe 106 PID 2552 wrote to memory of 2580 2552 cmd.exe 107 PID 2552 wrote to memory of 2580 2552 cmd.exe 107 PID 2552 wrote to memory of 2172 2552 cmd.exe 109 PID 2552 wrote to memory of 2172 2552 cmd.exe 109 PID 2552 wrote to memory of 3672 2552 cmd.exe 108 PID 2552 wrote to memory of 3672 2552 cmd.exe 108 PID 2552 wrote to memory of 3148 2552 cmd.exe 110 PID 2552 wrote to memory of 3148 2552 cmd.exe 110 PID 2552 wrote to memory of 828 2552 cmd.exe 112 PID 2552 wrote to memory of 828 2552 cmd.exe 112 PID 2332 wrote to memory of 3912 2332 Maxon App Installer.exe 113 PID 2332 wrote to memory of 3912 2332 Maxon App Installer.exe 113 PID 3912 wrote to memory of 4144 3912 cmd.exe 115 PID 3912 wrote to memory of 4144 3912 cmd.exe 115 PID 2332 wrote to memory of 4124 2332 Maxon App Installer.exe 117 PID 2332 wrote to memory of 4124 2332 Maxon App Installer.exe 117 PID 4124 wrote to memory of 3288 4124 cmd.exe 118 PID 4124 wrote to memory of 3288 4124 cmd.exe 118 PID 4124 wrote to memory of 3288 4124 cmd.exe 118 PID 3288 wrote to memory of 3916 3288 VC_redist.x64.19.exe 119 PID 3288 wrote to memory of 3916 3288 VC_redist.x64.19.exe 119 PID 3288 wrote to memory of 3916 3288 VC_redist.x64.19.exe 119 PID 2332 wrote to memory of 2128 2332 Maxon App Installer.exe 120 PID 2332 wrote to memory of 2128 2332 Maxon App Installer.exe 120 PID 2128 wrote to memory of 1240 2128 cmd.exe 122 PID 2128 wrote to memory of 1240 2128 cmd.exe 122 PID 2128 wrote to memory of 1952 2128 cmd.exe 124 PID 2128 wrote to memory of 1952 2128 cmd.exe 124 PID 2200 wrote to memory of 4012 2200 explorer.exe 126 PID 2200 wrote to memory of 4012 2200 explorer.exe 126 PID 2332 wrote to memory of 2016 2332 Maxon App Installer.exe 127 PID 2332 wrote to memory of 2016 2332 Maxon App Installer.exe 127 PID 2016 wrote to memory of 1016 2016 cmd.exe 129 PID 2016 wrote to memory of 1016 2016 cmd.exe 129 PID 2016 wrote to memory of 1620 2016 cmd.exe 130 PID 2016 wrote to memory of 1620 2016 cmd.exe 130 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://mx-app-blob-prod.maxon.net/mx-package-production/website/windows/maxon/maxonapp/releases/2023.2.1/Maxon_App_2023.2.1_Win.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4948
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\Maxon_App_2023.2.1_Win.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\Maxon_App_2023.2.1_Win.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\7zS491B4B96\Maxon App Installer.exe"C:\Users\Admin\AppData\Local\Temp\7zS491B4B96\Maxon App Installer.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfbe421a4-8e19-4df4-8194-bda17b58789d\postflight\fuse-windows-postflight.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Red Giant" /t /grant *S-1-1-0:(OI)(CI)F5⤵
- Modifies file permissions
PID:4584
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Maxon" /t /grant *S-1-1-0:(OI)(CI)F5⤵
- Modifies file permissions
PID:4468
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" stop "Red Giant Service"5⤵
- Launches sc.exe
PID:1816
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:1352
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" delete "Red Giant Service"5⤵
- Launches sc.exe
PID:1636
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:4124
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" create "Red Giant Service" binpath= "\"C:\Program Files\Red Giant\Services\Red Giant Service.exe\"" start= auto obj= "NT AUTHORITY\Localservice"5⤵
- Launches sc.exe
PID:5108
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:3740
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" description "Red Giant Service" "Provides common services to Maxon products."5⤵
- Launches sc.exe
PID:3916
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:2580
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:3672
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" failure "Red Giant Service" reset= 0 actions= restart/600005⤵
- Launches sc.exe
PID:2172
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" start "Red Giant Service"5⤵
- Launches sc.exe
PID:3148
-
-
C:\Windows\system32\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfbe421a4-8e19-4df4-8194-bda17b58789d\preflight\fuse-windows-setup-preflight.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Maxon" /t /grant *S-1-1-0:(OI)(CI)F5⤵
- Modifies file permissions
PID:4144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpa2523161-b367-402a-ad6a-6418d06dfa77\postflight\vcredist-postflight.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\tmpa2523161-b367-402a-ad6a-6418d06dfa77\files\VC_redist.x64.19.exe"C:\Users\Admin\AppData\Local\Temp\tmpa2523161-b367-402a-ad6a-6418d06dfa77\postflight\..\files\VC_redist.x64.19.exe" /quiet /norestart5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\Temp\{10B83370-DC60-4D82-9168-21C977C4A2CF}\.cr\VC_redist.x64.19.exe"C:\Windows\Temp\{10B83370-DC60-4D82-9168-21C977C4A2CF}\.cr\VC_redist.x64.19.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\tmpa2523161-b367-402a-ad6a-6418d06dfa77\files\VC_redist.x64.19.exe" -burn.filehandle.attached=544 -burn.filehandle.self=552 /quiet /norestart6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3916
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9339157e-d2a3-4a99-8c7d-d93c59b2b9ab\postflight\mxnotify-windows-postflight.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\taskkill.exetaskkill /F /IM MxNotify.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\explorer.exeexplorer.exe "C:\Program Files\Maxon\Tools\MxNotify.exe"5⤵PID:1952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcc7b5614-81d3-461e-953d-e144c1e090fb\postflight\mxredirect-windows-postflight.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Maxon" /t /grant *S-1-1-0:(OI)(CI)F5⤵
- Modifies file permissions
PID:1016
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" stop "mxredirect"5⤵
- Launches sc.exe
PID:1620
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:3792
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" delete "mxredirect"5⤵
- Launches sc.exe
PID:556
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:3752
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" create "mxredirect" binpath= "C:\Program Files\Maxon\Tools\mxredirect.exe" start= auto5⤵
- Launches sc.exe
PID:3084
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:4716
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" description "mxredirect" "Manages scheme ownership for Maxon products."5⤵
- Launches sc.exe
PID:4244
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:4728
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" failure "mxredirect" reset= 0 actions= restart/600005⤵
- Launches sc.exe
PID:4240
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:3892
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" start "mxredirect"5⤵
- Launches sc.exe
PID:3748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp0c273d42-6433-4fd4-8511-5be979de922c\bin\install-mswebview.bat""4⤵PID:2392
-
C:\Program Files\Maxon\Tools\MicrosoftEdgeWebview2Setup.exe"C:\Program Files\Maxon\Tools\MicrosoftEdgeWebview2Setup.exe" /install5⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4668 -
C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUF2E.tmp\MicrosoftEdgeUpdate.exe" /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true"6⤵
- Sets file execution options in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2872
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2056 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1620
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:388
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1540
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNDUuNDkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7M0ExOTFBOUQtQjRDQy00Q0VELTk5MDUtQjdDMEM3MTlGNTgwfSIgdXNlcmlkPSJ7MkIwMjlDODYtM0Y4MC00QjJDLUI2MzEtRjI3MjUwNDI4NThCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5NjIxODcwQy0xNTAwLTQ3OTEtOEQyMC1ENTA2QzdDOUQ2OTF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iNCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtxV0pTeld3UGZkY0xSK1hHSXY2eHJaZmlZT3hoUFUyczFOV21qV2NhRlBnPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTczLjQ1IiBuZXh0dmVyc2lvbj0iMS4zLjE0NS40OSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSIxMDQ2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:3896
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true" /installsource otherinstallcmd /sessionid "{3A191A9D-B4CC-4CED-9905-B7C0C719F580}"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408
-
-
-
-
-
C:\Windows\explorer.exeexplorer.exe "C:\Program Files\Maxon\App Manager\Maxon.exe"4⤵PID:4184
-
-
-
-
C:\Program Files\Red Giant\Services\Red Giant Service.exe"C:\Program Files\Red Giant\Services\Red Giant Service.exe"1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2036
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files\Maxon\Tools\MxNotify.exe"C:\Program Files\Maxon\Tools\MxNotify.exe"2⤵
- Executes dropped EXE
- Registers COM server for autorun
PID:4012
-
-
C:\Program Files\Maxon\Tools\mxredirect.exe"C:\Program Files\Maxon\Tools\mxredirect.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
PID:972 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{447267A9-4418-447B-84F8-8C222289E8D2}\MicrosoftEdge_X64_112.0.1722.39.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{447267A9-4418-447B-84F8-8C222289E8D2}\MicrosoftEdge_X64_112.0.1722.39.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3872 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{447267A9-4418-447B-84F8-8C222289E8D2}\EDGEMITMP_8E266.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{447267A9-4418-447B-84F8-8C222289E8D2}\EDGEMITMP_8E266.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{447267A9-4418-447B-84F8-8C222289E8D2}\MicrosoftEdge_X64_112.0.1722.39.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:4824
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNDUuNDkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7M0ExOTFBOUQtQjRDQy00Q0VELTk5MDUtQjdDMEM3MTlGNTgwfSIgdXNlcmlkPSJ7MkIwMjlDODYtM0Y4MC00QjJDLUI2MzEtRjI3MjUwNDI4NThCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins2N0FBMzBFNC1CQTlELTQzNkMtOThGMy1FRkMzODkxQ0Q4RDh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iNCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMTIuMC4xNzIyLjM5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSItMSIgaW5zdGFsbGRhdGU9Ii0xIj48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjkiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI1IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-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-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2556
-
C:\Program Files\Maxon\App Manager\Maxon.exe"C:\Program Files\Maxon\App Manager\Maxon.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2892 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Maxon.exe --webview-exe-version=2023.2.1.0 --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=MojoIpcz --mojo-named-platform-channel-pipe=2892.2940.5622550548150528223⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- System policy modification
PID:4132 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=112.0.5615.49 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=112.0.1722.39 --initial-client-data=0x124,0x128,0x12c,0x100,0xd8,0x7fffe49135f0,0x7fffe4913600,0x7fffe49136104⤵
- Executes dropped EXE
- Loads dropped DLL
PID:856
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2023.2.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 --field-trial-handle=1944,i,9740975920221660298,1365170242401081515,131072 --disable-features=MojoIpcz /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2023.2.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2056 --field-trial-handle=1944,i,9740975920221660298,1365170242401081515,131072 --disable-features=MojoIpcz /prefetch:34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1000
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2023.2.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2344 --field-trial-handle=1944,i,9740975920221660298,1365170242401081515,131072 --disable-features=MojoIpcz /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2023.2.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=3316 --field-trial-handle=1944,i,9740975920221660298,1365170242401081515,131072 --disable-features=MojoIpcz /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4020
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2023.2.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=4168 --field-trial-handle=1944,i,9740975920221660298,1365170242401081515,131072 --disable-features=MojoIpcz /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:2392
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\112.0.1722.39\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2023.2.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=4348 --field-trial-handle=1944,i,9740975920221660298,1365170242401081515,131072 --disable-features=MojoIpcz /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4280
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD553e53d314d5fe8918a05338bbec21c71
SHA19a5b3bf17e942b6e07d4e17c0eecaa3980754b6c
SHA256634a867a08939af522936118211e58c2db0ba4a9e7c3f35df019107632835ea6
SHA5124c88951f080772d97b8a3f3193ed1be4e8f08e0a9d964dc50f1be61f65095a224981ddf3b23576debf2f4e184a74047901fc01ac94ec1b5152e5122a7088ad1d
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\112.0.1722.39\MicrosoftEdge_X64_112.0.1722.39.exe
Filesize136.2MB
MD57ff64ed6d6d9f41c903fb77f47a3af31
SHA12bf440025fca3c51e74d0a73713d01aa5b6b6dd5
SHA25681c166b377d862e29353fc72eb2a2683269b970e29ef3156b02f47af27d3c415
SHA512846aee6c4090efc9a97e6ffcbc50a0a76d1c594c47d49dbe669f6cfb9ed7021641307e1e02372e4125f9cc3284260ab6db2dc10364097d5e2c311a376d869225
-
Filesize
209KB
MD5d7d541bd3dd228ad24dadfc4089b0704
SHA13fe7399267cf9bce649922d8ea0be9a5ffa77f67
SHA256cedade653a1e8d68809199c87a65a7a69fb360f67177262e651253cf0316b842
SHA512aca02d3bc55b7301257c56232b899145ad3266c210997d9eae664a0c6b6796e646a93db012e0a1b0d446cd64c55f916ab6f9a822b7b6b5faabfb75e3b5e3f011
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
160KB
MD59caf47e9999af93d8f49c0f5b62ac693
SHA1dd83435e30a88d2df849e4d4c8e3e671d545677a
SHA2568ce4842eb307265d3a1a43bb558925030ec5c399bd8a67ac0e3b9a9b55e1a64d
SHA5126aea29ec91f4e494917aa22331ae6cb62e4ebcf84b03abe562bad43993b5750388b35084cd179ef52c00799c88dad8cc658e31e3649cf866c228ccd5cb0118ea
-
Filesize
209KB
MD5d7d541bd3dd228ad24dadfc4089b0704
SHA13fe7399267cf9bce649922d8ea0be9a5ffa77f67
SHA256cedade653a1e8d68809199c87a65a7a69fb360f67177262e651253cf0316b842
SHA512aca02d3bc55b7301257c56232b899145ad3266c210997d9eae664a0c6b6796e646a93db012e0a1b0d446cd64c55f916ab6f9a822b7b6b5faabfb75e3b5e3f011
-
Filesize
209KB
MD5d7d541bd3dd228ad24dadfc4089b0704
SHA13fe7399267cf9bce649922d8ea0be9a5ffa77f67
SHA256cedade653a1e8d68809199c87a65a7a69fb360f67177262e651253cf0316b842
SHA512aca02d3bc55b7301257c56232b899145ad3266c210997d9eae664a0c6b6796e646a93db012e0a1b0d446cd64c55f916ab6f9a822b7b6b5faabfb75e3b5e3f011
-
Filesize
203KB
MD5d51ad58ff2e702fcf54e5580c3d5195b
SHA1cf65da922713ee8507fd7976ebf4786b83d194c4
SHA256e14aa9b45f08b41fa555568396b38c3cef3827ce46c95ac1c34b34fb65cb20a9
SHA512c9d40c6c22a9115162b34b24fe24f8da5c263b634067ace2822e6cc3206c01a546ed1df3dde09e31cdd86d0b175dddf696e9a5fea63987175c187428056f9e3d
-
Filesize
237KB
MD5b6e0a6427151dfaeca0fc7d84b6e9523
SHA1a03f31f6a8e0fc7f386993a8e8082c383b41a438
SHA256f70cddb720fb4e482704693af2fb2cd862c8ca324a13cb009d8ed30c95184f23
SHA5126a4c673c12a7b8970a6920b4d832fb42680f2b277a832f28f2c41d57821cf7e8a46f562ec6783b81b7eff71365af0f713230a454793396518578c5536d124c29
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.5MB
MD50c9199555050145619d3adb0b9c86d90
SHA1e290a258869bb45a52c3cec13cfe042c6cd411f7
SHA256eaca58832f1c5d40db402d8165997893be10c42f86b372ab253c66cdacef1cf7
SHA512ca71932635875224d1cf439294065db925d1c46609b529b589e1ee874f24f2a838a366fc083e42444f8e1ff0eba6ae0c8db6e43ced9eb6c15897d2308d8b2bd1
-
Filesize
2.5MB
MD50c9199555050145619d3adb0b9c86d90
SHA1e290a258869bb45a52c3cec13cfe042c6cd411f7
SHA256eaca58832f1c5d40db402d8165997893be10c42f86b372ab253c66cdacef1cf7
SHA512ca71932635875224d1cf439294065db925d1c46609b529b589e1ee874f24f2a838a366fc083e42444f8e1ff0eba6ae0c8db6e43ced9eb6c15897d2308d8b2bd1
-
Filesize
27KB
MD5bbcba04b4368221736141f6da3dcc259
SHA154e0d0761995fadcb9d588a079fa1e4b472a968d
SHA256988be2b023768090eae11fddff079e31512edb975920f97c1a3e9bc8c42c0064
SHA512fa00c567de74a56223af838a89e6efc036de786c3e5513ad32d358693d3931873179007aa54b99f7be54ef5df8584f4fa7bc75dc13f2fdc92b4bedf36a7ef4dd
-
Filesize
23KB
MD5c2684f7568e44d9adb284f39e658af48
SHA1f15d1381d2b6cbe8b28d7778236f2e1f7cd5b93e
SHA2565cc5a2b40b4aa078dec600da52c2fd06b1c14ffb780fe7e928f815001aea1467
SHA51279056a8995daca7de8664a67fb557c8f2cf5c460501d149b0dfcde3e9b81f3fcd903c832c4406ac63fe82436cfa8d83e34eb1681cdd1da04d70314791bfb6d50
-
Filesize
25KB
MD5529a2715fb172ed53f691d7e9f162965
SHA1287ac0ef438bbfa46b6968cb9b49405ecbc17b65
SHA256db8e1c2616674f557cf12d12a72e69b270af942e507c6ec57b38b5945120a364
SHA512d3a62e277b0872c1371f5459f2ca35293ce6db27997462c7c7b70337cf9a08cd528d9063e4daa7124a32c47f8f68c10fae8eef8a6311872757b3b84f4c04b0b2
-
Filesize
27KB
MD5149dde1066fc706cad0e940a43712b8a
SHA105ece216582c89c53ddac41e0a45c3aa021d9a3f
SHA256536ac447c4716c40a44eb4d41b38da584d449e402ae2c009968bd276221d7bee
SHA512950f1023ac42855ece0fbd9816e6b64fb2df6e532278c59ee96594692de97cd6af069a57006ad9aad3bb2cbeb83ca95c13ae018e7692356ed622c851f648e089
-
Filesize
28KB
MD52d81bba9b5ac6c450186db93b761896e
SHA169669f5cb136ffc4bc783947027d5a620595eb45
SHA256768ba9c4c0e7e044f659b44e2e95f60b14ccd9a4898e2b5a7e60cc16a8595c36
SHA512774433c8c8bf2eff50218810180b4cf97fa67a9ac2cdf8215b16b0772039f14df541d9d9388db8176b98feec26ed7086be9eb2dc1eb6bcba350bd670e4767bba
-
Filesize
26KB
MD5cb78d1e912542bc2299cece8348c9f52
SHA170f35b8fc2ee00e8f47b67e8b3b8cc018cd4e29d
SHA2569b432eb71b7b94dbe7e9890ad112f1570a74221eb766d5b40c105daa03697b8c
SHA512fb58db15d3a258a85a3e93a8cc752ccc3d42655f9ab7d9730afa1ac2a301555f37f5a15daf10933d32b2c8e566acafa2a267ffc7103814e7fe924733c54ce9d6
-
Filesize
1.7MB
MD56abf61dd5a6318d76a11ce43b4bee001
SHA1546fac452bb8892bed42b79b17dc0c86ca5ae7dc
SHA256389601cbd7e9256ce22348e3ceb2c33e39ddc7a8c75db897d269dc23b17ad11d
SHA512e454b2bb8ee2bf1355613afdf8389076fae5ffb8305ca2748cb05b597b54f039647e9aced03946dd6c0057305de80ca69db09cb2e539c6645fb2da6abf12ea7b
-
Filesize
1.7MB
MD56abf61dd5a6318d76a11ce43b4bee001
SHA1546fac452bb8892bed42b79b17dc0c86ca5ae7dc
SHA256389601cbd7e9256ce22348e3ceb2c33e39ddc7a8c75db897d269dc23b17ad11d
SHA512e454b2bb8ee2bf1355613afdf8389076fae5ffb8305ca2748cb05b597b54f039647e9aced03946dd6c0057305de80ca69db09cb2e539c6645fb2da6abf12ea7b
-
Filesize
1.1MB
MD5de1389a03015f6e2285e65a4253000fe
SHA1728f5d47219f88154ad96d88327103ae5aab4ee4
SHA2566d9220aaf7c51597f76cb52a72fb77e7952006a1969b20606270322ddc31e8fb
SHA5123ea1935e795e201576fea1e6552aabfbe321dc30cd61d043256b042ac95ff16f4b4ed1f4fc23e00a1f6317229cc9a7c894ae1de116b6887f8c222c47163eb72c
-
Filesize
1.1MB
MD5de1389a03015f6e2285e65a4253000fe
SHA1728f5d47219f88154ad96d88327103ae5aab4ee4
SHA2566d9220aaf7c51597f76cb52a72fb77e7952006a1969b20606270322ddc31e8fb
SHA5123ea1935e795e201576fea1e6552aabfbe321dc30cd61d043256b042ac95ff16f4b4ed1f4fc23e00a1f6317229cc9a7c894ae1de116b6887f8c222c47163eb72c
-
Filesize
699KB
MD549e57a207e5702814e1148f7ea0afdbb
SHA11a88f27c3e2dcade29ee12b90e300aeabdd8b38c
SHA256352630f109f53076b2b5661bd401577f1bfd44f749acc94871e16955294b4d3b
SHA5124480f965542f07fcac1709c4a728dcfdbf5b20741f744856cd89dfe03598e05c56ee5bf2e6aff18ee9a51f9849d57b054129786b5205dfb2cb3bf1d8bd66d4eb
-
Filesize
699KB
MD549e57a207e5702814e1148f7ea0afdbb
SHA11a88f27c3e2dcade29ee12b90e300aeabdd8b38c
SHA256352630f109f53076b2b5661bd401577f1bfd44f749acc94871e16955294b4d3b
SHA5124480f965542f07fcac1709c4a728dcfdbf5b20741f744856cd89dfe03598e05c56ee5bf2e6aff18ee9a51f9849d57b054129786b5205dfb2cb3bf1d8bd66d4eb
-
Filesize
8.6MB
MD567320bcddfa96f0b8f93027f86f393dc
SHA138b62aca92c6b0fce963251271d5c66656f3e9fb
SHA2561da765d7e1ef0f5837c3b7facee64320211d44ab964d16ea5f7d161e7ae685ce
SHA512a91cf6a1752148f3a0108a2c02c78af422e8aea875508ec70713badb82877749af07210deee670ccdea874dae95955e609b0799441b9c82330f53857d8c59653
-
Filesize
8.6MB
MD567320bcddfa96f0b8f93027f86f393dc
SHA138b62aca92c6b0fce963251271d5c66656f3e9fb
SHA2561da765d7e1ef0f5837c3b7facee64320211d44ab964d16ea5f7d161e7ae685ce
SHA512a91cf6a1752148f3a0108a2c02c78af422e8aea875508ec70713badb82877749af07210deee670ccdea874dae95955e609b0799441b9c82330f53857d8c59653
-
Filesize
829KB
MD57c3b449f661d99a9b1033a14033d2987
SHA16c8c572e736bc53d1b5a608d3d9f697b1bb261da
SHA256ae996edb9b050677c4f82d56092efdc75f0addc97a14e2c46753e2db3f6bd732
SHA512a58783f50176e97284861860628cc930a613168be70411fabafbe6970dcccb8698a6d033cfc94edf415093e51f3d6a4b1ee0f38cc81254bdccb7edfa2e4db4f8
-
Filesize
24KB
MD557526805e8d4d1a5512c61e4133a3264
SHA1e8c24e4c0b6f45bb3b8c93441d068c1244fac761
SHA2560bff9050e7cfcb87a376978817095972288f7363e69da9caf5569279b9523320
SHA512c90e9e1116d117eb8cea47394c6353c4c62eb9a43291e127de40b86575a4a0b7280b44ffef625c5f256fa644e2844db67539fe1bc6b380c9ad4ad188995e2fc4
-
Filesize
25KB
MD55bb76b62151333328f4002471f9398fc
SHA1bb34c4b834637c21d003ae5a7db2c0fd9350c499
SHA256b17849ae3cdd873980d244f2d24cef476723447ccfb3c86af5cf05feb6b37c49
SHA5120ceb06ca64af35882db4001ce82087efde313828af6d0849e7bb331ca35ab540b6531bfd923c1cd4c14768c228b7c6a09df6695126c245208e2ccaa4d7466a8d
-
Filesize
2KB
MD5dba2fb51fc2e877390d45443f68824c8
SHA167b65f470fadaaa312b352c93231649edf7e12ef
SHA2567df771379aee6496ec8b090a6da69bbfe9950818c5f3cdfaa93e50da7e001974
SHA51219d789b73d67ffd61aaf8b9d758c17818ffdb23dd8d8fe14ee20cdbd29ab0121e1cbb9945a2facc2b269f5fda553321d2c2bf11b5b8f36d7897885862bf9b63d
-
Filesize
3KB
MD5b55f1ab0f67abbc1ffc525e4b3e1ccb0
SHA1303cdf5e1fa2924e7a4b597de9cdff61c300baee
SHA2565934d30db8b36551ec008537e9ec273303732d66c4d6e634cf9664a12e7c3786
SHA51227a6b30909864289260384919dc2bd15a793fbb4301b953d96dcb1505d864cd77982ee068676df764cd4a19552b5e335bf6eb63e178f3a898adbe07bafb81cac
-
Filesize
56KB
MD59ab666120c65ad27426995b1af297a48
SHA15995af88672c1994efbe59f545d2aad6252df1bd
SHA256eb1d0f2daa1f8e4a8f0f3c9c6fd281878e16ccf4f9d5c2bb00626281e40dc205
SHA512085245871e99906630b5044044cf92b1e643eba6aba57fe3a5e64b0b156389701e95efe5e39c0e566064381a72b8b8f42d52b8c37ba9b17f7b733e4a76662b01
-
Filesize
24KB
MD5f1ec9c2f98d6cafb6f2aa713cc5eb3f3
SHA1f984e7d1eb09a63158871ebbe4fc336fe4be375c
SHA256e43a6dd7d4c71260970bd03d54be127b1315780a8a16639ca1c5b76db6d458f7
SHA51226f88b8142c8104bbe5a0db93d6537653175243d656b9bb24e9e7a32b01b6fc8713210234c347b1772c6d0e2d5ce0a4e1eef887b4be902db271c27a4291c72ff
-
Filesize
591B
MD5c3a4abf0c560ee2cd2bb10c842d1d0a3
SHA10dddb52041664986885a70afd0a5be3eacebfead
SHA2568295adc7f4ba17385a1dc77be707a8d70ed2a1e090cc6369199a48d318aa1123
SHA51228c2622ba0d0a0bb269df5a1d016380eb201ba91060b06b9a0bd0326f31392e2e39f2f76f54dc544bed5a58290ae3cbdc31e901a8453d94b32c9b3fb133cbfd3
-
Filesize
601B
MD5e52f73d520c7751bbe46ef28ffbbf05c
SHA143f676a2e44178f0fcd618f09cbcef2071ed686e
SHA25679fed1056f270b628c3ae02f569cfae28dc4e4fcef847b81435e8278a912cc71
SHA5123baf34faca6814a4cc80673917660ea52ff34603d2bba0550d4bc62881e765ebbcc1969e599c1601b18f27eefdbbb37bef497e91548b6ecbfdd37ff34fc4ca0f
-
Filesize
616B
MD5373cd25ef8b1b01a13121d92855680d8
SHA14d94d4ce9f09ac5ce5e15ef95d067b6508aa70e0
SHA25661cd3d1b458f7d7012504bfb237a969b9cc08ec03bfcae801aa4ff9b8a806f78
SHA5122d5dfb93feceef016d670b94e06a7510df727091fbbe8416cc2551a66a2ed8f5eab80a270465d64003e930376965eb8224102373c97bf5971761db35ebe607c4
-
Filesize
118B
MD57a0870d057a19791429a1479a0a99a5b
SHA192415c0250f7ef6162b14054646187675842899d
SHA256c7f106b02c69d504990c0252654eaaa0c8952f9bb2906672307fe7bad39e7b12
SHA512dc15c5a8ff055d0fdfa7f6ebd4216e60abed293794f09c5173eec2664ff61b38a66761a62104129cdee4e771de4e1d73a292082977e1c247a3a2b9d13872245c
-
Filesize
384B
MD5c949262e59029c6c1da9407e9d2ba473
SHA14e34b98b9d6b3730420eff38d2d7b2bf08f1838a
SHA2564bc0955c25432ada9f350f3746934f81519e3c8bdfc5432ca297f30e44b0348f
SHA512f9208ab3f7c18e11c433d7df8c92fc0d597e5af4d74a1bcc5c95ed47a3f8c3f56c8e1e76885231d705a10ead0a086c1d9d1d33c4b195c3e3becbab45eb0c15e7
-
Filesize
148B
MD5d509b622851c509adaa88a5e6dfb0e24
SHA11e674f172d253f1e70651ab934f94a84533ba3be
SHA256e83162cbbead45ff9fa871a76c8d10ddbafa230746ae23e0666d9693cec09b57
SHA512430ae775ec9549302f822bb59e002d350c1da09ca8e0ca52fdd5719be76f3764f3296477651e08d03278abd2a5a8bf9746290983fe8c929b8814a800b2cb4d4d
-
Filesize
70B
MD5df43f42739fa48dfee1072cbd43cce38
SHA14d4b57b61d13b23c5c7d0deba10144c398eda28b
SHA256baddf5451e44d85bf81e190d55c8e400d27bf1d7f04fff73ef9b8e32b513987e
SHA512586233d551f2d62cfd691e0c5baa7d7749a5c718a54d821f6fd97097399d892db2f0f81b185b838bfed0fc4792f6b65fccc8e2c4290bd808b22be48acbb322d5
-
Filesize
70B
MD5df43f42739fa48dfee1072cbd43cce38
SHA14d4b57b61d13b23c5c7d0deba10144c398eda28b
SHA256baddf5451e44d85bf81e190d55c8e400d27bf1d7f04fff73ef9b8e32b513987e
SHA512586233d551f2d62cfd691e0c5baa7d7749a5c718a54d821f6fd97097399d892db2f0f81b185b838bfed0fc4792f6b65fccc8e2c4290bd808b22be48acbb322d5
-
Filesize
67B
MD52377e68d0f1ca2a07c0664618c9768d5
SHA1d27e9704b6960d70f9a7aa85c178345201e4e9ef
SHA256655181fbaae52a419f0700e04e8e7c1e3ce0a3c63c6245c965b72b575aa2cfa5
SHA512fb59a3dd99e5b85b0662e95a3dfdaf0a1d293cc65c3fa56b778e85bba5aeb21b8f7ae544069c271c218c1fcc57044c20eb77e76cefd52e285135809fe35f418e
-
Filesize
67B
MD52377e68d0f1ca2a07c0664618c9768d5
SHA1d27e9704b6960d70f9a7aa85c178345201e4e9ef
SHA256655181fbaae52a419f0700e04e8e7c1e3ce0a3c63c6245c965b72b575aa2cfa5
SHA512fb59a3dd99e5b85b0662e95a3dfdaf0a1d293cc65c3fa56b778e85bba5aeb21b8f7ae544069c271c218c1fcc57044c20eb77e76cefd52e285135809fe35f418e
-
Filesize
158B
MD5de0caa208052c910098e7618f1378eb3
SHA1154b7b6be2906637985a73ad2f6d8a9e626e4b25
SHA256499b23e780391860c7e73bc993e4ba299c2f68d4ae9f1ac5a5a9f3214fb824f2
SHA51251a313f00bad9b1dd87c8aff6e9d6e0aac6672ee4856e403c1af0109043a78b0de5efc6cdb2257ba7b9e34dddabed6bfad48bd8ad5d7b6c8ad85b869bc1cbad5
-
Filesize
158B
MD5de0caa208052c910098e7618f1378eb3
SHA1154b7b6be2906637985a73ad2f6d8a9e626e4b25
SHA256499b23e780391860c7e73bc993e4ba299c2f68d4ae9f1ac5a5a9f3214fb824f2
SHA51251a313f00bad9b1dd87c8aff6e9d6e0aac6672ee4856e403c1af0109043a78b0de5efc6cdb2257ba7b9e34dddabed6bfad48bd8ad5d7b6c8ad85b869bc1cbad5
-
Filesize
144KB
MD5a592ea602dfb6f527a99d533b5892cc3
SHA1571a1c925fb6909c2038a86a432e7d8b855b1ec5
SHA2569a7420ebc335408202d09f3fb376d98d5b32bf0b7b49284d006c7dff905f8095
SHA5123b3abd628962fe2ae00a328a987cf3f57c4593378c64aec17c327d79054d39ff4cd5323757978228a529bba25a48a79fc5279bfe198543c039127d8bbb0284ef
-
Filesize
7KB
MD5d2acdb3162b194db693b4a9ae046464b
SHA1563671cc6037525db225968a978947b21a4cfbb7
SHA2565caa85afb931bc952de9efe8cb5cc0143cd72b2494ac45a564c9feee3fd27b4b
SHA512d1ffc7bf08f225ea11bfe11e41c09105b47020d338aec87ca63994cda57d176ee94b01358775c22d85cab83ff93d79f0697ba88b9cf535d7d092d002b179e954
-
Filesize
884B
MD5e24497455e5b38b4fee358cb2758630b
SHA1b0da6d5321ac363127446cb7d68f52e046001fa3
SHA256189faaae0946514a9e1788e580e96f59c8503b861bc612fcadc01a2510e75244
SHA51288e2a4194d7bbd90e6f30d2ae1a2082bbf0c7758abda78a7493942585ee0cd6614254419ef0d9882879b61138c2a93f5707b2e7dc8adfd774abad4a4c895884b
-
Filesize
280B
MD5311c3498e0fb15caa5a6bbc068950e0c
SHA168244345e8afa43818005467bf8b40c300276856
SHA2566b54a4d8883ff0acd9dfc4d686f64f18411d45cabe4902888a0289e54a81c35e
SHA512740471362f47cd0673714d383f777077f80ee0bef7ab79b23004bd113e26659efde24681d22b96ff4da1ec8974b6c7be1b5836612da90777ca5e091046dbd0bc
-
Filesize
280B
MD5075092031251c85b2880c33b14b9c402
SHA14f6cfdc3493b3bd1235240d1bf9aa376c5ccf020
SHA256a452373ca0bf687400c8c9b057bb70275c1ccd0fc2375d371073bc0b3d9e87e9
SHA512de9a51d012a29cf1ed6acd1976196deca032a4dd304c62fdc4173df1ea3ec037980423053f58e71672d4ead9df4cda5264701d9983ae486b5dd592c3011ed04b
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
162KB
MD5fdfdaf63d56b4a9cd6641d79f7159fdc
SHA118b413d8b6b9f3bec32026b7e9d9f4e5e366922f
SHA256f4dba3e15f08cf0686e6d89370ed42e8a5dafc38973501f0aa6baa9b93c720f3
SHA51206fd67f1a2d5f168c75b5b833d3222d6c0eccfadd4021173a7ec7f949971554d1c7df322b1dc512ef14941e76a9ff6445ba3bd16d940be5bc177be989ec39c2d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\Default\Network\SCT Auditing Pending Reports
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5d9423f7896a2e10c284d97f1cb72bfb7
SHA1fd4418c99c9ab2519d2753a428c11a388bfc7487
SHA25650724097c1bd67942a5446ec80d8f544d74ea0cb1bdc64c7deae7e5eddbaaa8c
SHA512169e95101edc25b27a08f4c72eb9051c8759d8acba26d50fcb80a852d5f6f3e71482a3184d97bdac04272737b8979d1514bb5e4ed7481f5a063e8c9e8db14527
-
Filesize
14KB
MD5821b30927730f3367fb7d5ade7d4ed5c
SHA1a210d977a890ff1771d37edda37c9702572fe15f
SHA2564c8095722c2d41cd5ac19b8c1d827a88b9e3cdf91f7dffeda9673226077616ea
SHA51281a778c29289cbbfbd1c3120adad49b15f964d602bc039f17faf7a70e99f881308fe9c63996f25dcb7d53d5dcb37a28661023f29b87c80b1b875bcb429350cce
-
Filesize
901B
MD56f3139b32a11c3eec92c34730c8abf2c
SHA193cb056417bb0279790fe22a3f807d9c95350cb6
SHA25684477f2ee23aec750b29d5451d7cccf893eda2d3e23128db47b968731d6df491
SHA512e9535d7944171bd4ab33cfd1d3be314b87d21aa9e857646a2f420e6b56cf90d5be1b16fac6d7888337ca60e4e5ccf4468f87c1599b351fec92906c5b12b56fc4
-
Filesize
35.6MB
MD56ec1333f4d3c361ed794b656ea431d56
SHA125766527e11df8336b7896a6cfcc234d94eed6c3
SHA2565d99deb48704a15ceb4b9b38428cbb665ca0689e07740084443dd760c495c2d2
SHA512e2cccac9bd610a5d9a7cd296969a5032586ec53da629c1fd1628fe0f1a551ee2c8d34bfa21b428bd66066f34c8b27618d60ad3d6c7342812aef812b7ef2f5d15
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\Maxon_App_2023.2.1_Win.exe.a5zoog7.partial
Filesize35.6MB
MD56ec1333f4d3c361ed794b656ea431d56
SHA125766527e11df8336b7896a6cfcc234d94eed6c3
SHA2565d99deb48704a15ceb4b9b38428cbb665ca0689e07740084443dd760c495c2d2
SHA512e2cccac9bd610a5d9a7cd296969a5032586ec53da629c1fd1628fe0f1a551ee2c8d34bfa21b428bd66066f34c8b27618d60ad3d6c7342812aef812b7ef2f5d15
-
Filesize
35.6MB
MD56ec1333f4d3c361ed794b656ea431d56
SHA125766527e11df8336b7896a6cfcc234d94eed6c3
SHA2565d99deb48704a15ceb4b9b38428cbb665ca0689e07740084443dd760c495c2d2
SHA512e2cccac9bd610a5d9a7cd296969a5032586ec53da629c1fd1628fe0f1a551ee2c8d34bfa21b428bd66066f34c8b27618d60ad3d6c7342812aef812b7ef2f5d15
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
536B
MD522adc3af2ee310e980557348b61b2b15
SHA1816e30d99a54b0d1578fdfb2f2d40eb61d1bb6ae
SHA256f49a3d57d07fb098caf54a95d045cec55c226fc0b7dc6e0ad179eb85e2b3d7ba
SHA5120f31cb278d7a06b1b597837c645dcc2064644e1d13dce6e1c3d299ae2be98c68162a894156d3bc26e1d27f69dc103722293faa631b8e50aab1b64b2625b2dce6
-
Filesize
2.7MB
MD519a687c7e63ed49b0f24f0958317c89b
SHA1a4619b73c480d11ca850d09309e97944ea1621f0
SHA2567f4486e0b16ad52b22875c58e226c5b322a033849f94ccd78e3adfe9d8bb177a
SHA512dd6637de02f887849c70d5e07e6a29269a45803d4647b5dc31728133d65f299b4ac3c69a95b42541f1695cf68ab2abae5f9b49c08c39dd23d8c41ff2c245d0a1
-
Filesize
2.7MB
MD519a687c7e63ed49b0f24f0958317c89b
SHA1a4619b73c480d11ca850d09309e97944ea1621f0
SHA2567f4486e0b16ad52b22875c58e226c5b322a033849f94ccd78e3adfe9d8bb177a
SHA512dd6637de02f887849c70d5e07e6a29269a45803d4647b5dc31728133d65f299b4ac3c69a95b42541f1695cf68ab2abae5f9b49c08c39dd23d8c41ff2c245d0a1
-
Filesize
2.7MB
MD519a687c7e63ed49b0f24f0958317c89b
SHA1a4619b73c480d11ca850d09309e97944ea1621f0
SHA2567f4486e0b16ad52b22875c58e226c5b322a033849f94ccd78e3adfe9d8bb177a
SHA512dd6637de02f887849c70d5e07e6a29269a45803d4647b5dc31728133d65f299b4ac3c69a95b42541f1695cf68ab2abae5f9b49c08c39dd23d8c41ff2c245d0a1
-
Filesize
7.6MB
MD5f1afbbe77c1f6e86801aad3350520e33
SHA1261dff7af8c45e5bff7cddcfac8b54d05b3eb5fd
SHA256e661b466e8b9865025838da41af4e298323d69f28715fb22ca09fc2baf10509d
SHA51210e65f0fc6cc754b43552ea557b8cf8bb70ae0798b16429601bdf260f84861af4c63b6b2140d96447dad2950041c7eba0e823ae6b6f0e8563ce2835e2e1acda3
-
Filesize
308KB
MD58fc74d09ce2e2364f0a8a266a235d690
SHA1724a524b115ff572f936c24ae47115837680bbf2
SHA25694661f746418ea598c6b9cc7d010dbb584d3335aaa39ded9da99346522952f27
SHA512fc1da3da1692f9f0e0909fff46072f1808302764ce3b0fb1237582627c731b70e1d49793c96ff718d9133a5a52d99e332f5180b48d83da10da1f5ff5db693b32
-
Filesize
5.1MB
MD54dcc519282704813ce67cd5e87d82b57
SHA1df43b7e5902ef426022e2358971dce72e9aacdff
SHA2560382dfbe4991e36b66ad8dd053fb835b0292634f0eacd57ce09f5502a304fc4e
SHA5122a0b16b2e2a6fa7155cd342689d0ab08da4ab0d5ed6e1e651e648f6349c5bcd9a51bbb830015809ad8d8a597e4252118ff7de0cdb516222978f4e3ec3822c796
-
Filesize
6.7MB
MD57a8894bd999f99550b96df54346a5945
SHA1e8c2f677a555e1b493f6f7cd0e7a7691019eb111
SHA256ec024b53e96bc6954c9c281b9a194603348854826742fe59c11fdaf0a8906a41
SHA512646fd875985d333fe0cf9c2bd810a6353adb3d5d98f74f5d4e9715ea4a3704b3b3fe77fc065d05a97cb17fe36c91538ee41742122e96eed69409e47688a578f6
-
Filesize
14.0MB
MD538ee56a06a2eed15262e9d75eb296bab
SHA1f8301114c160147492850e59be34226ef710c9b9
SHA2563529f4807fc69c72722816ec8f3a18c87159409b98dc03dae99109b5d85dcedd
SHA51224a19b0dbb8a23c5007a750f6a9ee15743d868e18f5b3af5b2a66e8f114d4e50c299b0d0085f4ceb820e7476f57169a4117c336f48237b8963d7047e6aa44bb1
-
Filesize
354B
MD5aa970e2079f374162709a34354c29640
SHA13f80aeeba5cbecca78731586cdf326d86de150b7
SHA256f9cc262d930b5188d8a8cbf3eda30c38c818dd5cf5955befa59dbb77283809d2
SHA5128b96512c603ee46d083f6477e4cbf3202d226b1b4adcf90968cc278b0d4b15a516a19aa545fcd88a2e65bc0b184748a913a2b6ec58d457702f6d1fe2b979ee39
-
Filesize
410KB
MD56fd1cd7a05468a8de5518ae03ddbaf24
SHA1b23db33f51281c601a2948e3e1a6d4e3d8ab5f4d
SHA2564aa778884fd7d83489fdb3f438efc73792e1c2103fee5f7d1d5f5891c9a518c3
SHA512fbe02f097202b2f90b5d76604f60a2d6333283d9dca2bbb157868c279249d951c72e6bf08eea5480037df7e632ae583ad4fed26ea8210665283c16751866e728
-
Filesize
316KB
MD5041726b9a920f7e9bb4674c27f2c2379
SHA17205a9bebdfd4d5a264772059a96df473f3b23be
SHA25689c280e974a794ac43122d6dbf6b07c02c870926c837b33fd8e88d2563701b28
SHA512cf7fb9268d31ae4fa69eb75e3605c29b28421b3e733d4be40dc9e453b8ad87f5b9a68758d804074d17836475d26dfb45b61dbbf1479aaf741920994352034437
-
Filesize
1.6MB
MD51d9d6d7ecea6ff2bc4dba7adfde6bb83
SHA1e40109e0673dbdb3623341778977459962844b65
SHA25693137985b9aaf0a2c4f0f4836c7f7977ff1ca44238c0ecfdcffa5fc351cc090d
SHA512b3749f8db671e1d7332bba508810ccfaa8c082a920ae0a86bce4c1e462436e68e33101a202e15f425ecc6227979268a3a784f57996daf961bdae83c619dc0813
-
C:\Users\Admin\AppData\Local\Temp\tmp0c273d42-6433-4fd4-8511-5be979de922c\bin\MicrosoftEdgeWebview2Setup.exe
Filesize1.7MB
MD56abf61dd5a6318d76a11ce43b4bee001
SHA1546fac452bb8892bed42b79b17dc0c86ca5ae7dc
SHA256389601cbd7e9256ce22348e3ceb2c33e39ddc7a8c75db897d269dc23b17ad11d
SHA512e454b2bb8ee2bf1355613afdf8389076fae5ffb8305ca2748cb05b597b54f039647e9aced03946dd6c0057305de80ca69db09cb2e539c6645fb2da6abf12ea7b
-
Filesize
68B
MD59e307d7ca44484c85fecf3d1cf7b1a59
SHA1590497a3a89c0cbfa9d9db7429a2c4712aaa078f
SHA256d5b69e95318804f103ebcdd26a77e27224decf02962c0f5d8e83fe615b1dd228
SHA512f3e8bb2adbeeb84e699f70dfddd72e86ca0f05827b9f788478c5143d616d1382725e404720213bd056afe5851907553c0e5f1eac10737301b6f73ef7a5f4973d
-
Filesize
11.1MB
MD548457f3365756c10be53525ca7e6485f
SHA16e20b299d2b2ef38aef09584b22b25e2346bb09f
SHA25610a05d6101bd710ba083bf35f98b5de2672b599f5903e425a0eae7c0203a7e77
SHA5120f376908f5f4c36ca68d822c3f5a10563b3636e8a357c5ee98704bbe27a32b5d90d2e91f99edbe5865c4b196fd7778fc00611be389409277617b40712b3c17d6
-
C:\Users\Admin\AppData\Local\Temp\tmp8e88ec35-a96c-4e31-8b2f-f312160ae8c0\app\rga-uninstaller-helper.exe
Filesize698KB
MD564948479a93f19fb333fea6b4a540b1b
SHA1b802ad5dfc4154241420c658a1231da0d167f55b
SHA2562b92f728b546e593daed89e34d3945fc717361adce48c82124de5abae0a7e9dc
SHA5123c4214c1002ec3323d01762755889aa95791ca31614d0743c6efb69d2c4f92c4a76868563fc8af16682c4ca35b1343310d98a7d067737cb113e47fdfd4e3e4df
-
Filesize
1.7MB
MD50cc2c817912c5d4e312366c9ac206fbb
SHA1abddb55ba7ff181f52c2309b760da306922074b3
SHA256235d827de6cb5955c0aa533daaf2ff404280dfd9b70f817f5a3b26363cf00bee
SHA5126bd7e2d8b3754a0ab3847c16d313f262891719b89faefab3d62d1affafda7044a0fdd435701c53d228a4508da41eecf7b7c79b7380a2a04aa92cffff2513b044
-
C:\Users\Admin\AppData\Local\Temp\tmp8e88ec35-a96c-4e31-8b2f-f312160ae8c0\app\uninstall-appmanager.bat
Filesize1KB
MD5fbf11c65bd839cf80fc0d2fd9b2ae19c
SHA1820c5cde78199b53c85758a1de1f42e92dbb853e
SHA25627dc1a433c3457ea2920f340de7662b7ea0f1fa066b0d63377d7d5fa919ceb98
SHA5122d631555d01b7104539a7dd4c50fdcc9d3955fb2f57ae848e639050f990406a7148922c5129160d2d0c18e885c6e392437b845b6398b816afea51ebc7fbdd01a
-
Filesize
1.1MB
MD5de1389a03015f6e2285e65a4253000fe
SHA1728f5d47219f88154ad96d88327103ae5aab4ee4
SHA2566d9220aaf7c51597f76cb52a72fb77e7952006a1969b20606270322ddc31e8fb
SHA5123ea1935e795e201576fea1e6552aabfbe321dc30cd61d043256b042ac95ff16f4b4ed1f4fc23e00a1f6317229cc9a7c894ae1de116b6887f8c222c47163eb72c
-
C:\Users\Admin\AppData\Local\Temp\tmp9339157e-d2a3-4a99-8c7d-d93c59b2b9ab\postflight\mxnotify-windows-postflight.bat
Filesize106B
MD5d2926859650503d8e62b0db8e6a2c18b
SHA1373fd2b988df44b574693e8781cdc1213360633c
SHA256aa8c150f29af2200de9ce0336c55bc5c76a64f5434d7f8da26c0cecebc573798
SHA51252040403587f9a0c7f2d5fb6f3de86f649276ad8f42a63eba45b87d58f69a2551191f2a8720d6364bf108638d5650400f782088ebeb2c0b665ebdf510761009e
-
C:\Users\Admin\AppData\Local\Temp\tmpa2523161-b367-402a-ad6a-6418d06dfa77\files\VC_redist.x64.19.exe
Filesize14.3MB
MD5264c296cc0bf00db6ba8e7bf8cc4e706
SHA1837a49f9eaacda7c077a8bbea149a52d766b81c0
SHA2567d7105c52fcd6766beee1ae162aa81e278686122c1e44890712326634d0b055e
SHA5129f197af069535896f866d2853689c8e0243fe5c89feeaf6a027315f31bb0086bb0a6234e77a4427481fb2dbe32c3c0d748f9de82ee439086745658a825bed5e9
-
C:\Users\Admin\AppData\Local\Temp\tmpa2523161-b367-402a-ad6a-6418d06dfa77\files\VC_redist.x64.19.exe
Filesize14.3MB
MD5264c296cc0bf00db6ba8e7bf8cc4e706
SHA1837a49f9eaacda7c077a8bbea149a52d766b81c0
SHA2567d7105c52fcd6766beee1ae162aa81e278686122c1e44890712326634d0b055e
SHA5129f197af069535896f866d2853689c8e0243fe5c89feeaf6a027315f31bb0086bb0a6234e77a4427481fb2dbe32c3c0d748f9de82ee439086745658a825bed5e9
-
C:\Users\Admin\AppData\Local\Temp\tmpa2523161-b367-402a-ad6a-6418d06dfa77\files\VC_redist.x64.19.exe
Filesize14.3MB
MD5264c296cc0bf00db6ba8e7bf8cc4e706
SHA1837a49f9eaacda7c077a8bbea149a52d766b81c0
SHA2567d7105c52fcd6766beee1ae162aa81e278686122c1e44890712326634d0b055e
SHA5129f197af069535896f866d2853689c8e0243fe5c89feeaf6a027315f31bb0086bb0a6234e77a4427481fb2dbe32c3c0d748f9de82ee439086745658a825bed5e9
-
C:\Users\Admin\AppData\Local\Temp\tmpa2523161-b367-402a-ad6a-6418d06dfa77\postflight\vcredist-postflight.bat
Filesize342B
MD52896b5c307eb33c9e30f25704f1e805f
SHA14678cf9958a7314206e54e5d055ad7a4f65400a0
SHA2564e1329927ec28e08fcbe6af712705c571ef2ad72435d994b55be6c494f96fe45
SHA5121f1600c5721b77ff675c9f95b7bdf6fa83984af31459ffb35d69b0529df4012584b84c4e02505151bef3f84e484b3fd04be23a712e7d1f8dfdf9e4508b016db1
-
C:\Users\Admin\AppData\Local\Temp\tmpcc7b5614-81d3-461e-953d-e144c1e090fb\postflight\mxredirect-windows-postflight.bat
Filesize630B
MD57f4b4e211a4df311c4c353dc9c34d038
SHA15c46b580f5b37be9effcd76e9f4fa29a56f6dc1d
SHA256c276acfec8e0181a2ae35dff29c1b051091fba70e9aa1d076cc0a4429fc20a5a
SHA512a78600025a16e6a69b6b2861061fd2721fb68019dc5dcb7d8850fe4c6f0cfe353fe5d968fbb205cf6fad8ab9a0ab795f4170585ba01cffefe0d4cff01a80cc42
-
C:\Users\Admin\AppData\Local\Temp\tmpcc7b5614-81d3-461e-953d-e144c1e090fb\resources\mxredirect.log.config
Filesize616B
MD5373cd25ef8b1b01a13121d92855680d8
SHA14d94d4ce9f09ac5ce5e15ef95d067b6508aa70e0
SHA25661cd3d1b458f7d7012504bfb237a969b9cc08ec03bfcae801aa4ff9b8a806f78
SHA5122d5dfb93feceef016d670b94e06a7510df727091fbbe8416cc2551a66a2ed8f5eab80a270465d64003e930376965eb8224102373c97bf5971761db35ebe607c4
-
Filesize
699KB
MD549e57a207e5702814e1148f7ea0afdbb
SHA11a88f27c3e2dcade29ee12b90e300aeabdd8b38c
SHA256352630f109f53076b2b5661bd401577f1bfd44f749acc94871e16955294b4d3b
SHA5124480f965542f07fcac1709c4a728dcfdbf5b20741f744856cd89dfe03598e05c56ee5bf2e6aff18ee9a51f9849d57b054129786b5205dfb2cb3bf1d8bd66d4eb
-
Filesize
698KB
MD553ce1e29790e9d23effbd9201b31515d
SHA1b4f1f490f33fcfd0ab4c5d92afe00937743742e1
SHA256e4712926dcfca5be6ccfc8f65c62332ae3bbc75e96b64aee8b05fc1a211fa65e
SHA5127c1f4b6a295d54c2af601da1c856db7032c3e79b0ef8a16624c9ee26d485c5dbae902294b733eb1dda572a9e72a8704baefde05282d40f874665893ebbd2aa34
-
Filesize
8.6MB
MD567320bcddfa96f0b8f93027f86f393dc
SHA138b62aca92c6b0fce963251271d5c66656f3e9fb
SHA2561da765d7e1ef0f5837c3b7facee64320211d44ab964d16ea5f7d161e7ae685ce
SHA512a91cf6a1752148f3a0108a2c02c78af422e8aea875508ec70713badb82877749af07210deee670ccdea874dae95955e609b0799441b9c82330f53857d8c59653
-
C:\Users\Admin\AppData\Local\Temp\tmpfbe421a4-8e19-4df4-8194-bda17b58789d\app\uninstall-maxon-service.bat
Filesize1KB
MD50458eaf2fc13c745121436de121e743b
SHA19787955d5f8a3f923ac621492bcac9ca178fc3d1
SHA2563b0933f37b5d665b3d386bf661813b9efa6f018dfebdd9203c10c13f4c68535b
SHA512441e57898fe9cb7ca9488f1f34e2c2bfd0033867cce3a666389e0ae4866cef24644cb2f7b03676b89405ee8ea6d502d5d2c51265bc153867fc222766d8ca2134
-
C:\Users\Admin\AppData\Local\Temp\tmpfbe421a4-8e19-4df4-8194-bda17b58789d\documentation\acknowledgements.txt
Filesize56KB
MD59ab666120c65ad27426995b1af297a48
SHA15995af88672c1994efbe59f545d2aad6252df1bd
SHA256eb1d0f2daa1f8e4a8f0f3c9c6fd281878e16ccf4f9d5c2bb00626281e40dc205
SHA512085245871e99906630b5044044cf92b1e643eba6aba57fe3a5e64b0b156389701e95efe5e39c0e566064381a72b8b8f42d52b8c37ba9b17f7b733e4a76662b01
-
Filesize
259KB
MD5a71e41ad46a251d27df41b0cdae0e0da
SHA104e16855c997e25acab07092487590fb44176750
SHA25673fa89177adee0ad06ed89646f659914b702d4894b34ea198571f8e1ab55ec1d
SHA5128cec5a0ef770c9bed13abec23bea5804ae21bc6c7fe5974719e6f1cc96c1a6fd62b9e1c46eeda2e8c49dea6743fffc5651587f25b32cca14d2e712feec43eb35
-
C:\Users\Admin\AppData\Local\Temp\tmpfbe421a4-8e19-4df4-8194-bda17b58789d\postflight\fuse-windows-postflight.bat
Filesize819B
MD57c3cf64ccf4db3ac83e16a23e4eb3b10
SHA10ce03bb05771c8866fa32261f4e48446a4bdb33f
SHA256bbb6448d5cef00e6a6a5317a5abf3fd9cae9bb6751908900baf06445bc42bd5b
SHA512fec5a6001c60f8711f9c41fd6cc5dac5aba5cfc9f34d682bb43651dc5598991c51462d5c48ac900a24e12721855659ba343c2a0f1078c39470a0ed31ba8c186d
-
C:\Users\Admin\AppData\Local\Temp\tmpfbe421a4-8e19-4df4-8194-bda17b58789d\preflight\fuse-windows-setup-preflight.bat
Filesize115B
MD55c78f14f9915a2ce2c0cd7ec5010d1ae
SHA1e999de38e67515c9cd41cfdb54e216c4efc415ca
SHA256c7bc0bd1d332f9018a35d95b361d3e13253aa53e3c167672c0039a4d8ce5216c
SHA51204ee4d2d1e815b1fe6f8e245e77b8d7e76c9d96e18a584550b198ac50f7e361369f6b0f43d661b51dd9b8618e9e3454664a53ccef2a6c01591063332de07c5e6
-
C:\Users\Admin\AppData\Local\Temp\tmpfbe421a4-8e19-4df4-8194-bda17b58789d\resources\all-products-manifest.json
Filesize24KB
MD5f1ec9c2f98d6cafb6f2aa713cc5eb3f3
SHA1f984e7d1eb09a63158871ebbe4fc336fe4be375c
SHA256e43a6dd7d4c71260970bd03d54be127b1315780a8a16639ca1c5b76db6d458f7
SHA51226f88b8142c8104bbe5a0db93d6537653175243d656b9bb24e9e7a32b01b6fc8713210234c347b1772c6d0e2d5ce0a4e1eef887b4be902db271c27a4291c72ff
-
Filesize
601B
MD5e52f73d520c7751bbe46ef28ffbbf05c
SHA143f676a2e44178f0fcd618f09cbcef2071ed686e
SHA25679fed1056f270b628c3ae02f569cfae28dc4e4fcef847b81435e8278a912cc71
SHA5123baf34faca6814a4cc80673917660ea52ff34603d2bba0550d4bc62881e765ebbcc1969e599c1601b18f27eefdbbb37bef497e91548b6ecbfdd37ff34fc4ca0f
-
Filesize
597KB
MD5b3f68dab57686c0f84229717a46c8b83
SHA1b224a00b9437527cdba16e6e25de2f3b00088781
SHA256e013189b9115045d5880f0e9fa7b84acb4c4346cd80c7f884e3912eb8856a6c8
SHA512f56d22118b11661fc98f05c8bcac9d4721e35904189fa548091f39c8bf82189265d082553666bb7e4c6882173331432b7afd5d012ef3a1db482049b6a80dc024
-
Filesize
1.3MB
MD5b757c47e57f3b014fb9410ea517b5027
SHA13ef60d53d9fa9f189fc7880c2b5174dd339eb552
SHA25619dd3b10c48b2a5e0f4cc25c37accbe5561e75c51ce9bf6cd5f622d0a0e9ee24
SHA512048b9631c126ac3891bb6d0bd6f0f1ce8caa9c4c880b0a66a026dffb37b9dd772795e478f4798b883e554a533984d6383b9bb458b12322e0cd706bb12e7a47b8
-
Filesize
632KB
MD5562711caf0d942d286fd28d34ebf9fdf
SHA1001b037c732b497e390bd756901e64ce0d84d885
SHA2563556010aa72b67d16dc6b406aecf493185c92f38ad410924959175fd39192b61
SHA512447ea79c0fe30b5458d139d903bf738126c8159250a5b732ca9afdb7536be3ef5c81857852034fbdf385d9bbc43e1c77dc9618f7ad0b60ff3d9c526711c30060
-
Filesize
632KB
MD5562711caf0d942d286fd28d34ebf9fdf
SHA1001b037c732b497e390bd756901e64ce0d84d885
SHA2563556010aa72b67d16dc6b406aecf493185c92f38ad410924959175fd39192b61
SHA512447ea79c0fe30b5458d139d903bf738126c8159250a5b732ca9afdb7536be3ef5c81857852034fbdf385d9bbc43e1c77dc9618f7ad0b60ff3d9c526711c30060
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2