Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 21:46
Static task
static1
General
-
Target
MSPCManagerSetup.exe
-
Size
3.9MB
-
MD5
0b218125c9a370e64c20ed3c469a9bd6
-
SHA1
5d165c039e71df8ba83aeb4f40c7dd652f4d6d7e
-
SHA256
211fbe8f94b555ad524fe352485a8e143c5b351d9589916285cd05f1f106dbda
-
SHA512
13006d8ffa93812cc466a75e7952319a191691ba3216eb894c2c630964e8848277df2cb76133eeee926c6eb2a5b226ded28f0a53b49bd3bc02127fbe5881f404
-
SSDEEP
98304:eC4JOySugi+4CMG/y3qT2huprsQr02vNyL3s0xKi:AJONugvPKhTO0AoL3Ai
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation MSPCManagerSetup.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation MSPCManager.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Executes dropped EXE 22 IoCs
pid Process 4548 MicrosoftEdgeWebview2Setup.exe 416 MSPCManagerService.exe 2728 MicrosoftEdgeUpdate.exe 1036 MicrosoftEdgeUpdate.exe 2860 MicrosoftEdgeUpdate.exe 3076 MicrosoftEdgeUpdateComRegisterShell64.exe 4328 MicrosoftEdgeUpdateComRegisterShell64.exe 5016 MicrosoftEdgeUpdateComRegisterShell64.exe 924 MicrosoftEdgeUpdate.exe 64 MicrosoftEdgeUpdate.exe 1032 MicrosoftEdgeUpdate.exe 3456 MicrosoftEdgeUpdate.exe 1796 MicrosoftEdge_X64_115.0.1901.183.exe 4832 setup.exe 348 MicrosoftEdgeUpdate.exe 4628 MSPCManager.exe 4680 msedgewebview2.exe 1900 msedgewebview2.exe 4672 msedgewebview2.exe 3324 msedgewebview2.exe 4544 msedgewebview2.exe 4996 msedgewebview2.exe -
Loads dropped DLL 64 IoCs
pid Process 2252 MSPCManagerSetup.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 2728 MicrosoftEdgeUpdate.exe 1036 MicrosoftEdgeUpdate.exe 2860 MicrosoftEdgeUpdate.exe 3076 MicrosoftEdgeUpdateComRegisterShell64.exe 2860 MicrosoftEdgeUpdate.exe 4328 MicrosoftEdgeUpdateComRegisterShell64.exe 2860 MicrosoftEdgeUpdate.exe 5016 MicrosoftEdgeUpdateComRegisterShell64.exe 2860 MicrosoftEdgeUpdate.exe 924 MicrosoftEdgeUpdate.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 64 MicrosoftEdgeUpdate.exe 1032 MicrosoftEdgeUpdate.exe 1032 MicrosoftEdgeUpdate.exe 64 MicrosoftEdgeUpdate.exe 416 MSPCManagerService.exe 3456 MicrosoftEdgeUpdate.exe 348 MicrosoftEdgeUpdate.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 37 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\CLSID\{32696747-d167-38ad-6e20-2fec78940514}\LocalServer32\ = "\"C:\\Program Files\\Microsoft PC Manager\\MSPCManager.exe\" -ToastActivated" MSPCManager.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{32696747-d167-38ad-6e20-2fec78940514}\LocalServer32\ = "\"C:\\Program Files\\Microsoft PC Manager\\MSPCManager.exe\" -ToastActivated" MSPCManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{32696747-d167-38ad-6e20-2fec78940514}\LocalServer32 MSPCManager.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\CLSID\{32696747-d167-38ad-6e20-2fec78940514}\LocalServer32 MSPCManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsMasterUI = "C:\\Program Files\\Microsoft PC Manager\\MSPCManager.exe --Activate=False" MSPCManagerSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSPCManager.exe -
Checks system information in the registry 2 TTPs 12 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B363E346B43755F918E68AC3AA10D686_40F19A7F440C5043767F6E385F7505DA MSPCManagerService.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B363E346B43755F918E68AC3AA10D686_40F19A7F440C5043767F6E385F7505DA MSPCManagerService.exe File created C:\Windows\system32\StartupInfo.xml MSPCManagerService.exe File opened for modification C:\Windows\system32\StartupInfo.xml MSPCManagerService.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\790cd04324afe5724e22a34bb12aed8f346984ffc3da8bdf66a3ffe250c3a688\jc5cjcuy.xtq MSPCManagerService.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\790cd04324afe5724e22a34bb12aed8f346984ffc3da8bdf66a3ffe250c3a688\ha211mwh.gj0 MSPCManagerService.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE MSPCManagerService.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE MSPCManagerService.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\identity_proxy\win11\identity_helper.Sparse.Dev.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Notifications\SoftLandingAssetDark.gif setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\Locales\it.pak setup.exe File created C:\Program Files\Microsoft PC Manager\Microsoft.AI.PerfCounterCollector.dll MSPCManagerSetup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUEE29.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUEE29.tmp\msedgeupdateres_es.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUEE29.tmp\msedgeupdateres_sl.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Trust Protection Lists\Mu\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\ko.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\libsmartscreenn.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\ar.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\ru.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\msedge_wer.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\VisualElements\SmallLogoCanary.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\et.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\te.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\Locales\gu.pak setup.exe File created C:\Program Files\Microsoft PC Manager\api-ms-win-crt-stdio-l1-1-0.dll MSPCManagerSetup.exe File created C:\Program Files\Microsoft PC Manager\Microsoft.Extensions.Logging.dll MSPCManagerSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\fi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Trust Protection Lists\Mu\TransparentAdvertisers setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\msedge_wer.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\sr.pak setup.exe File created C:\Program Files\Microsoft PC Manager\System.Memory.dll MSPCManagerSetup.exe File created C:\Program Files\Microsoft PC Manager\System.Text.Json.dll MSPCManagerSetup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUEE29.tmp\msedgeupdateres_lv.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\identity_proxy\win11\identity_helper.Sparse.Canary.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\BHO\ie_to_edge_bho_64.dll setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUEE29.tmp\msedgeupdateres_nn.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUEE29.tmp\msedgeupdateres_sq.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\MEIPreload\preloaded_data.pb setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\nn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\Locales\pt-PT.pak setup.exe File created C:\Program Files\Microsoft PC Manager\Microsoft.WIC.PCManager.Common.dll MSPCManagerSetup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUEE29.tmp\msedgeupdateres_ga.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source4832_719382990\MSEDGE.7z setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\am.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\PdfPreview\PdfPreviewHandler.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\learning_tools.dll setup.exe File created C:\Program Files\Microsoft PC Manager\Microsoft.Extensions.Caching.Memory.dll MSPCManagerSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\ja.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Locales\lb.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\mojo_core.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\SetupMetrics\f22e94b9-6199-48b0-9f4c-cf33be0ee9c0.tmp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Installer\setup.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\notification_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\BHO\ie_to_edge_stub.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\identity_proxy\win11\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\msvcp140_codecvt_ids.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\Locales\cy.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\Locales\ja.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\pwahelper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\oneauth.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\Trust Protection Lists\Mu\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\VisualElements\SmallLogo.png setup.exe File created C:\Program Files\Microsoft PC Manager\MpClientInterop.dll MSPCManagerSetup.exe File created C:\Program Files\Microsoft PC Manager\System.Diagnostics.DiagnosticSource.dll MSPCManagerSetup.exe File created C:\Program Files\Microsoft PC Manager\System.Security.Principal.Windows.dll MSPCManagerSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.183\libGLESv2.dll setup.exe File created C:\Program Files\Microsoft PC Manager\Microsoft.Extensions.Logging.Abstractions.dll MSPCManagerSetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSPCManager.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSPCManagerService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSPCManagerService.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSPCManager.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MSPCManagerService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32\ = "{5F64EF81-5A6B-4203-9374-16218714CDFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.161.35\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc\ = "Microsoft Edge Update Update3Web" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\AppUserModelId\{6D809377-6AF0-444B-8957-A3773F02200E}/Microsoft PC Manager/MSPCManager.exe\IconBackgroundColor = "FFDDDDDD" MSPCManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods\ = "13" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{99698D87-EF73-418E-B486-267173F3144B} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\CLSID\{32696747-d167-38ad-6e20-2fec78940514} MSPCManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine.1.0\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ = "IAppCommandWeb" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{99698D87-EF73-418E-B486-267173F3144B}\InprocHandler32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5F64EF81-5A6B-4203-9374-16218714CDFF}\ = "PSFactoryBuffer" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32\ = "{5F64EF81-5A6B-4203-9374-16218714CDFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{5F64EF81-5A6B-4203-9374-16218714CDFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ = "Microsoft Edge Update Update3Web" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{5F64EF81-5A6B-4203-9374-16218714CDFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\ProgID MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ = "IApp" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{5F64EF81-5A6B-4203-9374-16218714CDFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass.1\CLSID\ = "{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{5F64EF81-5A6B-4203-9374-16218714CDFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{5F64EF81-5A6B-4203-9374-16218714CDFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\Elevation MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 2728 MicrosoftEdgeUpdate.exe 2728 MicrosoftEdgeUpdate.exe 416 MSPCManagerService.exe 2252 MSPCManagerSetup.exe 2252 MSPCManagerSetup.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 416 MSPCManagerService.exe 2728 MicrosoftEdgeUpdate.exe 2728 MicrosoftEdgeUpdate.exe 2728 MicrosoftEdgeUpdate.exe 2728 MicrosoftEdgeUpdate.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe 4628 MSPCManager.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 4680 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 416 MSPCManagerService.exe Token: SeDebugPrivilege 2728 MicrosoftEdgeUpdate.exe Token: SeSecurityPrivilege 416 MSPCManagerService.exe Token: SeDebugPrivilege 2728 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4628 MSPCManager.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4628 MSPCManager.exe 4680 msedgewebview2.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4628 MSPCManager.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2252 wrote to memory of 4548 2252 MSPCManagerSetup.exe 98 PID 2252 wrote to memory of 4548 2252 MSPCManagerSetup.exe 98 PID 2252 wrote to memory of 4548 2252 MSPCManagerSetup.exe 98 PID 4548 wrote to memory of 2728 4548 MicrosoftEdgeWebview2Setup.exe 105 PID 4548 wrote to memory of 2728 4548 MicrosoftEdgeWebview2Setup.exe 105 PID 4548 wrote to memory of 2728 4548 MicrosoftEdgeWebview2Setup.exe 105 PID 2728 wrote to memory of 1036 2728 MicrosoftEdgeUpdate.exe 106 PID 2728 wrote to memory of 1036 2728 MicrosoftEdgeUpdate.exe 106 PID 2728 wrote to memory of 1036 2728 MicrosoftEdgeUpdate.exe 106 PID 2728 wrote to memory of 2860 2728 MicrosoftEdgeUpdate.exe 107 PID 2728 wrote to memory of 2860 2728 MicrosoftEdgeUpdate.exe 107 PID 2728 wrote to memory of 2860 2728 MicrosoftEdgeUpdate.exe 107 PID 2860 wrote to memory of 3076 2860 MicrosoftEdgeUpdate.exe 108 PID 2860 wrote to memory of 3076 2860 MicrosoftEdgeUpdate.exe 108 PID 2860 wrote to memory of 4328 2860 MicrosoftEdgeUpdate.exe 109 PID 2860 wrote to memory of 4328 2860 MicrosoftEdgeUpdate.exe 109 PID 2860 wrote to memory of 5016 2860 MicrosoftEdgeUpdate.exe 110 PID 2860 wrote to memory of 5016 2860 MicrosoftEdgeUpdate.exe 110 PID 2728 wrote to memory of 924 2728 MicrosoftEdgeUpdate.exe 111 PID 2728 wrote to memory of 924 2728 MicrosoftEdgeUpdate.exe 111 PID 2728 wrote to memory of 924 2728 MicrosoftEdgeUpdate.exe 111 PID 2728 wrote to memory of 64 2728 MicrosoftEdgeUpdate.exe 112 PID 2728 wrote to memory of 64 2728 MicrosoftEdgeUpdate.exe 112 PID 2728 wrote to memory of 64 2728 MicrosoftEdgeUpdate.exe 112 PID 1032 wrote to memory of 3456 1032 MicrosoftEdgeUpdate.exe 114 PID 1032 wrote to memory of 3456 1032 MicrosoftEdgeUpdate.exe 114 PID 1032 wrote to memory of 3456 1032 MicrosoftEdgeUpdate.exe 114 PID 1032 wrote to memory of 1796 1032 MicrosoftEdgeUpdate.exe 119 PID 1032 wrote to memory of 1796 1032 MicrosoftEdgeUpdate.exe 119 PID 1796 wrote to memory of 4832 1796 MicrosoftEdge_X64_115.0.1901.183.exe 120 PID 1796 wrote to memory of 4832 1796 MicrosoftEdge_X64_115.0.1901.183.exe 120 PID 1032 wrote to memory of 348 1032 MicrosoftEdgeUpdate.exe 121 PID 1032 wrote to memory of 348 1032 MicrosoftEdgeUpdate.exe 121 PID 1032 wrote to memory of 348 1032 MicrosoftEdgeUpdate.exe 121 PID 4628 wrote to memory of 4680 4628 MSPCManager.exe 127 PID 4628 wrote to memory of 4680 4628 MSPCManager.exe 127 PID 4680 wrote to memory of 1900 4680 msedgewebview2.exe 128 PID 4680 wrote to memory of 1900 4680 msedgewebview2.exe 128 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 PID 4680 wrote to memory of 4672 4680 msedgewebview2.exe 129 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MSPCManagerSetup.exe"C:\Users\Admin\AppData\Local\Temp\MSPCManagerSetup.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeC:\Users\Admin\AppData\Local\Temp\\MicrosoftEdgeWebview2Setup.exe /silent /install2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Program Files (x86)\Microsoft\Temp\EUEE29.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUEE29.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Sets file execution options in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1036
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.161.35\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.161.35\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3076
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.161.35\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.161.35\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4328
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.161.35\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.161.35\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5016
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNjEuMzUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNjEuMzUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RUNCRUI3MjUtMDNCRi00RURBLUE0NDQtNUY2Mjg0M0I0RjFFfSIgdXNlcmlkPSJ7RjVDMDg5Q0QtMzJERC00MjA4LTkyRTYtQjdDRDI4OTA2ODM2fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5NTcwQzhEQy01OERDLTRCMzItQjIxMC1GMEM1RjRGODc0QkZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtxV0pTeld3UGZkY0xSK1hHSXY2eHJaZmlZT3hoUFUyczFOV21qV2NhRlBnPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTc1LjI5IiBuZXh0dmVyc2lvbj0iMS4zLjE2MS4zNSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSIxOTM3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:924
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{ECBEB725-03BF-4EDA-A444-5F62843B4F1E}" /silent4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:64
-
-
-
-
C:\Program Files\Microsoft PC Manager\MSPCManagerService.exe"C:\Program Files\Microsoft PC Manager\MSPCManagerService.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:416
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNjEuMzUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNjEuMzUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RUNCRUI3MjUtMDNCRi00RURBLUE0NDQtNUY2Mjg0M0I0RjFFfSIgdXNlcmlkPSJ7RjVDMDg5Q0QtMzJERC00MjA4LTkyRTYtQjdDRDI4OTA2ODM2fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins1QTZCNzcwQy0wNzlCLTQzM0QtOTVCMi0wOUZDNzIxOTBFNEN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMDYuMC41MjQ5LjExOSIgbmV4dHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iNSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:3456
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{270F8869-E049-4A72-BF4F-5C26342BE9AE}\MicrosoftEdge_X64_115.0.1901.183.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{270F8869-E049-4A72-BF4F-5C26342BE9AE}\MicrosoftEdge_X64_115.0.1901.183.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{270F8869-E049-4A72-BF4F-5C26342BE9AE}\EDGEMITMP_D7749.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{270F8869-E049-4A72-BF4F-5C26342BE9AE}\EDGEMITMP_D7749.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{270F8869-E049-4A72-BF4F-5C26342BE9AE}\MicrosoftEdge_X64_115.0.1901.183.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:4832
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNjEuMzUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNjEuMzUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RUNCRUI3MjUtMDNCRi00RURBLUE0NDQtNUY2Mjg0M0I0RjFFfSIgdXNlcmlkPSJ7RjVDMDg5Q0QtMzJERC00MjA4LTkyRTYtQjdDRDI4OTA2ODM2fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntDQzRCNDg0Ni03REEzLTQ2NzktOEJDRi0yQTNFMUQwQkUxRUR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMTUuMC4xOTAxLjE4MyIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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_UDE9MTY5MDU4MDg0NCZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1WYyUyZnBnem5oUFZOT1MzWTMxeGhJSTNmbEwzWUcwJTJiVnllbFcxd1pvcndyakVNcXBWMHhJZDNyaGE2TFY4YVd3QjNqeHptWjZ1NHh2ZUJrWkJvbFBnU1ElM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIxNTA3NzcyODgiIHRvdGFsPSIxNTA3NzcyODgiIGRvd25sb2FkX3RpbWVfbXM9IjkyNTAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iNiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5NjYwOSIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjgyOCIgZG93bmxvYWRfdGltZV9tcz0iMTg2NzIiIGRvd25sb2FkZWQ9IjE1MDc3NzI4OCIgdG90YWw9IjE1MDc3NzI4OCIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iMzI2MDQiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:348
-
-
C:\Program Files\Microsoft PC Manager\MSPCManager.exe"C:\Program Files\Microsoft PC Manager\MSPCManager.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Checks whether UAC is enabled
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=MSPCManager.exe --webview-exe-version=1.2.4.22027 --user-data-dir="C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --enable-features=MojoIpcz,msSingleSignOnOSForPrimaryAccountIsShared --mojo-named-platform-channel-pipe=4628.684.121921841804753168762⤵
- Checks computer location settings
- Executes dropped EXE
- Checks system information in the registry
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4680 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=115.0.5790.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=115.0.1901.183 --initial-client-data=0x18c,0x190,0x194,0x168,0x1dc,0x7ff929acd310,0x7ff929acd320,0x7ff929acd3303⤵
- Executes dropped EXE
PID:1900
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView" --webview-exe-name=MSPCManager.exe --webview-exe-version=1.2.4.22027 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1848 --field-trial-handle=1852,i,4856496156591425022,3792496695401488005,262144 --enable-features=MojoIpcz,msSingleSignOnOSForPrimaryAccountIsShared /prefetch:23⤵
- Executes dropped EXE
PID:4672
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView" --webview-exe-name=MSPCManager.exe --webview-exe-version=1.2.4.22027 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=3004 --field-trial-handle=1852,i,4856496156591425022,3792496695401488005,262144 --enable-features=MojoIpcz,msSingleSignOnOSForPrimaryAccountIsShared /prefetch:83⤵
- Executes dropped EXE
PID:4544
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView" --webview-exe-name=MSPCManager.exe --webview-exe-version=1.2.4.22027 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=3248 --field-trial-handle=1852,i,4856496156591425022,3792496695401488005,262144 --enable-features=MojoIpcz,msSingleSignOnOSForPrimaryAccountIsShared /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:4996
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.183\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView" --webview-exe-name=MSPCManager.exe --webview-exe-version=1.2.4.22027 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2020 --field-trial-handle=1852,i,4856496156591425022,3792496695401488005,262144 --enable-features=MojoIpcz,msSingleSignOnOSForPrimaryAccountIsShared /prefetch:33⤵
- Executes dropped EXE
PID:3324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5d463c9c3651f1be4f789b6eb02f6784f
SHA1223311a9f809158d33c377eb18d0163c6dedb207
SHA256fb55843e093c83d347e36e15a10d36b9973410261395f7f7ed3850b0c576bcd9
SHA5127586df47344821e6823c7f5e1e5291210be613dc1cff78315cd0358c7b9d85f19aa57403573234aad0162ff3eb3795f7f7196cf95575f4b7089e20dbeba62ad2
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\115.0.1901.183\MicrosoftEdge_X64_115.0.1901.183.exe
Filesize143.8MB
MD5879842ed39f030bbcd770fcc1baa9a09
SHA1d67dd62d30ee28e964cab3972b1eeb8b4102e1cb
SHA256074c1a1e86497333b3c166a9b5dd648d77c48593c218fccae876d27048abc4a6
SHA512ccb3d8ae440935002ac10ff7987a68cb0245a90d62daa25844877b92bc2dd93a5be0b049cac850a8dad402b2d0e5ceb6322fb875589cfcc967a57484a079f67b
-
Filesize
200KB
MD53019ff91babc254f837717e7cb4d248e
SHA1d5d51f6b337da30128301bac753dfbc76bc20bbc
SHA2563f3c8c8736fb691c246b2510b3f88f6c7e56ca3b87d8532dc26424dfcaddcac3
SHA512a781bde845914a7fead19b20cf2843b065f3b523e1beaf76ae4887be4c405c072567bd85e700087054468db35da40bb1751afadf26c6803da48d8375aa9efa9e
-
Filesize
539KB
MD5bffee750e204442d07e5991bf0c74ba8
SHA1102b0a23306a24c12766ca8cc4c0fc2fad983704
SHA25652edbb9a0c4d71d1a5238d780c0cd6ba83cb5d1c069d7f922f1b9a529a94503a
SHA51252b9364f2abd0b8fd33ccb1366ca9adebb0d75db5bfbe3739fd2c04cb6d2ce41ffe41339206720ca6e61cae56aed504b4d7c1b05e7b285a5661e0f38c99fde12
-
Filesize
77KB
MD559e307897b380adb9392346e60a3f159
SHA17e6215415c9f287f1de37dc081b5c642495f6690
SHA2568cc7727d55bdc48b57f700297bfafe10a81936fe4ae060f3f09ae5d54b51fe8f
SHA5129b09a36625fd3c80cc6a57339d64276bfad39a410e08ddb384eef4c5e6b189729e0f9c0127b22f2b768967933f3810cc59d8db6805c8affeae7ac896ee3b99ec
-
Filesize
77KB
MD559e307897b380adb9392346e60a3f159
SHA17e6215415c9f287f1de37dc081b5c642495f6690
SHA2568cc7727d55bdc48b57f700297bfafe10a81936fe4ae060f3f09ae5d54b51fe8f
SHA5129b09a36625fd3c80cc6a57339d64276bfad39a410e08ddb384eef4c5e6b189729e0f9c0127b22f2b768967933f3810cc59d8db6805c8affeae7ac896ee3b99ec
-
Filesize
4KB
MD56c911df4d05001f6937f20a958a23958
SHA1b38a23aa53209b1531ee2289e04ecf980fe4982a
SHA256047f32e8fa2f5efb34c48a169ec838e8e437e78719733f7bb1f619dfd608eff5
SHA512646480e2f03e06782945aaec1e1f57e5f9a67fb62cfa704042698a38c825b804c2160d70653cca1f55251926709c0a73c1fe44dd09023aafb1fad3748d0b235f
-
Filesize
371KB
MD5699cee0987f003b1cf476f976a6d74f2
SHA19275e7aa34109503b6a4d0b595aa383fb22baec7
SHA2563283271e1fe2eb7bbd4ebb9be07456862c5c24741e86f7e8b160b9b23072629c
SHA512235aea95660c83b4af46ff459b881d028d3f6ce028157777df70b0b8b50f000f6ccfb4e17b1d404c75018c08939690a63af419af6646083575370d55648554e1
-
Filesize
22KB
MD504c88564420358b917e0409f695decce
SHA134667acd804fb513f5819cf60345ad54b9be5835
SHA256e836df6699bf61452aee1e4b102d914f8f07b054793f28b35871c6e1453cc06e
SHA512f7276ec99141bd5882e4bb0a6e163688f65939a5d51c484537f9043d6c676b664b308f099b021f4918356dcb8783d0674dc9e92a2a0cac88c5bee2c1c50db567
-
Filesize
20KB
MD5065386e3586bed941b5d15d7b15a3023
SHA186a292d4e3bc75fed59f83e6905090fef1a1b523
SHA256a88e5fb59ba29e21a4828b766d355d124daaa0f2a4b70a8729881b85f4f8c109
SHA51294948659f2f7b1668972ff76358177e2e1e3460de6fcf6558d30bf50361fb0e082390adb0b203c5070a92d693231fe8bb5d17125142694a7524ebd4052ec8a22
-
Filesize
28KB
MD51d5808f5b0b2f8bf1d340d2a2a450b94
SHA1bfdaf2afb7c9aed3517a3ef655462bd75151b17b
SHA256d11f95c78ed0c7fb3cf38c159c58cfe745c29e0cba004c11c67e6a08339b6ad2
SHA5128854f718539377d7b02d4c197c7c032eb8b22be751a61f647d110699dea6f673f038e13128667cc68d4cb0f4c6784fdb983557b828d007d872940707956b4de4
-
Filesize
23KB
MD5632f516d18c95129e2910480da3815fc
SHA1aafe130921577817f9feb736014bcc74571353be
SHA256f9013dcdfc64fc60cf07f221a19029386c2faf113be72343722267027285c444
SHA51276e313476adf6942311b6f1b581fe604d9389f02d3eab097e6321f9081c025f3a07cf6ef42724ab0158520bfd9a061488029226805da7a01efe5fd1f4ffefee2
-
Filesize
20KB
MD532ee789f0d5e0376344dcc1a8e35ea2d
SHA1e5755275b7e9a5623d8be42232b41d1748a4f3b5
SHA2569079bcc3a884b267caf57c3c16847471da7fcd805af8507ddc2cf76a602ca90c
SHA512bfd29fbfadabad9b69db0871b75c1b4676efb19228f50d1bb44b3bbb7c7627333cce3331764c061451bbaa49395a0021bf0d4021d7bbe0bce5cd8c06f63e47b2
-
Filesize
25KB
MD5b94b3d9cf15e53f593b9cbd23272bfe6
SHA119d8117696f08bc55508ae3974ffd17cc2dc981b
SHA25629e4ed0e015edde176290ea8fe6c538e07f9e47135c40d6eff860b855eb49a1e
SHA512319a23968bb0a6a336b20fa40b333ce525e02429c8a6905ae82ea7a6e055f73e0a4ca816a6d0f1e50026e2e37fa6bcdcdbdefd621eb4afb05bc810884aeb1eff
-
Filesize
25KB
MD529855d891ace514ed3daff86cde8cd4e
SHA163c0d75add8a3241d7e11596233b038217d34e8f
SHA25668e7bf5aba5ab4446904e97484db2a20033a96fe3bc9805386a18c7465c49ddf
SHA5125235c9c6f5755e42b32d872597269daab9a8884054b0356e4d015db9d07c0f74df46416444bdb60eb622909b7ac1dab7bc2a90c206350cdb735aaaf0afe95de5
-
Filesize
24KB
MD5dcd22611fc96de193cbc8ea2ed5a410d
SHA16860805d411398b1d3d6041e40a4b8c76b1b9323
SHA256d5c3fbefa1a4e356c0c92c9be72bab3680382c10f6e3372ccad8dccbaa94cd6e
SHA512a90bd2fa8780af23406e12a1bf09c6c102a2805dddfba2bb825c138ce2cf460acf0e90afbdbe0a8b3ca88f4674d20e25a86e05fbdda67653b8b4a3177e48f878
-
Filesize
30KB
MD5d39f9ba091d6a52478ebd897b02f1633
SHA1305493e663791a17c9e361c0a0665a46a8176cc8
SHA256e2f5eb2aea0203c4fd1956e03136fad5547d5aeb6861dbfcd190e26c92f54ed5
SHA512e92ed4861576a22006e1417ac4334bd68492a049e64045b14534ea0358224382e500971ebce7cc6564d45525e7ce16001a97b610c1038bc7dec7a2f77e16275b
-
Filesize
46KB
MD5383f7c7e268f59dfc5327ba51c7fd3cc
SHA13bdb65452e61895a84daf0b80762f1601c802869
SHA256b93b4fcb144d4dcaceb84e62c13076c08a28a7e53396b7eaf514e7586c4ef8ce
SHA512eb234ce0248c6cd8f80378ab1e41f36a20dae17a787c70b89721ab3291a634bca0abcb6965c18025c257a5c88a84e9bc2bc7de1365160a9f27a967a0d16d10fb
-
Filesize
83KB
MD50158436ccb2aa3d5e06f0cf64fe36a57
SHA141fd251dc2243b7e70eff0127b1cf6a24aca93c4
SHA256d86630855ba73029af5db5e83530be088e4960e43760a75faeffb37d9fa84d4b
SHA51227cf889baf0fd2a251f281ecef0fcbd51d0a15e7715b505a135648962fc0f1b24c260fbec0b2a94bacd5b143a8ae9129f6bad5d3958f1a2e18e3fd1243270d09
-
Filesize
17KB
MD5f8ffa048b4f60009ab75276628bedb4f
SHA1b5692482a40ef28571b757f885c748b14208339d
SHA2568b7dd4319c6da10d30ec16f6419812251f6436720f6078fd8363800379eb436f
SHA51269fa805b07478ccd841c499c9363bee91b8567dacd03bd248e5a7bcf31d003c35d6914e288e87d6edb2f11ecaaabe2ca2bf043733e56ed6b4e540a3945e99581
-
Filesize
35KB
MD53c0589db2aba7ecaa52600338517396f
SHA10680bc943bba786a67685da1e32b7c75ec96c5a9
SHA25660769c5f701a6cdea46d02d4371c69b69ba51c1ce29ee227a65070352b836850
SHA5121ea458e39b61f442120e892e1b4a949baed4a76dc14caa813e357f6b8cd49145d4fb17d644d0d67da77aa1d77dc5c302bd846aebbad9703d8843e779e3e79387
-
Filesize
39KB
MD57c0eecce8660c6d0076d655d5437f841
SHA11551667de7dfab5b0174dcc71f5be390eebc69f0
SHA256732123ffc4bf6b52278831e393d08ae82081cd5a3f1a6b6ace7cbc341e9f5973
SHA512eb05b179cef10aa047f7dc2d2e67a09da63e9261ddf2629a6ad4f449f757a56f31ed87fa73328efdc1df4758e991315781a0e15dd3fa53d7b7e942dcaeb08e03
-
Filesize
27KB
MD5c7c202bc30663ff57330d9c324696cd0
SHA194a87545fbefe85c59f95a17a8a61c836d573561
SHA256ad4dc8e3d6e3c2faaff966030e5c50a976e92ed9539623262c54ae076cd8abaa
SHA512bfdba1f37287a52ab126f1d1bd1cb21fb2f08dfb63a407158500e78e9c079ab4e3872e564e3d2297a2561a5af3088922a8f571efd58f61330a8680e1f92d0e0b
-
Filesize
22KB
MD507e695c0130c209d3414664620d9cd43
SHA1c420f2540fedbeb56e7fffe997a3c2f6fb2bcedf
SHA256156124400596f9af1b22f7dff12ebcaf436f5b8bdc2ae3068d8c40634843db93
SHA5126c4bd38e5c2d45c177d807cceb050e4fbe39467ff2cb42012f62349199113a8ed033dc1293bd92f004a847c6e24dbede5b24738d8c80e5b2f572fed2ce09c3f0
-
Filesize
42KB
MD58304258d92f955c0ee24ca4a6093d8a3
SHA1cd6760b04e75b5b5966a066b18687bff1f23d43d
SHA256216c804092d22f903fd271247b0c7284e06b29d0b117e4f5ac442bdb5b562205
SHA51286125f4bc55a77fc1e88847228c7ebf810c7e8455c0178a392a2a354980b9a1fdf3362ac6ca7898c40e948c803f26446d7483021f74a1b645df12adab8403933
-
Filesize
63KB
MD55acd0f2044c973bc02c39e351722e68b
SHA1bf95069d8e25164a261af69a93331f0aa7092073
SHA256a02f31c3288ab0df96cab2db6a587b1a668cf0ab13ac0887f2718f2be5245c3d
SHA51295c251b6b9b51590c7b7e28393fad85beeff469f8d34eee836da8d53e13e2de79012b0292946c65f871c7b371aec5d388297137868b21bd60dd1cfba9b1881cd
-
Filesize
20KB
MD521c0e96c854f082ef6795f879b2175d0
SHA19239fe934ecf0a61249b6339887a9c195e9861cf
SHA2566179c8b7483d67581e930448798d8ae7eaf737016c4fb56aa391b664d5c10bb4
SHA5123ef97ad5744415bd5cd88de0fd3019c5de06c428dfe9f72cc587da2aa6985ecbb92650faa6c11cc9c9dd79dcd7d5fa4fcd2191e5c8fbdfaa5e52eb1daa96b824
-
Filesize
51KB
MD54bd1c156be36bb58f01260d78f92a885
SHA15c71c3175eb9121f2cd8cd912fb4dd6005dab17a
SHA25671ddc87dbe583b107586ced316e764ee5a317c567291a94eebca2588ace5d9d2
SHA512cbaf07665ce5b790f62187d22d2fdff2892c8adde7c133e208fddcc5c7d2120e08c41dcd54522fb06cf78501e998ee8c7792afc6195ccddfc52a2096154804d6
-
Filesize
18KB
MD56d867ec03640cef6abb47fdaec98f7e0
SHA158b43fd5b145aa3db9a48b594883ee5788c8f055
SHA25619c3baa051318db9325d3b095ca37525fdda35bc8c73648c9fa1d7e3f03b3ded
SHA51204b5480866fb10de1bd87917f3d4c64fc6b21af80175d78425ea59cfc931cc3d8a55d2dbf82eaf2d698b5b6423582b2ffa9ae3f7d286fbb93c1d824380bb1df1
-
Filesize
22KB
MD59b66d76f8cbbf99bc4a61dbe81f6c0ec
SHA1e641c2dd76da2ac7d01b32efe8518e4fb66ab0a8
SHA2568faf79f1b5b0fbf4c6e9b129f62f757c4cb652ca9ea395fd9b0613e6e44aea79
SHA5122f3186e83e87282422cb9704e03c459629eb37f113c2106daad445a2db9dc603d765588b9e639811aceefee266f00ea0b0fccf36e3c6dd38be7e5069512cad2d
-
Filesize
30KB
MD5742ddb8a7862b6ed29ae44c8820c3f97
SHA19a5523a293bc8f55e287bc6963d6e598897be372
SHA25636dc6fa88937b774a74e5f8b9e3df36c1b35713e00704057aaaa18af8617eebc
SHA512903e2853c2bb3e3cd25e5666c97d02a893dc5d112e7722c15fa54c2c38a52a45fab4170d3c4071668651e00a84372a5ceeba632c11f01f20a56c6cc5173f8533
-
Filesize
44KB
MD5f458bd72ae4987afb1269932ce649922
SHA1df5e664d018efa3ee4369a3029ea618697d5e071
SHA256071b313444a5d540a437a5b71366299e3f1da35bf985e23ddee4bb9c176c5b2e
SHA51208eb40bd7f51af0845aa098bb0f78742f0a98c95643916bec1e77efb3f24e0d7b64f0c4aadd39c006097096ddc1407a7ba2acf9bdb525d2cca6ef333dd0647b7
-
Filesize
19KB
MD54a54efcc56d972aa5920dfb90c5d7741
SHA17b314eacc97a618aeba154d59ee57d75f47ed70c
SHA256b53e34276e9accb20384235ad3b95611785a03fc501311065074bd61e129342a
SHA51265078df022bb2b089f7abce9f9e3c65b976e4c638ac0c20a251c32001c2c2aa2af939dfcd38b8b90ab48ca1c211e2204d2f521770424ae116cadbbaffd6499cb
-
Filesize
57KB
MD56735d046ed6886ebb1fd28fdd3a6c63d
SHA100dad112ec2700139249cd9dfc5394642e0a9981
SHA256c95a76d2597180d8de538c3d991eee8b2b453233f24ea84dfab6ce4f3d4c8135
SHA512bf7bb13ef418e87d615b561d8e9d28b0f1a0d4cd5213f7e6b18f950a58b7cbf4f7b68a93ce8145c25dcdb59675f4475a35c2a1fcaee2bc76e15846f67f0b12ab
-
Filesize
42KB
MD580fc9582a35b32ff99dd745395fc0d3b
SHA188898ba23e4be6c125c5b954534beb0943aa2f26
SHA25631dff40223eb323a19f981b263ebd59e618e5380dc87265c34bb9899f8d3e4d9
SHA512bcc506f2aa841d1270be6473f40a37a56327e014754c0bd57ab0a44072b033e6c3368d104b7ca1fe81448d5ec43ac247f6999b8349c3f138bfac7b1b2bcfe08e
-
Filesize
135KB
MD5265a83bd16c50d7c9fd0332283ddc5c1
SHA1182791488aa394ebf3e0731bfc96cd9ac112d414
SHA256a539c00d472799256b7b5d520ec1cc7886f21f52d6a482570351d155cde659e5
SHA512313c4ea88dcd4220fe2f19e26ac7079616366b3c2cbdef9a8e16e81e56698764d0e60b3d272fae815aa7c43ecfe2852b16e7ca0b7615e7f525d4f22aac676429
-
Filesize
64KB
MD5532f6b8a6d4ad856b5a1073df4d3f643
SHA1e00183045327a5c1b747f52512d2a46a42e94c49
SHA256a7b7875575b75c9826b1ace38a5445815728303157af5e93c016f80d495400d7
SHA5129d6b924cefdd46a718d7ec4bd3b1641eeaa57a783af73cc837dc260092ff82137cdf7fe2ca58df0f2e05601e14b982ea2c8aa1ef89e74608574507ad01b20ec8
-
Filesize
64KB
MD5532f6b8a6d4ad856b5a1073df4d3f643
SHA1e00183045327a5c1b747f52512d2a46a42e94c49
SHA256a7b7875575b75c9826b1ace38a5445815728303157af5e93c016f80d495400d7
SHA5129d6b924cefdd46a718d7ec4bd3b1641eeaa57a783af73cc837dc260092ff82137cdf7fe2ca58df0f2e05601e14b982ea2c8aa1ef89e74608574507ad01b20ec8
-
Filesize
64KB
MD5532f6b8a6d4ad856b5a1073df4d3f643
SHA1e00183045327a5c1b747f52512d2a46a42e94c49
SHA256a7b7875575b75c9826b1ace38a5445815728303157af5e93c016f80d495400d7
SHA5129d6b924cefdd46a718d7ec4bd3b1641eeaa57a783af73cc837dc260092ff82137cdf7fe2ca58df0f2e05601e14b982ea2c8aa1ef89e74608574507ad01b20ec8
-
Filesize
113KB
MD5807d4dd95c9fcf1503695ac8a92f86b7
SHA1237da5f5ce7654dab48bf9de1a82315cfb38c844
SHA2564a76d36a80f34691ca6e23518e6efe616a06a0c64fcb310208a599a29d654cea
SHA5124d1950882acbc0bb1eb6dee58539ffadc6a132531acfd919a265f644afcc0cf6dddc2951ecb31fe4825a404076792c3c72f3aefb8af2511e1d541914091988e5
-
Filesize
113KB
MD5807d4dd95c9fcf1503695ac8a92f86b7
SHA1237da5f5ce7654dab48bf9de1a82315cfb38c844
SHA2564a76d36a80f34691ca6e23518e6efe616a06a0c64fcb310208a599a29d654cea
SHA5124d1950882acbc0bb1eb6dee58539ffadc6a132531acfd919a265f644afcc0cf6dddc2951ecb31fe4825a404076792c3c72f3aefb8af2511e1d541914091988e5
-
Filesize
113KB
MD5807d4dd95c9fcf1503695ac8a92f86b7
SHA1237da5f5ce7654dab48bf9de1a82315cfb38c844
SHA2564a76d36a80f34691ca6e23518e6efe616a06a0c64fcb310208a599a29d654cea
SHA5124d1950882acbc0bb1eb6dee58539ffadc6a132531acfd919a265f644afcc0cf6dddc2951ecb31fe4825a404076792c3c72f3aefb8af2511e1d541914091988e5
-
Filesize
66KB
MD5065a6e7a091f30e762276d5dae2b9102
SHA15afdeca927ca073da251229761f34fec2a67afd3
SHA256dfe3316dc212688bb2dbbdc6a1aeade6daec5732ff1be9a956196d24f0d3c755
SHA51223b769ec5c54aeffe54cb90444cb8772f89dda926b10564d60945058f3569bc0ca2cfb1bd9ff022f6fceaad8628b22516caf678af8d77498e8868c498033995b
-
Filesize
66KB
MD5065a6e7a091f30e762276d5dae2b9102
SHA15afdeca927ca073da251229761f34fec2a67afd3
SHA256dfe3316dc212688bb2dbbdc6a1aeade6daec5732ff1be9a956196d24f0d3c755
SHA51223b769ec5c54aeffe54cb90444cb8772f89dda926b10564d60945058f3569bc0ca2cfb1bd9ff022f6fceaad8628b22516caf678af8d77498e8868c498033995b
-
Filesize
66KB
MD5065a6e7a091f30e762276d5dae2b9102
SHA15afdeca927ca073da251229761f34fec2a67afd3
SHA256dfe3316dc212688bb2dbbdc6a1aeade6daec5732ff1be9a956196d24f0d3c755
SHA51223b769ec5c54aeffe54cb90444cb8772f89dda926b10564d60945058f3569bc0ca2cfb1bd9ff022f6fceaad8628b22516caf678af8d77498e8868c498033995b
-
Filesize
27KB
MD50eacbfcc68cbc47c8ac444c175c4283b
SHA1e85beb3ff6b98ec59dfb1eb04978818ac1ee7aed
SHA256b74acf8da656e4b9c1f519ecdd86709588a0fae20775c1ed01bb9c5523b2c85e
SHA512f7c50443ea747c5a3a52b40ff334638483d666c8dc9fd44b90c40587bb4303cc4aa0d4d7159f9ef50dbde7d331bed0c59b01aa7b7700630e3b0134f3bc46b887
-
Filesize
27KB
MD50eacbfcc68cbc47c8ac444c175c4283b
SHA1e85beb3ff6b98ec59dfb1eb04978818ac1ee7aed
SHA256b74acf8da656e4b9c1f519ecdd86709588a0fae20775c1ed01bb9c5523b2c85e
SHA512f7c50443ea747c5a3a52b40ff334638483d666c8dc9fd44b90c40587bb4303cc4aa0d4d7159f9ef50dbde7d331bed0c59b01aa7b7700630e3b0134f3bc46b887
-
Filesize
27KB
MD50eacbfcc68cbc47c8ac444c175c4283b
SHA1e85beb3ff6b98ec59dfb1eb04978818ac1ee7aed
SHA256b74acf8da656e4b9c1f519ecdd86709588a0fae20775c1ed01bb9c5523b2c85e
SHA512f7c50443ea747c5a3a52b40ff334638483d666c8dc9fd44b90c40587bb4303cc4aa0d4d7159f9ef50dbde7d331bed0c59b01aa7b7700630e3b0134f3bc46b887
-
Filesize
171KB
MD5740490519003a204a45e572efe6ed4b7
SHA1041e2d6adabccdfd5488651c05ee345c634c970d
SHA25641492a3b97269b2efa2932e09fec8472534a26d07485304bc6fcdb692fc6d386
SHA512d64687f312a9bb93f12d4865dfa4f239845a4df03aae1acc842f2db2f8196c58e460fbfd2f90d2c2b1259a58228fc3474716f913eeaec4f33e08369deae0fbef
-
Filesize
171KB
MD5740490519003a204a45e572efe6ed4b7
SHA1041e2d6adabccdfd5488651c05ee345c634c970d
SHA25641492a3b97269b2efa2932e09fec8472534a26d07485304bc6fcdb692fc6d386
SHA512d64687f312a9bb93f12d4865dfa4f239845a4df03aae1acc842f2db2f8196c58e460fbfd2f90d2c2b1259a58228fc3474716f913eeaec4f33e08369deae0fbef
-
Filesize
171KB
MD5740490519003a204a45e572efe6ed4b7
SHA1041e2d6adabccdfd5488651c05ee345c634c970d
SHA25641492a3b97269b2efa2932e09fec8472534a26d07485304bc6fcdb692fc6d386
SHA512d64687f312a9bb93f12d4865dfa4f239845a4df03aae1acc842f2db2f8196c58e460fbfd2f90d2c2b1259a58228fc3474716f913eeaec4f33e08369deae0fbef
-
Filesize
199KB
MD5f1324816052a2ee92cd9ef28f0813cbb
SHA1023f1fe9146799f915e694e4000ba96c52263b11
SHA256b9e7592a3bfb506bb63b292e8d41f3b9fb804b5e2642868c0931957e24482775
SHA512cdb443afb95f465f2bd755bc282f373d588b8ba2f881aac29d0f358d1f9ac77a26926657e14c973d7c7a2433886e384824d4028ae568faabe2109de871b23d9e
-
Filesize
199KB
MD5f1324816052a2ee92cd9ef28f0813cbb
SHA1023f1fe9146799f915e694e4000ba96c52263b11
SHA256b9e7592a3bfb506bb63b292e8d41f3b9fb804b5e2642868c0931957e24482775
SHA512cdb443afb95f465f2bd755bc282f373d588b8ba2f881aac29d0f358d1f9ac77a26926657e14c973d7c7a2433886e384824d4028ae568faabe2109de871b23d9e
-
Filesize
199KB
MD5f1324816052a2ee92cd9ef28f0813cbb
SHA1023f1fe9146799f915e694e4000ba96c52263b11
SHA256b9e7592a3bfb506bb63b292e8d41f3b9fb804b5e2642868c0931957e24482775
SHA512cdb443afb95f465f2bd755bc282f373d588b8ba2f881aac29d0f358d1f9ac77a26926657e14c973d7c7a2433886e384824d4028ae568faabe2109de871b23d9e
-
Filesize
41KB
MD59641bbccf3d60a4ea51e4194bacc5809
SHA1f73d609bb901b561eb947b9e6190edc243d08190
SHA256950166944de92ed9fd460e99111c0eac823d4bdc9f03e557df277bd83541a91d
SHA512bd692c2d039ef9c18c5b352460c37606d08cf4ad04fb5d44cca4693e2b9daa710b195c2624f627e334d85801eb51e13beb1a94ab1aedbc321e5bf64a05a468b2
-
Filesize
41KB
MD59641bbccf3d60a4ea51e4194bacc5809
SHA1f73d609bb901b561eb947b9e6190edc243d08190
SHA256950166944de92ed9fd460e99111c0eac823d4bdc9f03e557df277bd83541a91d
SHA512bd692c2d039ef9c18c5b352460c37606d08cf4ad04fb5d44cca4693e2b9daa710b195c2624f627e334d85801eb51e13beb1a94ab1aedbc321e5bf64a05a468b2
-
Filesize
41KB
MD59641bbccf3d60a4ea51e4194bacc5809
SHA1f73d609bb901b561eb947b9e6190edc243d08190
SHA256950166944de92ed9fd460e99111c0eac823d4bdc9f03e557df277bd83541a91d
SHA512bd692c2d039ef9c18c5b352460c37606d08cf4ad04fb5d44cca4693e2b9daa710b195c2624f627e334d85801eb51e13beb1a94ab1aedbc321e5bf64a05a468b2
-
Filesize
21KB
MD5bb1236091a2a394d5bfc9c22c50318a5
SHA172dedbf90ffb0cb5073e54fd978ff0742494b279
SHA25606310457c34f10a56901ba2a7528a5b0c64cac71eab858b4e095b5f65ab6f2d8
SHA5125fa6cc1783a000532d122fbd5aeaf8733b57d972b2fefcaa029722cc7d0b417bd569fbec52bc22063bd97ca8b41bdcc11352974f691ec40bf285c4e2fda1ed91
-
Filesize
138KB
MD5aa768e0050c6f8f93a22ebb286f8a38d
SHA1bb4f070bc71a37f72412cadc815151a25c9e2805
SHA256fa7899703b65e86bccd4875ccb47fa6fda98e947a7177a648246187b3da3f583
SHA5126f89fd7f8d4ad5bb664a83edc60cc36a51e0c6aa1bf2dba997002164d0687d3eb45d52a0f866b574507fb6546338c6a0feec6ffaac55330aefe247ce8b34d520
-
Filesize
107KB
MD5858a2835f3152e9e1cb67c96ef5e73d6
SHA1f40caf36dfe1cc3ada7ef5f80f0cb1254aea9507
SHA256de7c850c6118bdb40c35a30d0a8a018b065aef5b3913462d272cd5e04cd769db
SHA512d6d998ea6ab673fbd19f4854b78ade0a744eb222a43a8631a76169e370b7ffea2aa8bf46949fc9b772c1550cd5959c1202fc1ccd60d6c7529df8685c1d6c4b63
-
Filesize
18KB
MD54c6651af6dbe98f8d359c7d6ca90627a
SHA198c91743860c9ad197a1afa63e6f23295a97a5c4
SHA256a971743f0af42eaf410cd830a729162de33a1132d8e4c4dec63f1d2320bc7537
SHA5123d02dc7846b5975d79d8fbd9cfff97ecca643ca8840ea97778c267dd78bb32af5744ac4489a19aca77a884f6bcd82478c1f1204c0836e9d99e041805663150c6
-
Filesize
18KB
MD511e4c794999755c910a1a5ff93b5d505
SHA106f2a077b8bfd15262efc4300f1a38e3c527299f
SHA256d223ac5ce922c3a18d98edbd5dcab1f6d372e0f874db1f4aab5c481eddbe6a6e
SHA512665d5892b49a2a276e0b91ea442a1560a811b54b20f4bd8adca2b72df6f032bc0051d91ebd5924ea63fa87343f556de026ad7a637b35c39e9105bcfaca8e326c
-
Filesize
65KB
MD59674db0c2c8182f11cf3f52c1aa7b495
SHA11f9514e2fd595a9dd6bd54f34dcf481cc9908bf1
SHA256c9e3b0cbd5276be54bf3d1e13b2f59733ff68a6ce94dbe405d746cbc23ace549
SHA51270d6d9979063c6b85760e1553fab59ce5d03403d6a3f6eaf5fb8ce27e28c1760bcbef85594e3792fb67c20917e9701775099f19dc10adab84a07edf1670833c1
-
Filesize
348KB
MD58b0baf941361ca52d5634cb84e62300c
SHA1894c72abee625e54508eb98bedea4f71eafd331a
SHA256759af56a662fcad7a428a5322fe0a063313f55bacfbf8a928fd83a57529db55c
SHA5126c5005e4b0e56ae74f93fa013fb9e418dab29dff567ee6ef2e45c10127b742bc0fdc8efd39b00317a518e1dea7b45b20a88564fde805e81cf60652d2a5fcb11c
-
Filesize
26KB
MD5e2820fb081079560846425f96056b878
SHA189b7faba5e1d23982d63f3e92f73bc52e87b8f5b
SHA256f38ab38519ed7bf5d766599ca87b84f311466e87c2efda31a701856674420e61
SHA512df875b74b24cdb75b45baff03688dcb8d10c09ae81ddb93404a5be23847e1d4ceb7072e55ed71cb59fd96fdfe355120b294a59d6c7bb9fdd304ecfce466895e0
-
Filesize
172B
MD561860bba2e9734eeb31999b36d82fdb1
SHA1413fbce3ae09566d290c6d07750a78843e11d5fc
SHA2562ff9730fc1639bce7dccec51498a0446b31a6bed3aa1fcf0e5cf51f52f21c658
SHA5125dda4e7ad6b3dcb858508b9f6dfe387ed2c36f4d30db012c9d7c558e1281081eb93325272d602be27187466baf35e4b961aea3b34369c6f4af57c9cb823a47ab
-
Filesize
128KB
MD53e0fa1a95457c8f8d891aefb2a676f8c
SHA17bb691c6e995bb1db264c4665c2d2061505629c0
SHA256b5ee8d1b070c9dc99fd615841c76b51ba3835fd09b8da3da76bc904123caf2c6
SHA512173a1cd107b4b08e233430d2eb95f90f97d0f8da2e43c1e5c9a888aca0f70233d354ac54efde97802a19a8975a76740f0235b1be7fe9659d3affbc5bc9b9ecfe
-
Filesize
1KB
MD5b095e0109a8d54a00b85be0d2a7e6e50
SHA170ec9a62c019f3a6a2199a171ce3ec5f35b0824b
SHA256e1923cec0124f606f320391ec346fec5df8c1507a4e366f78e54ca8c464ee8d4
SHA5124c556d07719b6f1b060c94edb9d5a7a8c7bf1e9f58f565c60010b15cef2d81351d8a0115b3d888faa36997be46252c8cd6c6edb5b2731e7e2c628618d14d3de3
-
Filesize
2KB
MD53660dfc75a5e606366caa45360acde03
SHA10796263ac8e5125b27a8bb2a95de131cf222a38a
SHA2567c0a86835e68156b1596949eac540ef1ba90a87008219fcc5a24f02b8e7b4d20
SHA51251eccfb08326558f44d84fb2f5d3cdd179849a35e7c3ccb6d261f1747f3d8453ccdb5c8466de35e09d4e309e755f6416371b077c44ef2401dd9c503d9088226a
-
Filesize
2KB
MD5e0d65c60a38c4b9874ef76b1ae1accdb
SHA1f17c5aefe57b91f54517ff668435b0c6777af610
SHA256ee4105f1f35583d53d305ce6f66da5f8822b5e47e3e236dc8a4e44af695a1b59
SHA512424274b6e89f687883365cf0eeb731c90bdceed4708b8432bc0ccfd85d9c9574f15182de9daf4319cd3359771510b5211050a2fc21cd5206db38dd6d340fdad6
-
Filesize
280B
MD58afc513b7bbd4f7a746a1064c0b0f3c0
SHA14440c37f345dfe8bfe66065fd1a1d80635ddc449
SHA2563d316cefa35c644989944bd450fa586acdf874f585cf4829dc207403cea8ecf3
SHA5124829ca0b58562d0b06552b092ada6ee6381ac2b8360f1554abf7b7370c9d47c57c5ddb383d72a2d650dc62a02e868d56bdb786135025f17aa205232b5f22d60f
-
Filesize
280B
MD59e8681a5c2d6827aa722daf58a7f1b59
SHA1d121ee3553ac7051229e849a37714166eed7c4d5
SHA2567ca98e367eb3cb6ae5657697c83f71c5865903d44837241277d37e04e8a72733
SHA5123813af999e6980a042d298d4525a7aa4aea0f24fac28f18d21c0b216ceab42fb8272564a6d58d69e7ad98584fa0fb916c551f998d44053bca871f520f1064bf8
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD54643e4b26b07b6613393ee522b6a97dc
SHA179199956a280d6846b929ca266aeadc8910623e2
SHA2567e72177bd2160bfb9c5a4df06ede6a1b1b920914f85c8ce7faaa1112cfe6674d
SHA5120975f7ffe7b5eb8a05ee53b1272e5e28ac5803c9c7938754faa7ab17c2b561d3390a6dba2113d6bc1f8036bc76e8d68cce3d9cc74c532443ded47832a4481ad1
-
C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe597ac4.TMP
Filesize48B
MD5e0fd282700e3a18a15ec9322d23db8d7
SHA12ee7a0892b42d8e580d8663d7cb9171264040865
SHA256d844db21868500cc98730067cbb11232071d3f5737624291f950913689926230
SHA5123882b98868db960c77a1346a68a96927a42ba198fae8360e17f3af4f68bd0ead22d1b15108cee25c33aecf8f0eaa03e908e2b900b160a8f8f12716890e9f58d9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView\Default\Extension Scripts\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\PC Manager\webview2\EBWebView\Default\Network\SCT Auditing Pending Reports
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
5KB
MD5a0d9e19cd30e81715bbf264961c1d605
SHA11a2326dba158668c24ffee37b0d14be1078647df
SHA2560d2142afea90ba9a11ba36281b52d21d535fb74587a58f822eaef5b73a7036c6
SHA512246a395d60f2e16df8829dbb122af18467708358b76cca92fceb2bf76b0162d8bb46f8fbff62f2bed128de80dd5b1a86f2bc31fd5fbd091c1899c19811b2473d
-
Filesize
5KB
MD54607224f7992c2f756bddd3000daa4a8
SHA12bee71c575e7b950ccbc52a1ed9d360a1507d2e6
SHA2560674901a3f14adcae3fc5863a1bc8b85f0a09a9c816aa01399058b6854f5d6e6
SHA51234fe5ada6c3bea91b0f150373495f628296ba28b21a718eb00dc2bfc7ee245020d238aceb3dd9fe3346007ae5ec4123a390d53f6c7c03babd41780a51dd9707f
-
Filesize
1KB
MD5aed304fe45aa5526a9f89f275c6a41a9
SHA12255559878f769be52adb40a95082e5cbd48acb6
SHA256d0eadd424fb28ac24f16020ef6d90c58d14c81e121cc874c5ee5b74129d712f1
SHA512e022b71b092c7d082dc1564c4a62775898aea6e755f51133c6b2b9fba24c1e6a3a8ad078bf3a09c39b3ac49a4618881de00b4b181f98e2733574df75cff67860
-
Filesize
14KB
MD54df5d72b35a9e83676b5800c39dcfd2f
SHA16ecb5594a3a2e70f88dd5147c49d6ae362b845bd
SHA256dccdf1dd95283cb728811f9c86bea593d2472712a227924d638170ef3aa63ea4
SHA51224e55cc88b3ad6b8e56d0f44ec487f7240cc706d8ab1134486debbe42b657d34dd58b5f896cfdc4261ac265a4e318334c62f32e8865671e29ac61b3615884a20
-
Filesize
15KB
MD5d9750e017803f6f802197b2870f350bf
SHA13677e17df0db1cf37903857d52d6305244ce9349
SHA2566841a8d81e4e6cafa4330cf35b4aa752391ce530c765742ece182112324a0323
SHA512b3d85b223b5d966513a2e78953cbf012c4f877a992cde08b42b4957acb75070e4038b4fd2ecba5376127065b526f1eba5e2fa483fbc653bda1baca6f4a9c56b5
-
Filesize
930B
MD56b847b723a16a53ea79b6d210b59ab10
SHA15f29f9720ed2e5a936db1605ac1fb0b1d934c9a6
SHA2563e3790349bae8dd6a298c3f86484bc2dcb3a7113e280847612d17b8ac9f1c7f5
SHA512006c0ad99008a33d98dccf347f1816803620a1195401e6fa3790e61ae49206c1d72d45e469c9a075480a2474137ea73f2473deea807e6a8bdd143f22a6b761d0
-
Filesize
388KB
MD5a240350cfd8018e675dade42ce46f330
SHA144ed95530f8b114be8dc241c1b954a4b7096e46a
SHA256700f0bd044d3ae63013f467b9a15b9443bccd79972741ebd4715019a36487ec8
SHA512cac6ef99e8fa6ee92f041180a5ed6568856ae4d1e206a6bd03c720b649eb1676ed41996d15da522c3f81fd83cfcff8ff131ef89d0c2abe56a5eb8762508c7d88
-
Filesize
388KB
MD5a240350cfd8018e675dade42ce46f330
SHA144ed95530f8b114be8dc241c1b954a4b7096e46a
SHA256700f0bd044d3ae63013f467b9a15b9443bccd79972741ebd4715019a36487ec8
SHA512cac6ef99e8fa6ee92f041180a5ed6568856ae4d1e206a6bd03c720b649eb1676ed41996d15da522c3f81fd83cfcff8ff131ef89d0c2abe56a5eb8762508c7d88
-
Filesize
1.8MB
MD5c56905370fd00d80e6c87146b2b79043
SHA1366288994801930c7748750811db9e9ce2b5295b
SHA2567229ef4aff277a824fcd6db51a8df25a1daa638071b469cdde256d50e033e61e
SHA5128b22b4331c632d63164664b90f6d26c0da0c27c877010a5f5d7a5c3cdd350661b1a2dbbf92c451e9393b379eb9d6054d4e528674957c8fc820f1c1a9459eb8c0
-
Filesize
12.3MB
MD511c9cfd45af3089ac93f2844be85df9b
SHA198902b149ce023dc80836b15229d481347809265
SHA2569f3268665b6ca92c75de374aac1bc1bec4bc059ffc537774fc9ffa1f19dd5a15
SHA51222d59d11544a39f707330b7e6262c2f92c399492e1f4d0e2538c01f2298ba6b6e63dd886218dbdca22d1907eb1e5a6189b887b2146cf1e232711fc4ef0532308