Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
Maxon_App_2024.1.1_Win.exe
Resource
win10v2004-20240226-en
General
-
Target
Maxon_App_2024.1.1_Win.exe
-
Size
42.8MB
-
MD5
9d6bff2664275db5a5563904126024f8
-
SHA1
a04fd43cf5da016f2a2d3a91015f677db5bf353a
-
SHA256
405afe98393ff3e1bbf9ee11bca78a6260d964d313c77bc088ee658e20f5e06c
-
SHA512
98b8c56f6813e5c524c0d21d2d2ab42d39e608ddcb1e65b54ff684bb506dbd937753cb8200cce2581ee5dd1e36a559924175a40b641e56fa0479c868d395c5c1
-
SSDEEP
786432:+P85CCP/tTWaoKptj3ZkJqtLjmX01qKzqZdqHTgxXU2fHUb4VECJ:VLPVTWaoKptj3ZkctLE8sigxTvEC
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4608 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6} = "\"C:\\ProgramData\\Package Cache\\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20240228215655.log\" /quiet /norestart ignored /burn.runonce" VCREDI~1.EXE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Maxon_App_2024.1.1_Win.exe -
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 6 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\msedgeupdateres_bn-IN.dll MICROS~1.EXE File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\bn-IN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\lv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\pa.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\msedgeupdateres_id.dll MICROS~1.EXE File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\identity_proxy\resources.pri setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\ta.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\VisualElements\LogoCanary.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\is.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\identity_proxy\win10\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files\Maxon\Tools\MxNotify.exe Maxon_App_2024.1.1_Win.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\msedgeupdateres_gd.dll MICROS~1.EXE File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\BHO\ie_to_edge_bho_64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Trust Protection Lists\Mu\LICENSE setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\webview2_integration.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\mr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\tr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Trust Protection Lists\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\identity_proxy\win11\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\ca-Es-VALENCIA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\gd.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\sr-Latn-RS.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\cookie_exporter.exe setup.exe File created C:\Program Files\Maxon\Tools\MicrosoftEdgeWebview2Setup.exe Maxon_App_2024.1.1_Win.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\MicrosoftEdgeUpdateSetup.exe MICROS~1.EXE File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\msedgewebview2.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\el.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\BHO\ie_to_edge_bho.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\tt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\vk_swiftshader.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\mk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Trust Protection Lists\Mu\CompatExceptions setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\th.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\az.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\MicrosoftEdgeUpdateOnDemand.exe MICROS~1.EXE File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\msedgeupdateres_gu.dll MICROS~1.EXE File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\msedgeupdateres_nb.dll MICROS~1.EXE File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\identity_proxy\beta.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\da.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\he.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\zh-TW.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\msedgeupdateres_fr.dll MICROS~1.EXE File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\delegatedWebFeatures.sccd setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\prefs_enclave_x64.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Trust Protection Lists\Mu\CompatExceptions setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\identity_proxy\win10\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\az.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\PdfPreview\PdfPreviewHandler.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Trust Protection Lists\Sigma\Social setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\msedge.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Trust Protection Lists\Mu\Fingerprinting setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\gl.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\msedgeupdateres_hi.dll MICROS~1.EXE File created C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\msedgeupdateres_mk.dll MICROS~1.EXE File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\en-GB.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Locales\pl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\Installer\setup.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.59\Locales\zh-CN.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E0D8F79D-515A-4630-9F09-7C05C1FC8ED8}\EDGEMITMP_F02A0.tmp\SETUP.EX_ MicrosoftEdge_X64_122.0.2365.59.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\msvcp140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.59\MEIPreload\manifest.json setup.exe -
Executes dropped EXE 17 IoCs
pid Process 4748 VCREDI~1.EXE 1276 VCREDI~1.EXE 3636 VC_RED~1.EXE 4532 VC_RED~1.EXE 3116 MICROS~1.EXE 2172 MicrosoftEdgeUpdate.exe 1204 MicrosoftEdgeUpdate.exe 2792 MicrosoftEdgeUpdate.exe 3796 MicrosoftEdgeUpdateComRegisterShell64.exe 1672 MicrosoftEdgeUpdateComRegisterShell64.exe 720 MicrosoftEdgeUpdateComRegisterShell64.exe 3284 MicrosoftEdgeUpdate.exe 760 MicrosoftEdgeUpdate.exe 116 MicrosoftEdgeUpdate.exe 2824 MicrosoftEdge_X64_122.0.2365.59.exe 468 setup.exe 4568 setup.exe -
Loads dropped DLL 30 IoCs
pid Process 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 1276 VCREDI~1.EXE 4532 VC_RED~1.EXE 2172 MicrosoftEdgeUpdate.exe 1204 MicrosoftEdgeUpdate.exe 2792 MicrosoftEdgeUpdate.exe 3796 MicrosoftEdgeUpdateComRegisterShell64.exe 2792 MicrosoftEdgeUpdate.exe 1672 MicrosoftEdgeUpdateComRegisterShell64.exe 2792 MicrosoftEdgeUpdate.exe 720 MicrosoftEdgeUpdateComRegisterShell64.exe 2792 MicrosoftEdgeUpdate.exe 3284 MicrosoftEdgeUpdate.exe 760 MicrosoftEdgeUpdate.exe 116 MicrosoftEdgeUpdate.exe 116 MicrosoftEdgeUpdate.exe 760 MicrosoftEdgeUpdate.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Maxon_App_2024.1.1_Win.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Maxon_App_2024.1.1_Win.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Maxon_App_2024.1.1_Win.exe -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\lastrun = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5} MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ = "ServiceModule" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}\InProcServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine.1.0\CLSID\ = "{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\MicrosoftEdgeUpdateBroker.exe\"" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FEF5409-327B-46FF-830B-1F9FCC96DA4E}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.ProcessLauncher" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods\ = "9" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\APPID\{A6B716CB-028B-404D-B72C-50E153DD68DA} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods\ = "12" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ = "ICurrentState" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\MicrosoftEdgeUpdateBroker.exe\"" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebMachine.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ = "IAppCommand" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc.1.0\CLSID\ = "{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ = "IAppCommand2" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods\ = "9" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine.1.0\ = "Microsoft Edge Update CredentialDialog" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebSvc.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods\ = "5" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2948 Maxon_App_2024.1.1_Win.exe 2172 MicrosoftEdgeUpdate.exe 2172 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 2916 vssvc.exe Token: SeRestorePrivilege 2916 vssvc.exe Token: SeAuditPrivilege 2916 vssvc.exe Token: SeBackupPrivilege 2952 srtasks.exe Token: SeRestorePrivilege 2952 srtasks.exe Token: SeSecurityPrivilege 2952 srtasks.exe Token: SeTakeOwnershipPrivilege 2952 srtasks.exe Token: SeBackupPrivilege 2952 srtasks.exe Token: SeRestorePrivilege 2952 srtasks.exe Token: SeSecurityPrivilege 2952 srtasks.exe Token: SeTakeOwnershipPrivilege 2952 srtasks.exe Token: SeDebugPrivilege 2172 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 3964 2948 Maxon_App_2024.1.1_Win.exe 91 PID 2948 wrote to memory of 3964 2948 Maxon_App_2024.1.1_Win.exe 91 PID 3964 wrote to memory of 4136 3964 cmd.exe 93 PID 3964 wrote to memory of 4136 3964 cmd.exe 93 PID 3964 wrote to memory of 932 3964 cmd.exe 94 PID 3964 wrote to memory of 932 3964 cmd.exe 94 PID 3964 wrote to memory of 2732 3964 cmd.exe 95 PID 3964 wrote to memory of 2732 3964 cmd.exe 95 PID 3964 wrote to memory of 3152 3964 cmd.exe 96 PID 3964 wrote to memory of 3152 3964 cmd.exe 96 PID 3964 wrote to memory of 3808 3964 cmd.exe 97 PID 3964 wrote to memory of 3808 3964 cmd.exe 97 PID 3964 wrote to memory of 4892 3964 cmd.exe 98 PID 3964 wrote to memory of 4892 3964 cmd.exe 98 PID 3964 wrote to memory of 4888 3964 cmd.exe 99 PID 3964 wrote to memory of 4888 3964 cmd.exe 99 PID 3964 wrote to memory of 64 3964 cmd.exe 100 PID 3964 wrote to memory of 64 3964 cmd.exe 100 PID 3964 wrote to memory of 3400 3964 cmd.exe 101 PID 3964 wrote to memory of 3400 3964 cmd.exe 101 PID 3964 wrote to memory of 1012 3964 cmd.exe 102 PID 3964 wrote to memory of 1012 3964 cmd.exe 102 PID 3964 wrote to memory of 3300 3964 cmd.exe 103 PID 3964 wrote to memory of 3300 3964 cmd.exe 103 PID 3964 wrote to memory of 2516 3964 cmd.exe 104 PID 3964 wrote to memory of 2516 3964 cmd.exe 104 PID 3964 wrote to memory of 4400 3964 cmd.exe 106 PID 3964 wrote to memory of 4400 3964 cmd.exe 106 PID 3964 wrote to memory of 3364 3964 cmd.exe 107 PID 3964 wrote to memory of 3364 3964 cmd.exe 107 PID 3964 wrote to memory of 3852 3964 cmd.exe 108 PID 3964 wrote to memory of 3852 3964 cmd.exe 108 PID 3964 wrote to memory of 1180 3964 cmd.exe 109 PID 3964 wrote to memory of 1180 3964 cmd.exe 109 PID 3964 wrote to memory of 1544 3964 cmd.exe 110 PID 3964 wrote to memory of 1544 3964 cmd.exe 110 PID 3964 wrote to memory of 4896 3964 cmd.exe 111 PID 3964 wrote to memory of 4896 3964 cmd.exe 111 PID 3964 wrote to memory of 2420 3964 cmd.exe 112 PID 3964 wrote to memory of 2420 3964 cmd.exe 112 PID 3964 wrote to memory of 3324 3964 cmd.exe 113 PID 3964 wrote to memory of 3324 3964 cmd.exe 113 PID 3964 wrote to memory of 680 3964 cmd.exe 114 PID 3964 wrote to memory of 680 3964 cmd.exe 114 PID 3964 wrote to memory of 2748 3964 cmd.exe 115 PID 3964 wrote to memory of 2748 3964 cmd.exe 115 PID 3964 wrote to memory of 3980 3964 cmd.exe 116 PID 3964 wrote to memory of 3980 3964 cmd.exe 116 PID 3964 wrote to memory of 4196 3964 cmd.exe 117 PID 3964 wrote to memory of 4196 3964 cmd.exe 117 PID 3964 wrote to memory of 1964 3964 cmd.exe 118 PID 3964 wrote to memory of 1964 3964 cmd.exe 118 PID 2948 wrote to memory of 1396 2948 Maxon_App_2024.1.1_Win.exe 119 PID 2948 wrote to memory of 1396 2948 Maxon_App_2024.1.1_Win.exe 119 PID 1396 wrote to memory of 4608 1396 cmd.exe 121 PID 1396 wrote to memory of 4608 1396 cmd.exe 121 PID 2948 wrote to memory of 4748 2948 Maxon_App_2024.1.1_Win.exe 123 PID 2948 wrote to memory of 4748 2948 Maxon_App_2024.1.1_Win.exe 123 PID 2948 wrote to memory of 4748 2948 Maxon_App_2024.1.1_Win.exe 123 PID 4748 wrote to memory of 1276 4748 VCREDI~1.EXE 124 PID 4748 wrote to memory of 1276 4748 VCREDI~1.EXE 124 PID 4748 wrote to memory of 1276 4748 VCREDI~1.EXE 124 PID 2948 wrote to memory of 3636 2948 Maxon_App_2024.1.1_Win.exe 133 PID 2948 wrote to memory of 3636 2948 Maxon_App_2024.1.1_Win.exe 133 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Maxon_App_2024.1.1_Win.exe"C:\Users\Admin\AppData\Local\Temp\Maxon_App_2024.1.1_Win.exe"1⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /s /c ""C:\Users\Admin\AppData\Local\Temp\MXAPP_~1.BAT""2⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v1.0.1" /f3⤵PID:4136
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2.0.0" /f3⤵PID:932
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2.1.0" /f3⤵PID:2732
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2.1.2" /f3⤵PID:3152
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.0.0" /f3⤵PID:3808
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.0.1" /f3⤵PID:4892
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.1.0" /f3⤵PID:4888
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.1.1" /f3⤵PID:64
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.1.2" /f3⤵PID:3400
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.1.3" /f3⤵PID:1012
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.1.4" /f3⤵PID:3300
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.2.0" /f3⤵PID:2516
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.2.1" /f3⤵PID:4400
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.2.2" /f3⤵PID:3364
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.2.3" /f3⤵PID:3852
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2023.3.0" /f3⤵PID:1180
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2024.0.0" /f3⤵PID:1544
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2024.0.1" /f3⤵PID:4896
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v2024.0.2" /f3⤵PID:2420
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v3.0" /f3⤵PID:3324
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v3.0.2" /f3⤵PID:680
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v3.1.0" /f3⤵PID:2748
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v3.1.1" /f3⤵PID:3980
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v3.1.2" /f3⤵PID:4196
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Maxon App v3.1.3" /f3⤵PID:1964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /s /c ""C:\Users\Admin\AppData\Local\Temp\FUSE-W~1.BAT""2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Maxon" /t /grant *S-1-1-0:(OI)(CI)F3⤵
- Modifies file permissions
PID:4608
-
-
-
C:\PROGRA~1\Maxon\APPMAN~1\VCREDI~1.EXE"C:\PROGRA~1\Maxon\APPMAN~1\VCREDI~1.EXE" /quiet /norestart2⤵
- Adds Run key to start application
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\PROGRA~1\Maxon\APPMAN~1\VCREDI~1.EXE"C:\PROGRA~1\Maxon\APPMAN~1\VCREDI~1.EXE" /quiet /norestart -burn.unelevated BurnPipe.{14B0EB02-3C60-4B22-B4EC-0B24432625A0} {F970C7A7-746D-48F8-907F-C9B62235D4B0} 47483⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1276
-
-
-
C:\PROGRA~1\Maxon\APPMAN~1\VC_RED~1.EXE"C:\PROGRA~1\Maxon\APPMAN~1\VC_RED~1.EXE" /quiet /norestart2⤵
- Executes dropped EXE
PID:3636 -
C:\Windows\Temp\{6937D976-A215-45DC-98E5-EC4E4B0B56FA}\.cr\VC_RED~1.EXE"C:\Windows\Temp\{6937D976-A215-45DC-98E5-EC4E4B0B56FA}\.cr\VC_RED~1.EXE" -burn.clean.room="C:\PROGRA~1\Maxon\APPMAN~1\VC_RED~1.EXE" -burn.filehandle.attached=540 -burn.filehandle.self=548 /quiet /norestart3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4532
-
-
-
C:\PROGRA~1\Maxon\Tools\MICROS~1.EXE"C:\PROGRA~1\Maxon\Tools\MICROS~1.EXE" /install2⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:3116 -
C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU4D21.tmp\MicrosoftEdgeUpdate.exe" /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true"3⤵
- Sets file execution options in registry
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1204
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2792 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3796
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1672
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:720
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNDUuNDkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjJBMUY2NEUtNjlCOC00NTQ3LUIwQzktMUNEMzk1ODYxRURDfSIgdXNlcmlkPSJ7N0JGM0EwMUQtNzkwNS00QkUwLUEyOEEtRjBDNDk1RUMzOEM1fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InsyOTgwRjI1Ny0xM0E2LTQzQUEtOTUzRS01MDU0MEQwMkVCRDV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTg1LjE3IiBuZXh0dmVyc2lvbj0iMS4zLjE0NS40OSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSIxNzE5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:3284
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true" /installsource otherinstallcmd /sessionid "{62A1F64E-69B8-4547-B0C9-1CD395861EDC}"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:760
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:116 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E0D8F79D-515A-4630-9F09-7C05C1FC8ED8}\MicrosoftEdge_X64_122.0.2365.59.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E0D8F79D-515A-4630-9F09-7C05C1FC8ED8}\MicrosoftEdge_X64_122.0.2365.59.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:2824 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E0D8F79D-515A-4630-9F09-7C05C1FC8ED8}\EDGEMITMP_F02A0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E0D8F79D-515A-4630-9F09-7C05C1FC8ED8}\EDGEMITMP_F02A0.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E0D8F79D-515A-4630-9F09-7C05C1FC8ED8}\MicrosoftEdge_X64_122.0.2365.59.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:468 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E0D8F79D-515A-4630-9F09-7C05C1FC8ED8}\EDGEMITMP_F02A0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E0D8F79D-515A-4630-9F09-7C05C1FC8ED8}\EDGEMITMP_F02A0.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E0D8F79D-515A-4630-9F09-7C05C1FC8ED8}\EDGEMITMP_F02A0.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff66a1269a8,0x7ff66a1269b4,0x7ff66a1269c04⤵
- Executes dropped EXE
PID:4568
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5684836a970dc76fc1fe7da5d97b887d7
SHA1ccdae64ebfb3c87a84ed3f9810fb476cb4af3868
SHA2568d9339520693ce04c67973ead1d78f135ec7e0477abcbef974c31e62260fc80c
SHA512ac4c988d603adb74893ea142999bad0f9be374b0e5e674697482b5a24e06a02cb4b7d4aed42cc92cec54501a111368d3f3371990d0748a10fc18458496a38acf
-
Filesize
5.6MB
MD51cdd645c3417a14af84ba114fa99ed96
SHA15e5e8858e01a0f929d172fdd4ceec96ef0af0683
SHA25698969655a6e6668ec908246f4fc0ec2c9b809eb0f2f7d9d774b2d5c304c3bc80
SHA512b557385d7ba91d9fef5d1f35d7b7f1ec8700ab1fc9c68b0712dbb0627a905b30d939dc462f26736b3f1c4f8a2ec05fa34bac5b8b58f14a98f14c2a4584568788
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\122.0.2365.59\MicrosoftEdge_X64_122.0.2365.59.exe
Filesize2.5MB
MD5a6fbba42e5a82ae37a276d13bc1d5f93
SHA17ee490d599f631eb641142ee9b51615523c16ef0
SHA2568957277b218bb5a640b3b8363bd51a76b2f03557843481876b217de264f88b8d
SHA51214d5ae173746347c3a6bf5c61a68bc7558d13ad44c23baea93583e8b7c53815044f4c74ef5cdfb03c947ad3fffffb519b583c6f0cd4e23bf30c2480d2bd2db1e
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
160KB
MD59caf47e9999af93d8f49c0f5b62ac693
SHA1dd83435e30a88d2df849e4d4c8e3e671d545677a
SHA2568ce4842eb307265d3a1a43bb558925030ec5c399bd8a67ac0e3b9a9b55e1a64d
SHA5126aea29ec91f4e494917aa22331ae6cb62e4ebcf84b03abe562bad43993b5750388b35084cd179ef52c00799c88dad8cc658e31e3649cf866c228ccd5cb0118ea
-
Filesize
209KB
MD5d7d541bd3dd228ad24dadfc4089b0704
SHA13fe7399267cf9bce649922d8ea0be9a5ffa77f67
SHA256cedade653a1e8d68809199c87a65a7a69fb360f67177262e651253cf0316b842
SHA512aca02d3bc55b7301257c56232b899145ad3266c210997d9eae664a0c6b6796e646a93db012e0a1b0d446cd64c55f916ab6f9a822b7b6b5faabfb75e3b5e3f011
-
Filesize
203KB
MD5d51ad58ff2e702fcf54e5580c3d5195b
SHA1cf65da922713ee8507fd7976ebf4786b83d194c4
SHA256e14aa9b45f08b41fa555568396b38c3cef3827ce46c95ac1c34b34fb65cb20a9
SHA512c9d40c6c22a9115162b34b24fe24f8da5c263b634067ace2822e6cc3206c01a546ed1df3dde09e31cdd86d0b175dddf696e9a5fea63987175c187428056f9e3d
-
Filesize
237KB
MD5b6e0a6427151dfaeca0fc7d84b6e9523
SHA1a03f31f6a8e0fc7f386993a8e8082c383b41a438
SHA256f70cddb720fb4e482704693af2fb2cd862c8ca324a13cb009d8ed30c95184f23
SHA5126a4c673c12a7b8970a6920b4d832fb42680f2b277a832f28f2c41d57821cf7e8a46f562ec6783b81b7eff71365af0f713230a454793396518578c5536d124c29
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.5MB
MD50c9199555050145619d3adb0b9c86d90
SHA1e290a258869bb45a52c3cec13cfe042c6cd411f7
SHA256eaca58832f1c5d40db402d8165997893be10c42f86b372ab253c66cdacef1cf7
SHA512ca71932635875224d1cf439294065db925d1c46609b529b589e1ee874f24f2a838a366fc083e42444f8e1ff0eba6ae0c8db6e43ced9eb6c15897d2308d8b2bd1
-
Filesize
27KB
MD5bbcba04b4368221736141f6da3dcc259
SHA154e0d0761995fadcb9d588a079fa1e4b472a968d
SHA256988be2b023768090eae11fddff079e31512edb975920f97c1a3e9bc8c42c0064
SHA512fa00c567de74a56223af838a89e6efc036de786c3e5513ad32d358693d3931873179007aa54b99f7be54ef5df8584f4fa7bc75dc13f2fdc92b4bedf36a7ef4dd
-
Filesize
23KB
MD5c2684f7568e44d9adb284f39e658af48
SHA1f15d1381d2b6cbe8b28d7778236f2e1f7cd5b93e
SHA2565cc5a2b40b4aa078dec600da52c2fd06b1c14ffb780fe7e928f815001aea1467
SHA51279056a8995daca7de8664a67fb557c8f2cf5c460501d149b0dfcde3e9b81f3fcd903c832c4406ac63fe82436cfa8d83e34eb1681cdd1da04d70314791bfb6d50
-
Filesize
25KB
MD5529a2715fb172ed53f691d7e9f162965
SHA1287ac0ef438bbfa46b6968cb9b49405ecbc17b65
SHA256db8e1c2616674f557cf12d12a72e69b270af942e507c6ec57b38b5945120a364
SHA512d3a62e277b0872c1371f5459f2ca35293ce6db27997462c7c7b70337cf9a08cd528d9063e4daa7124a32c47f8f68c10fae8eef8a6311872757b3b84f4c04b0b2
-
Filesize
27KB
MD5149dde1066fc706cad0e940a43712b8a
SHA105ece216582c89c53ddac41e0a45c3aa021d9a3f
SHA256536ac447c4716c40a44eb4d41b38da584d449e402ae2c009968bd276221d7bee
SHA512950f1023ac42855ece0fbd9816e6b64fb2df6e532278c59ee96594692de97cd6af069a57006ad9aad3bb2cbeb83ca95c13ae018e7692356ed622c851f648e089
-
Filesize
28KB
MD52d81bba9b5ac6c450186db93b761896e
SHA169669f5cb136ffc4bc783947027d5a620595eb45
SHA256768ba9c4c0e7e044f659b44e2e95f60b14ccd9a4898e2b5a7e60cc16a8595c36
SHA512774433c8c8bf2eff50218810180b4cf97fa67a9ac2cdf8215b16b0772039f14df541d9d9388db8176b98feec26ed7086be9eb2dc1eb6bcba350bd670e4767bba
-
Filesize
28KB
MD5d8f16d00982003aa07fd3016115576a7
SHA106a939ddbde4dc07285998433e707de1766c1ea9
SHA256013dd144e2e2bcf0d251e2a7868ae14f270258fea9d824cbe68ab45358796c6b
SHA5124db7aba83be3b847a103a6fe2a33e3daa94f487bdc081b5bddb2cbd8bef9e65ca60758e56be43281669df8d64a2218feb70271f41fa8c98d1be2315f6290f5e6
-
Filesize
28KB
MD5f2de31f06d14f1c3558841aa3d93151a
SHA1b9e855ac33d253f3dbfb0eecb014b5aaaeb7a60c
SHA25646b55cc5c0f5fce1a7ef57fe34494ce747a306b5e1e553c1938823c0c3051f7f
SHA512a9b941fec9faf702b6c156a03c58137f8a6517ece1d8ef710a11ce45a278f6435651c0c24c803b47acbc0a80f043e6f7edbabc34be5177d656b1003508e488c3
-
Filesize
28KB
MD5ce30eba6f600030af2efcb27ed5ad47e
SHA12a40a1dc547295f647426bd4cf374559dd4354b7
SHA2561483b44c5c7f9d6ad0918d0c0a8aae1b85f50825f919d2b26ef135adfc8a1be7
SHA512e4c1c6c6e8fac0be5180d54514f17a73eee78d0ddfbe600ad0e02817f7fc768759f75f12dadb1589e8840d967a26e40d97b09b223665feaaab81391cbeb2bff8
-
Filesize
27KB
MD5ef48ddaab5f139aafd2b35f203231301
SHA1d7d219608c9f439cdfb418da02df5ad5a4293a7d
SHA2561fdb779f5a2c94f7df2de51fc5135fe124cb019670b4b703c30b9b36ee42c3be
SHA5125d0e02d23bb31b490ee6812462817967405f7d0c6e7582bab648377dfc4f439410ed7e18f1c5dc3192e676be92554ebde4ee415c334f8051586131909b71f69e
-
Filesize
28KB
MD53ca0f0a8008fe7cffa6cc93d92046f1d
SHA1e37924cd9fda5c366ede61e12c491636e05f3377
SHA2561388ee7b0605fa5cba0fb433ac6f3d24aee1f7ddb9692e36ba60a9206fbe63f0
SHA512d89fce1537c428811326efaba2afcf9f2597944465335527c0ad097bbd71e652d4f96d1dbab3e5b1cdc493595d613730fe29a41822f05338a9b04a66bdc2a37f
-
Filesize
28KB
MD53dad7ac66afa4f629aa35aacbdb49a91
SHA1d8ce59f298d5b2b10653e68839fa3c556fe18cdd
SHA2567194606a0cc8cb328d47b05ceb5a518478224f1c95296ec3cbb711d8150dadb1
SHA512a0a6303f58058a6a3d9938c515f2c164bef5d00bd3fde4f2bceb19c82de8388fa14e8176e5ac1969f26422502c300a1a3d9993c182817da107ecf979301b7e0e
-
Filesize
27KB
MD5d31a2d3689673bb841f9d2184436b316
SHA12c9db8bd9918b077e4dcb6291f2c3f36100336db
SHA256518035972c761a8eb2aeba515bb00179b2b5bd2e295e4676d32c5e00c086b660
SHA51293e59283bbf0c9739602ea79e96456b09d785816c6385a547ac52a89a7396aa7ebf30b9d579764084105d054e9bcf7e111124e1a42a5eb24508f2afee5adacf6
-
Filesize
27KB
MD5a47c42123b2804b0af0c54467a4260ee
SHA1225cd3d53185737de9294820ba7e500215f1b250
SHA256337047b096d243f132bcc480b1fc3266729de6e1d5fd7ce0d55006c9f25aa904
SHA5121458e39db032d03256bd91bcb20d1495656e75eb05aa24d5fc976834e49a1ef3c748296d141baeda1e3c44d117d5f729c9eaac5285244d919eb41626cc23fb76
-
Filesize
27KB
MD59db6506250f98abf32cf3263636552b3
SHA1b1f063cc03054fa2d7a32c5a103bbc38e69e7fa6
SHA256b45a10453fc7fac054e70f9dfa83030b7828034a3e5102d3e71f0e6279e1aeeb
SHA512bea11ffb729b55d9e191ca4b32dadf68a37f8135f59bb214c122ebaffa935000c535b092c6ba2bf6b968fe53e7bc99a30a7c97eedd13edc0898ae76f1d185e3a
-
Filesize
29KB
MD5d3dec2f4af4eb79dabb174bf5532741a
SHA12f29f52498022fc82dc31da05f1029cc24134fa0
SHA25607eb6ee73be32957a3e0e53dec0c6230f1df7862827e0b7b4d5250f43880211c
SHA512bff2ea0507670aad62a619188f923cb58b76ab685284d97a753b7b8997da1c62908af0a57149ce57575800fa3764239fc9fef42b22f2aa67acadcf4b8c9fd946
-
Filesize
29KB
MD5567558de3be01745173565e5a304b8fd
SHA1cd5f663fbc5ad54f61a158ee5a4d2969bddec5aa
SHA2568f50d7401b44b5089465c34db4baf475f300be9683657ec6cbdbc87b9a5cdfe4
SHA5127348486abf0a5c7db19406f14f21eba5c75a68b1c0fe0c7414aa3e23ad875895bcc9055c17a08226286353aee4c67d2d8d483e893f274dd9a69cc4803232a05c
-
Filesize
26KB
MD546d4c79c666755374b2c23e43f1dfa4d
SHA1aa92ac32702bbc46dd4e5b4581eaa9c0d1d6c674
SHA256f137dbcb877c55e3173dc288a717847d4bc6fefde47f2850984cedd34b770837
SHA512d9a3da990bb09c96f5873723b39256fcff18919918361fdd7f34714b063f1e45d5d19d3daa3ec90ce1c4b2766742ecb5c4eebbc664fc68dc2524c1746aa2eaa4
-
Filesize
26KB
MD5cb78d1e912542bc2299cece8348c9f52
SHA170f35b8fc2ee00e8f47b67e8b3b8cc018cd4e29d
SHA2569b432eb71b7b94dbe7e9890ad112f1570a74221eb766d5b40c105daa03697b8c
SHA512fb58db15d3a258a85a3e93a8cc752ccc3d42655f9ab7d9730afa1ac2a301555f37f5a15daf10933d32b2c8e566acafa2a267ffc7103814e7fe924733c54ce9d6
-
Filesize
27KB
MD5ff961e92feefa84c388aeca7cdee9031
SHA10850fe7d29e29072fafce0ddfb0356fa568650f7
SHA2565f1f0d19b65dd369cbab64809a7c45715176a7333ea021d3e5d9fafe92bc2bb4
SHA512e81be328f4e9ad4e47c134ee448b4874f0d5e81a927150bcf4637e1eca2d20ca068b36fc1e97a294e73102ab5e4512d19fd2576e159859b4c4848a912c752947
-
Filesize
27KB
MD5a12ad07d08b8e5f1fbeb91fb23653d09
SHA12ad01ba02c6c4753a12cad3148192b3b1102bfa8
SHA256b133e5dcd50a0f8ad87ea6274d873d5fd6c1c8020867e0e3423aea5f737a77b5
SHA5120419d5391cf5b282ff98eade9a1a45a2203c1902f6abbaaffb4c417dc9a747d8827cd214d9c5e2a35ccae55cdf49466ee5978fc38fea79bf2a7945b749101042
-
Filesize
26KB
MD5143da718ea39b1a2a42962e6a2bd3970
SHA1cd67424ebf47d658a14c5a66ea3ae83b1417de3a
SHA256fdb4f9619dbc4da195bae06005d63d28d322a736922b2732bf147b3f8f4090c9
SHA512df55fc3f311bc990e353159a63eb143514d21cf4563a51a962d2a277338697d10f76549abd0f7ac788f3b1776a5afc76d5a29150f50f49ea665e92427f32111c
-
Filesize
27KB
MD53a2c967dfd4abd218b4372eb947b1be8
SHA115ec1ee1855a97acb2ceb1861822ba975b5ac1ad
SHA256186c3759bb19281652fd8aec7d6d880be76957bf3643511912e268f08f0b7ba7
SHA512f6292aaa9cf2a03e751494bb1b71e6db4e10ac4bea975f274d53dbcd2091e546916c3f7af6d2b5a0de80da432e69f360d99020ac8a72f7d1c9a7f267fe8d4645
-
Filesize
26KB
MD5b7c02449605cf2f23827e1563093900a
SHA1a774a4363f91cdaa3fc00c3f3f7f159366f65348
SHA256c59a30a2a711c5a2b0590e89f710a7e9e56e7676ac4e172b76a459a53e938557
SHA51288118e2f4b59e3f95f7c92d3a318c97e207ece6ec4ef0ce0c3186b5815dd1b5e8042b8f9c0b22509b9d3e95b4bf9686a16d250b7a81cc8bd447fc8e5b56b2661
-
Filesize
27KB
MD5f0ea857b6defcc66a48b080ed6deee02
SHA168d38516383169a7de9916f636767620a65eacbb
SHA2564c2466de5cd11570e9cecc8146b644f8031cf8a438b6474cd2991ef187823fa7
SHA512542b658d851319f1fd529516ff32c2b48bdf0ae4d6facc6de43a9ca6c91f4af696d76318ea8e9ae9e691e60853abd250374f125c71a61d50d4b4fdaf67446647
-
Filesize
28KB
MD5d798c5860e5822a57bef5a574343c1fe
SHA1774940f0d229e5a08e56a109baf464d4e98affa5
SHA2561e1445d34d1dc39c6f225416d4d794b272207ea712ef938796280b23bf3c326b
SHA5126aef37604473dbf0909fd509da7a290b45fb8a90addb0bdc8a479c92720d0f7affa042d2d793601a224534a58a62dc98f499cb5bfabc10152883243443e9f2f6
-
Filesize
29KB
MD5d9728e7bc603e9d78dfced409bbb397a
SHA15748b6d97bd291ccef5849c2493837cb50469c4b
SHA256002411816d867e54f11dd3ecd4b3be50980d2d2da624ce8b09746938e96999b6
SHA512e3494e992f11768157cda1fe431debfb7ea7bf2b1d7bb164b7bd7cf7fe809f55acfb61bf7bfbdd7ea8e0f78a7a55dc891dab4023d98884b924191e76e8bfa88a
-
Filesize
29KB
MD59c7e3ad929d07a70a337d209c4de2f9e
SHA15834bd8fe9bfde2446872435227d29922a8c1fbc
SHA256a26b9202d4ae3d01b2f621850cd27fa92d4364a49115e1f53af42db60f839d1b
SHA512dc5a7248aa282638d06c177de100efbf73cbb54a8dd2870eea6b7a339ce78de6ee694ee4eb6ba6312e812d13fb99acb9c4ffa71f9424e17e15dbe8872605bdea
-
Filesize
256KB
MD5ea1a2eda9a01c32bfd588309982737bc
SHA15a0fb6f2083947557e271bfa15d03c033b19000d
SHA2560a0c0d24d0ce929cfc431090f898aa228e0b68f9b870d1cf30e977d09ead1bcb
SHA512ac15c7f0f5ee0eb62e95fee0b1175e8893bddaa4403677c6b8b642f4dd0571070e457c664eb7e16ff05c6243c71a7337cb0c62ff03e747442b9a2647537979cc
-
Filesize
5.4MB
MD535714c72f1c3a9333f5e3572d29ff899
SHA14ba11e25cde6735fc9dc940404c7aac5769db8d1
SHA256fee2b214225e9629a05cad2ec92865fb3c690e400eff7bd06fcc48c645ac8c93
SHA51264856fb51129c7c9f34f8af123fe99ad225df96c5139462a6e4248dbe9a9944d52aaa11a025531efbf94fc3de42ad881419ecc1fe0234a400df172e99af547b8
-
Filesize
832KB
MD5e6d5cdb339415d2a2cbda6b29c67a4ed
SHA127614eabc3b53440734e291fbd3c1fc37d70d843
SHA256899c0d08275c77f164682e1bc2bfa02b1535a13eae3d18d31e617e13288d5288
SHA51253ec34a3651a8d402560459998c7a2232cfd9984cde5613593636253ebf18d20c33f9e28ad25b7d007f1f37a0d1db90e4a17a60847f399cf1f1cf3aaaf8861c7
-
Filesize
707KB
MD54c1d278e4acb74b9f06fdd55beb234c4
SHA173b972ec96e08c48d03be75adab1d9c6b7e7eca1
SHA256007bf8b9b73178b38eae9ce48a0374d126bcb3f90e23c8c28733d89aa9a91fab
SHA51280b925ba13fbf978a81ecc5d5b7bfc1597229da2d769d8d438304d8a9ad1be5cafd1827debc58cb7a92e38ea20ce8fbd060aa54c257966f844b335ccd740ce7f
-
Filesize
1.8MB
MD597c97ad5932da774f2d9365e0c1c895d
SHA1924952e98c188a8c3f058a1304d516262ef59678
SHA256c7d4b85cd0434078f54c90d58e1c0f57975efeaaa21de646cac2dd3513dd9447
SHA512b530fcfc5ed45ad3abe20604c3d5ce0e42df69aa2c53ce5fc8c27e96d5666d85f319a777014b48a699c7027971fed03be55e21215a65b8ba7a62d428e6f57311
-
Filesize
6.9MB
MD53c03562b5af9ed347614053d459d7778
SHA11a5d93dddbc431ab27b1da711cd3370891542797
SHA256681be3e5ba9fd3da02c09d7e565adfa078640ed66a0d58583efad2c1e3cc4064
SHA5126c2f4eeb38705c2dafc4d75d8de0036a0aed197f83e9cb261d255fe26e4391f24b0b156e9019c739dd99057041c2bb80f9ab80f56869bc1e01f0469a76f24f75
-
Filesize
1.7MB
MD56abf61dd5a6318d76a11ce43b4bee001
SHA1546fac452bb8892bed42b79b17dc0c86ca5ae7dc
SHA256389601cbd7e9256ce22348e3ceb2c33e39ddc7a8c75db897d269dc23b17ad11d
SHA512e454b2bb8ee2bf1355613afdf8389076fae5ffb8305ca2748cb05b597b54f039647e9aced03946dd6c0057305de80ca69db09cb2e539c6645fb2da6abf12ea7b
-
Filesize
633KB
MD5b12eeb9727a60b56053ddc1ead526d9b
SHA19cb4a8c1a853be3ded1e0b2d6617f87d12ff84b1
SHA25699ee0b9aa9fe09d2b819661d6fdca067ad9ff61b254e6c56b87790022fe09e75
SHA512019282606d38f72afa7b2531c4c48021d5ec00b52f7af5cd2aaa1be6ed4f6d785cf3256f154ff56c279be97104c4d994c0b2acf90ff4a7ce2a3be9386dd05851
-
Filesize
1.1MB
MD518418707a60aee71200bc4531abde4ae
SHA1c27d61ddd45cc7a960da8fee862ce5f1359cefbf
SHA256a11239322f4246cba1edfefb76f067f31a309ae683eacb91148d6576628005f4
SHA5120c4b4453849ff0c778a4ff284e5c36104b7b229f4b5c349f276d8881e33e424b487942c31d078c148f64ed180c5695b3053851991d98069aa01ab94d905454ca
-
Filesize
1.3MB
MD5b23a48334a4616d0511fa83c0d5ccaa4
SHA118aefcb6e2a811ccde9262ef848f05c74e73a23b
SHA2565dbabe417a91e95453de6d899a2a6871b82b957ae168d1d4e3ef39102e3eb473
SHA51235a5a18e35ac5e47edaea9286adfd8151c2f9ea39ca6107779640b3723baa6f267356c85e9cc4b7677a8495dc17f34de1d566af1e7b0170c9af08764753aaf9a
-
Filesize
512KB
MD5656a9924edeb5836d3d0536e15cb4b81
SHA1175c83722e5bcf070a6692d21f38e4cbea60c52c
SHA25604e1b990b4172c2c288bcf559b8f59f74d8c818708acb9faf3b375608eae1dfc
SHA5121deda23d55e8b73bed92896895f5cf0ce73d539795b5ac9720343eefb887550d9fede6c3824ecc451d33ce58508baea40e91e1424f2dc212d377f5fac6906882
-
Filesize
1KB
MD5fbf11c65bd839cf80fc0d2fd9b2ae19c
SHA1820c5cde78199b53c85758a1de1f42e92dbb853e
SHA25627dc1a433c3457ea2920f340de7662b7ea0f1fa066b0d63377d7d5fa919ceb98
SHA5122d631555d01b7104539a7dd4c50fdcc9d3955fb2f57ae848e639050f990406a7148922c5129160d2d0c18e885c6e392437b845b6398b816afea51ebc7fbdd01a
-
Filesize
1KB
MD50458eaf2fc13c745121436de121e743b
SHA19787955d5f8a3f923ac621492bcac9ca178fc3d1
SHA2563b0933f37b5d665b3d386bf661813b9efa6f018dfebdd9203c10c13f4c68535b
SHA512441e57898fe9cb7ca9488f1f34e2c2bfd0033867cce3a666389e0ae4866cef24644cb2f7b03676b89405ee8ea6d502d5d2c51265bc153867fc222766d8ca2134
-
Filesize
280B
MD5e97ecbc504a200d827e393f091618ab6
SHA1af7464a932636c35bf186bf0fcc25e495306c5ec
SHA256a7c326e7e278eb9ef79d5b13ab92d6a5be2ca10576caa66d60ddaae2e07445c3
SHA51249f45b0493fa1a007d45fd46fb237207090c4441277412ff13f92e55b22641ba00be5956448ea69f5a5449a28b531f960b6b38efc0df5494bbb6011b09622c09
-
Filesize
10.4MB
MD551d08822297acc498469637649868ea7
SHA1d9aacf4ca26a52849a68c30ab0b817808f23369b
SHA2561939c3ee70f5949ec8a36c80f508970e8060f746cb7d2f564867d2799e12a7dd
SHA51248f9822a3714f26ca755a3ad3be9c35d66127cf777a4bee0104477d15080689f43a35baf67d47ab500e1b5a3a6803af2714ed4d6816204b02d25d95255608bfd
-
Filesize
829KB
MD57c3b449f661d99a9b1033a14033d2987
SHA16c8c572e736bc53d1b5a608d3d9f697b1bb261da
SHA256ae996edb9b050677c4f82d56092efdc75f0addc97a14e2c46753e2db3f6bd732
SHA512a58783f50176e97284861860628cc930a613168be70411fabafbe6970dcccb8698a6d033cfc94edf415093e51f3d6a4b1ee0f38cc81254bdccb7edfa2e4db4f8
-
Filesize
707KB
MD59b2e4fb9cef81cefee7399aab61f682a
SHA1ebb073f7a268353ce727edff32213400cfc8ce71
SHA256320fb8ef840dafd6d037282d6fa440f679fe7463d78c45555fc011365c7eff2b
SHA51251b335a55678c13bcaf18ade063d201ade58ebc323e4e07ee20ad1b4bc6fcc40a6af62a42647d410ea4c683acb6a395741372d2027c99dc7bddd086614e1a70a
-
Filesize
28KB
MD581519be1781de7e074a96867b286b84d
SHA1bcb60d5fc395d0da8ee85237168a17d062d385bf
SHA256ff57d7154d8b056d1de15614fa07ec46bef2221af6c80c0e9e9f6f06f9ba469a
SHA512d0c7b79d60b1c810d9f7690439a0c010da768f34a097cc53eca2ff97d1c36b57476a82826d7b27f99bcb7a4edd2ff98b62ab88f1e276ddc46105eb704717ef0c
-
Filesize
34KB
MD5636e6a4b4adee190e70b874b13a249b4
SHA106c6ccabe67f025964ba56d8d1c3eb36331c10dc
SHA2569b3112e50da6f5f9d424ce94666777a8b8b58f3e6159deeba58dc4387fe88eba
SHA512347f38accb10769b82103412b18ab7dcdbe2653e9ebc0dadd92daffeba1e0607c1ab0a5553f85b5356546f655199123fded4532dfaeb2a0b6af8eee9bbd27776
-
Filesize
24KB
MD5101fb5d16f1390fb67ada1e4e4645ea7
SHA15d8c875609a70353543cc2506e8bc104f0238cd2
SHA256bbd77a5d6d0d74f9a40880893048b5dd52fe7e7a7f666a50b23bc7d23ca52c21
SHA51201a88907331ca2fdd6cf3483dcdc4b2c4a1595668c561d88cf08da2ada336c6d5db0445536761f84824bf8dce4cb607cf9e3130e1050a61c02ab14a648e05627
-
Filesize
56KB
MD59ab666120c65ad27426995b1af297a48
SHA15995af88672c1994efbe59f545d2aad6252df1bd
SHA256eb1d0f2daa1f8e4a8f0f3c9c6fd281878e16ccf4f9d5c2bb00626281e40dc205
SHA512085245871e99906630b5044044cf92b1e643eba6aba57fe3a5e64b0b156389701e95efe5e39c0e566064381a72b8b8f42d52b8c37ba9b17f7b733e4a76662b01
-
Filesize
25KB
MD586310b3969b173393cba9f5691ef4be0
SHA19ca88228c52f827dd22c2b326e434a6d30ab4090
SHA256f36f99d6a9363d68569c3d4d5d8adfe2adb9c7d971efaca7d85de6b34554bee1
SHA5129bf2e122cbb0d348a0d653570392ce614c3a135256c885b3f304fc3e8badf8598047c62d3954cca1b7de02c6041e055a3dcf36c41f4cf7a8a18dec0f19f1277c
-
Filesize
601B
MD5e52f73d520c7751bbe46ef28ffbbf05c
SHA143f676a2e44178f0fcd618f09cbcef2071ed686e
SHA25679fed1056f270b628c3ae02f569cfae28dc4e4fcef847b81435e8278a912cc71
SHA5123baf34faca6814a4cc80673917660ea52ff34603d2bba0550d4bc62881e765ebbcc1969e599c1601b18f27eefdbbb37bef497e91548b6ecbfdd37ff34fc4ca0f
-
Filesize
616B
MD5373cd25ef8b1b01a13121d92855680d8
SHA14d94d4ce9f09ac5ce5e15ef95d067b6508aa70e0
SHA25661cd3d1b458f7d7012504bfb237a969b9cc08ec03bfcae801aa4ff9b8a806f78
SHA5122d5dfb93feceef016d670b94e06a7510df727091fbbe8416cc2551a66a2ed8f5eab80a270465d64003e930376965eb8224102373c97bf5971761db35ebe607c4
-
Filesize
259KB
MD5a71e41ad46a251d27df41b0cdae0e0da
SHA104e16855c997e25acab07092487590fb44176750
SHA25673fa89177adee0ad06ed89646f659914b702d4894b34ea198571f8e1ab55ec1d
SHA5128cec5a0ef770c9bed13abec23bea5804ae21bc6c7fe5974719e6f1cc96c1a6fd62b9e1c46eeda2e8c49dea6743fffc5651587f25b32cca14d2e712feec43eb35
-
Filesize
128KB
MD51ebc6771762f78019131c13039e82932
SHA137c57dbdce9530f5e1f230c211bee78a6c1a9927
SHA2561efa623b990d8505f01d4afd67b7e1e5bdecc03420b730cd3c85cd4a84bdf001
SHA512069b9ed6427951383b86aab3ed0de05d102b2a6e30afb18bc875b59efd2f9d44cd85109d6c316c01c25d92f454385cc67cc6b1e48d5e79c2ee387951d81486f0
-
Filesize
356KB
MD5c3c4f3fe90e3b3b02bea0e8da3447ed2
SHA17ac0f54119d2273a2cd261f1fe6c5667e9c486df
SHA2563524ec77985e390acf9d07d81b1b44305165d711bbca770f7458ea0a78751f82
SHA5120e24c9394c635a3f1671a297f97b613e6936cd8f862a214125d3456324a18668ae138d5c4fde036f55e2b13b158e4cebc53f78153862a008b1ae747eab228a60
-
Filesize
59KB
MD5f62dd6ce51e19349ec1d1f2e88c4ef4d
SHA160bd29538b4fecaf527ba8b7d92b7f32d2e72ddb
SHA256be88244da9faaa6636a9d2f4c4249c08066a0b48359690b9b27a2b9ed47e093d
SHA512ba68a59427ec252b895e1c3d6879e0c7a010893d23b5a8687ce86d738faaec1367f73abbcf63fb8ce8b95d32afa3049cd59f22f0bc5a2ff2a3b123a54fe02012
-
Filesize
198KB
MD578b6849a39c4b2767f15f427adf6032c
SHA19b721d2fc6676381bf7a857412da97a40bc3d1bd
SHA25699c45f2615af1b1ca375528ce70d5d50f4f9a160a139a2c2b5a8685c51638465
SHA512a0377ca1138af2526ab14054d092584e2195df90c39f6275eab7f80fbf0639dd4318418dc18a7c0f495dc93d40882b2398d460c96eccc3b71f8fe10fa0ac491f
-
Filesize
513KB
MD55fbc6bd806a8a6c460faceeea73bd7f7
SHA14d1586a9631a72c3e1d75fb3c385dbd278804665
SHA2568033d1b3af84d47d275e022608da35baac16cf40d9607ca026a47b6cd65e6a97
SHA5124c51f9f331ac15206942e13504334b4c3549888519388607c44b617a68a9095114b0e6127e82b84170445df06260cc62308bc197b90cfb95af18d7cb6d413195
-
Filesize
235KB
MD551c675fc1ef0a62322052d3e86567c06
SHA1e295d0b668105d81f9180ef1056d0528e4b2116a
SHA256aaa3d7e589e9be1911eee5974afa68c64af1bbd5e039ff6a82a15c2b54c0f9f0
SHA512a352e82db5c930c73165a48337ae51acda7ebd393b8b0b57d03d2e1b5057c41c26b1f321759b7bc521166890853ecdad7b37531212243ad86e181e2252a3b78d
-
Filesize
18KB
MD56d2c718c3059ceaa7b90919e6725a09a
SHA1489967f8fe2b9021a891112754b840fe7dc71d13
SHA2562ca70bc6394ee1b299a8cf1fe28e95c7d68b765e1828db1b651a7a62acae5356
SHA51237547e9c6080d0dcb3ea23d9c856ce689997275b40d72bf9fd7c7c165e8cee4afe2ebe52e052c5f8bfc3e618391425219e9681191ee6f650444ebd643cb5a50d
-
Filesize
19KB
MD5a56543b9cd3aa403311b49189d25851e
SHA1bd2609d35d4a967fe23ef4092b1daa6f74a858ad
SHA256034756f772399552cd33605a189ee0e45d7947860e0d83ec12aa6da1a5a42054
SHA5122237f493d70799675ae0e395f551b6cd46ff4789e46e2453c48fede07b7623b4b8111904d6fa139c204eea4405b5fd5812b0a91f27374219b721339149c25edf
-
Filesize
96KB
MD59b299884420745d80c70bba6b8a7f05a
SHA1195423185a7776e072a65fbabae868c15f7b2f56
SHA2569426e96a97f41645fab524385a852687792f99b505554b6b9809ed99451b2399
SHA512ed839dc1b6ef53f3663b6055fb2869a522600b2af8d8a800958ddb531154f4e9a3f1733f32dff5511a22fe01525191c8683519cbdcedec138b1bcf3425f2155b
-
Filesize
179KB
MD579b690260195499e756cee3dbe0cb1e2
SHA12d1c8918c67ebd63136d71b6aa0217e4b63ffad6
SHA2563ed71920d5d23234f694bd2cd73ba3b477e2bd899bf695ca328ca66615271285
SHA5126246273e0d155f2820353fc376255ef2a51514ba062044ef6aa100a513cd2768b9e8841a6885180f0e4200e9d2947b29b2248d212dc39e32aea4906501c3ce6f
-
Filesize
53KB
MD52c8f6a964ca7761122f7da22042462f4
SHA1290e48bf0f83b3f3832f69bb1ea0637ed4d8ccca
SHA2569d6f2629aa5978dd6b87fe9bce77a5cf0135b8da2980a050579eb4e23a92f8fa
SHA51288c49dbc5a5cce28fc61689b953e091dc5114196a9ce5977de1bc1ea916333d73a13d06abb56b7afd88f6c4f80953a2b9b720cd79e773a1246d44b37eae4cbf8
-
Filesize
53KB
MD54640fd47f64bb72cb34dbafee65dbdde
SHA1508c8713e06ba55588d41918c5a99308cb4b37a0
SHA256f02c4352ea80e1b476eb4754455ae684efb4289d95edf925e38bd3789f6ead49
SHA512de2d05ea66ab37b7120cde8f4aeb79c6365430bd94f56b07019451e1329f8f3a2674af9ed6677b8ade59fa2185c6a48eaead47091edc8284e686260c69544a4c
-
Filesize
218KB
MD57190ecf05ec3b297d6ded3e204399e95
SHA15c085cbbbcc8686266acfb318e75a38794625e88
SHA25649e2c502923de5f89958de86f1cc6f91e7ddafe46d0f81bfb51a669627650e6e
SHA5124e12adcaaebdc08e06270437dd4ebf33c4aecd5b6cce7245bf12b0303c809465d75d5b319fb262a807cf9a5cb99d808e466fc30b19d88ddcf2b3f0b9c9f74881
-
Filesize
125KB
MD5053a60f34c75ca0a4a821b46eae86d31
SHA1ebcf9f84a393969655969c248c2d572d7a05541c
SHA256683f19a461948f4cca2fbece26949b34d6347dff279efece983b9f64a868422c
SHA512346c989ef320079b5978678264059ad9e545081dded233d10dca73a72906fa01df30a3c96f6d319efcea64c198ef409748e511dab8a4d43e1fa7af50ed3f0256
-
Filesize
819B
MD57c3cf64ccf4db3ac83e16a23e4eb3b10
SHA10ce03bb05771c8866fa32261f4e48446a4bdb33f
SHA256bbb6448d5cef00e6a6a5317a5abf3fd9cae9bb6751908900baf06445bc42bd5b
SHA512fec5a6001c60f8711f9c41fd6cc5dac5aba5cfc9f34d682bb43651dc5598991c51462d5c48ac900a24e12721855659ba343c2a0f1078c39470a0ed31ba8c186d
-
Filesize
115B
MD55c78f14f9915a2ce2c0cd7ec5010d1ae
SHA1e999de38e67515c9cd41cfdb54e216c4efc415ca
SHA256c7bc0bd1d332f9018a35d95b361d3e13253aa53e3c167672c0039a4d8ce5216c
SHA51204ee4d2d1e815b1fe6f8e245e77b8d7e76c9d96e18a584550b198ac50f7e361369f6b0f43d661b51dd9b8618e9e3454664a53ccef2a6c01591063332de07c5e6
-
Filesize
2KB
MD5a38cdc98001231339230574aeff0123d
SHA15e15bb7807f6ff02e4a0c69c7510eecc534039e4
SHA2568a45c9bcdc68e39512da04469d2bfb9c5d71d43eecbb8431be8ac056a6abd31c
SHA512147f2540181ef0067c9efa2bda582bba88ec1e41583460d00acd666d127db02798934f64844233b56f8fa7b4c209cd60dcda1be067bbb00a39644f4d71d516b3
-
Filesize
106B
MD5d2926859650503d8e62b0db8e6a2c18b
SHA1373fd2b988df44b574693e8781cdc1213360633c
SHA256aa8c150f29af2200de9ce0336c55bc5c76a64f5434d7f8da26c0cecebc573798
SHA51252040403587f9a0c7f2d5fb6f3de86f649276ad8f42a63eba45b87d58f69a2551191f2a8720d6364bf108638d5650400f782088ebeb2c0b665ebdf510761009e
-
Filesize
630B
MD57f4b4e211a4df311c4c353dc9c34d038
SHA15c46b580f5b37be9effcd76e9f4fa29a56f6dc1d
SHA256c276acfec8e0181a2ae35dff29c1b051091fba70e9aa1d076cc0a4429fc20a5a
SHA512a78600025a16e6a69b6b2861061fd2721fb68019dc5dcb7d8850fe4c6f0cfe353fe5d968fbb205cf6fad8ab9a0ab795f4170585ba01cffefe0d4cff01a80cc42
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
126KB
MD5d7bf29763354eda154aad637017b5483
SHA1dfa7d296bfeecde738ef4708aaabfebec6bc1e48
SHA2567f5f8fcfd84132579f07e395e65b44e1b031fe01a299bce0e3dd590131c5cb93
SHA5121c76175732fe68b9b12cb46077daa21e086041adbd65401717a9a1b5f3c516e03c35a90897c22c7281647d6af4a1a5ffb3fbd5706ea376d8f6e574d27396019c
-
Filesize
444KB
MD52b48f69517044d82e1ee675b1690c08b
SHA183ca22c8a8e9355d2b184c516e58b5400d8343e0
SHA256507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496
SHA51297d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b
-
Filesize
632KB
MD5562711caf0d942d286fd28d34ebf9fdf
SHA1001b037c732b497e390bd756901e64ce0d84d885
SHA2563556010aa72b67d16dc6b406aecf493185c92f38ad410924959175fd39192b61
SHA512447ea79c0fe30b5458d139d903bf738126c8159250a5b732ca9afdb7536be3ef5c81857852034fbdf385d9bbc43e1c77dc9618f7ad0b60ff3d9c526711c30060
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2