Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1799s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
RG_MagicBulletSuite2024_DownloadPirate.com.rar
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
RG_MagicBulletSuite2024_DownloadPirate.com.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
RG_MagicBulletSuite2024_DownloadPirate.com.rar
Resource
win11-20240508-en
General
-
Target
RG_MagicBulletSuite2024_DownloadPirate.com.rar
-
Size
345.5MB
-
MD5
e45c92d2eb2e59f831bf397fc31359bb
-
SHA1
0c6686f4a3e7b4bfef4714617f43abe55f3b5f96
-
SHA256
b68381bcb0c705ba6f55c673f208bc21f3543e3727227eacd2fcb16605df3b16
-
SHA512
cb8645d4e2c1018c0058a533d8c73e89f31cfd2877c130114ad07d8c96b01a5575b26ee924fad29c90849c08a42c3839460b02ad8c5e9ec3ce6a1af617d65c83
-
SSDEEP
6291456:oIprhvDR7sWM6abl5rHtbGaoOy8t+quy1ATOULjrosJJlNd4WRyltBlt2wLrZwM6:o03gl5rNbtob8tN2iWfJLd4WRyjBjpSr
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\126.0.2592.61\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Maxon_App_2024.0.0_Win.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Maxon_App_2024.0.0_Win.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 2968 Maxon_App_2024.0.0_Win.exe 884 Maxon App Installer.exe 392 Maxon_App_2024.0.0_Win.exe 1144 Maxon App Installer.exe 4804 Red Giant Service.exe 2312 VC_redist.x64.19.exe 2856 VC_redist.x64.19.exe 4384 MxNotify.exe 1752 mxredirect.exe 4396 MicrosoftEdgeWebview2Setup.exe 4360 MicrosoftEdgeUpdate.exe 4020 MicrosoftEdgeUpdate.exe 2524 MicrosoftEdgeUpdate.exe 4992 MicrosoftEdgeUpdateComRegisterShell64.exe 1916 MicrosoftEdgeUpdateComRegisterShell64.exe 4908 MicrosoftEdgeUpdateComRegisterShell64.exe 4800 MicrosoftEdgeUpdate.exe 2340 MicrosoftEdgeUpdate.exe 4776 MicrosoftEdgeUpdate.exe 5016 MicrosoftEdge_X64_126.0.2592.61.exe 4628 setup.exe 3332 setup.exe 4252 MicrosoftEdgeUpdate.exe 4516 Maxon.exe 1424 msedgewebview2.exe 2276 msedgewebview2.exe 2724 msedgewebview2.exe 2892 msedgewebview2.exe 1772 msedgewebview2.exe 1972 msedgewebview2.exe 5652 msedgewebview2.exe 5832 msedgewebview2.exe 3400 msedgewebview2.exe 5272 msedgewebview2.exe 5484 msedgewebview2.exe 5532 msedgewebview2.exe 5432 msedgewebview2.exe 5784 msedgewebview2.exe 5972 msedgewebview2.exe 6132 msedgewebview2.exe 5224 MicrosoftEdgeUpdate.exe 5352 MicrosoftEdgeUpdate.exe 3648 MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe 648 MicrosoftEdgeUpdate.exe 1316 MicrosoftEdgeUpdate.exe 4240 MicrosoftEdgeUpdate.exe 5604 MicrosoftEdgeUpdate.exe 728 MicrosoftEdgeUpdateComRegisterShell64.exe 3160 MicrosoftEdgeUpdateComRegisterShell64.exe 1880 MicrosoftEdgeUpdateComRegisterShell64.exe 5660 MicrosoftEdgeUpdate.exe 1996 MicrosoftEdgeUpdate.exe 1924 MicrosoftEdgeUpdate.exe 2008 MicrosoftEdgeUpdate.exe 1256 BGAUpdate.exe 1456 MicrosoftEdgeUpdate.exe 4084 MicrosoftEdgeUpdate.exe 3680 MicrosoftEdge_X64_126.0.2592.61.exe 5456 setup.exe 4292 setup.exe 3160 setup.exe 4508 setup.exe 3220 setup.exe 3760 setup.exe -
Loads dropped DLL 64 IoCs
pid Process 2856 VC_redist.x64.19.exe 4360 MicrosoftEdgeUpdate.exe 4020 MicrosoftEdgeUpdate.exe 2524 MicrosoftEdgeUpdate.exe 4992 MicrosoftEdgeUpdateComRegisterShell64.exe 2524 MicrosoftEdgeUpdate.exe 1916 MicrosoftEdgeUpdateComRegisterShell64.exe 2524 MicrosoftEdgeUpdate.exe 4908 MicrosoftEdgeUpdateComRegisterShell64.exe 2524 MicrosoftEdgeUpdate.exe 4800 MicrosoftEdgeUpdate.exe 2340 MicrosoftEdgeUpdate.exe 4776 MicrosoftEdgeUpdate.exe 4776 MicrosoftEdgeUpdate.exe 2340 MicrosoftEdgeUpdate.exe 4252 MicrosoftEdgeUpdate.exe 4516 Maxon.exe 1424 msedgewebview2.exe 2276 msedgewebview2.exe 1424 msedgewebview2.exe 1424 msedgewebview2.exe 1424 msedgewebview2.exe 2724 msedgewebview2.exe 2892 msedgewebview2.exe 2724 msedgewebview2.exe 1772 msedgewebview2.exe 1772 msedgewebview2.exe 1972 msedgewebview2.exe 2892 msedgewebview2.exe 2724 msedgewebview2.exe 2724 msedgewebview2.exe 2724 msedgewebview2.exe 1972 msedgewebview2.exe 2724 msedgewebview2.exe 1972 msedgewebview2.exe 1424 msedgewebview2.exe 5652 msedgewebview2.exe 5652 msedgewebview2.exe 5832 msedgewebview2.exe 5832 msedgewebview2.exe 3400 msedgewebview2.exe 3400 msedgewebview2.exe 5272 msedgewebview2.exe 5272 msedgewebview2.exe 5484 msedgewebview2.exe 5484 msedgewebview2.exe 5532 msedgewebview2.exe 5532 msedgewebview2.exe 5532 msedgewebview2.exe 5432 msedgewebview2.exe 5432 msedgewebview2.exe 5784 msedgewebview2.exe 5784 msedgewebview2.exe 5972 msedgewebview2.exe 5972 msedgewebview2.exe 6132 msedgewebview2.exe 6132 msedgewebview2.exe 5224 MicrosoftEdgeUpdate.exe 5352 MicrosoftEdgeUpdate.exe 5352 MicrosoftEdgeUpdate.exe 5224 MicrosoftEdgeUpdate.exe 648 MicrosoftEdgeUpdate.exe 1316 MicrosoftEdgeUpdate.exe 4240 MicrosoftEdgeUpdate.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 1280 icacls.exe 1972 icacls.exe 1264 icacls.exe 4188 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\!BCILauncher = "\"C:\\Windows\\Temp\\MUBSTemp\\BCILauncher.EXE\" bgaupmi=B776A061BE124139B5B00FBDC38C3F16" BGAUpdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Maxon.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe -
Checks system information in the registry 2 TTPs 30 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\new_edge_proxy.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\VisualElements\LogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\Locales\gd.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\msedge_proxy.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Trust Protection Lists\Mu\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\kn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Trust Protection Lists\Sigma\Advertising setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1424_1125772444\Part-RU msedgewebview2.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\sr-Cyrl-BA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Locales\en-US.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C47DDB1D-B4EA-46BB-BC5A-0CA129EF776C}\EDGEMITMP_62D66.tmp\SETUP.EX_ MicrosoftEdge_X64_126.0.2592.61.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Trust Protection Lists\Sigma\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\et.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\Edge.dat setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUDD48.tmp\msedgeupdateres_fa.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUDD48.tmp\msedgeupdateres_ko.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUDD48.tmp\msedgeupdateres_nn.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\new_msedge.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\sv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\VisualElements\SmallLogoCanary.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\msedgewebview2.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Trust Protection Lists\Sigma\Cryptomining setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\BHO\ie_to_edge_bho_64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\elevation_service.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\msedge.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\Trust Protection Lists\Mu\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{1FAB8CFE-9860-415C-A6CA-AA7D12021940}\2.0.0.34\BGAUpdate.exe MicrosoftEdgeUpdate.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Locales\kn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\es.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\id.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE493.tmp\msedgeupdateres_fr-CA.dll MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\d3dcompiler_47.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\v8_context_snapshot.bin setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Trust Protection Lists\Mu\Analytics setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE493.tmp\msedgeupdateres_cs.dll MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Trust Protection Lists\Sigma\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Trust Protection Lists\Sigma\Social setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\identity_proxy\resources.pri setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\ja.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\ja.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\identity_proxy\resources.pri setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\Trust Protection Lists\Mu\CompatExceptions setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\zh-TW.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Locales\fil.pak setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files\Red Giant\Services\rguninstaller.exe Maxon App Installer.exe File created C:\Program Files (x86)\Microsoft\Temp\EUDD48.tmp\msedgeupdateres_ms.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1424_1403892426\Mu\CompatExceptions msedgewebview2.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1424_462929605\hyph-tk.hyb msedgewebview2.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE493.tmp\psmachine_64.dll MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\EdgeWebView.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Locales\ca-Es-VALENCIA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\Locales\tr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\identity_proxy\win11\identity_helper.Sparse.Canary.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.61\Locales\tt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\resources.pak setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1424_462929605\hyph-de-ch-1901.hyb msedgewebview2.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1424_462929605\hyph-sl.hyb msedgewebview2.exe File created C:\Program Files (x86)\Microsoft\Temp\EUDD48.tmp\msedgeupdateres_th.dll MicrosoftEdgeWebview2Setup.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_CAA532138B61DC2CC0B97EB03AD4C79C Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_CAA532138B61DC2CC0B97EB03AD4C79C Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUrlCache Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 Red Giant Service.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 Red Giant Service.exe -
Launches sc.exe 12 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3680 sc.exe 3500 sc.exe 744 sc.exe 3680 sc.exe 4776 sc.exe 4236 sc.exe 4892 sc.exe 2528 sc.exe 3280 sc.exe 3084 sc.exe 1828 sc.exe 116 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 11 IoCs
pid Process 2552 timeout.exe 2236 timeout.exe 1596 timeout.exe 4988 timeout.exe 5064 timeout.exe 4240 timeout.exe 3104 timeout.exe 4988 timeout.exe 4392 timeout.exe 1812 timeout.exe 2168 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Kills process with taskkill 1 IoCs
pid Process 4924 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\126.0.2592.61\\BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\126.0.2592.61\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\SystemCertificates\CA Red Giant Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs Red Giant Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs Red Giant Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Red Giant Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates Red Giant Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Red Giant Service.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Red Giant Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\SystemCertificates\trust Red Giant Service.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs Red Giant Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs Red Giant Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates Red Giant Service.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs Red Giant Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\SystemCertificates\trust Red Giant Service.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LocalServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ = "IAppCommand2" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings cmd.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ProxyStubClsid32\ = "{0DD41A78-E3D4-44A8-9EAE-697BCF1781A3}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ = "IApp2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback\CLSID\ = "{E421557C-0628-43FB-BF2B-7C9F8A4D067C}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService.1.0\CLSID\ = "{CECDDD22-2E72-4832-9606-A9B0E5E344B2}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ = "IPolicyStatus5" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{82CCB536-D2EE-4F19-9067-40531F08D1D4}\InprocHandler32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{0DD41A78-E3D4-44A8-9EAE-697BCF1781A3}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\APPID\MICROSOFTEDGEUPDATE.EXE MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ = "ICredentialDialog" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32\ = "{0DD41A78-E3D4-44A8-9EAE-697BCF1781A3}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ = "IProcessLauncher" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ = "IAppVersion" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\mxapp\URL Protocol = "\"\"" Maxon App Installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc\CLSID\ = "{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ = "IGoogleUpdateCore" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\Elevation MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\DisplayName = "PDF Preview Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods\ = "12" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ = "IProcessLauncher" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 884 Maxon App Installer.exe 884 Maxon App Installer.exe 884 Maxon App Installer.exe 884 Maxon App Installer.exe 884 Maxon App Installer.exe 884 Maxon App Installer.exe 884 Maxon App Installer.exe 884 Maxon App Installer.exe 4360 MicrosoftEdgeUpdate.exe 4360 MicrosoftEdgeUpdate.exe 1752 mxredirect.exe 1752 mxredirect.exe 4360 MicrosoftEdgeUpdate.exe 4360 MicrosoftEdgeUpdate.exe 4360 MicrosoftEdgeUpdate.exe 4360 MicrosoftEdgeUpdate.exe 4252 MicrosoftEdgeUpdate.exe 4252 MicrosoftEdgeUpdate.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 5532 msedgewebview2.exe 5532 msedgewebview2.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 5224 MicrosoftEdgeUpdate.exe 5224 MicrosoftEdgeUpdate.exe 5352 MicrosoftEdgeUpdate.exe 5352 MicrosoftEdgeUpdate.exe 5224 MicrosoftEdgeUpdate.exe 5224 MicrosoftEdgeUpdate.exe 648 MicrosoftEdgeUpdate.exe 648 MicrosoftEdgeUpdate.exe 1316 MicrosoftEdgeUpdate.exe 1316 MicrosoftEdgeUpdate.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1996 MicrosoftEdgeUpdate.exe 1996 MicrosoftEdgeUpdate.exe 1996 MicrosoftEdgeUpdate.exe 1996 MicrosoftEdgeUpdate.exe 1752 mxredirect.exe 1752 mxredirect.exe 4084 MicrosoftEdgeUpdate.exe 4084 MicrosoftEdgeUpdate.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe 1752 mxredirect.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 1424 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeRestorePrivilege 5008 7zFM.exe Token: 35 5008 7zFM.exe Token: SeSecurityPrivilege 5008 7zFM.exe Token: SeDebugPrivilege 4924 taskkill.exe Token: SeDebugPrivilege 4360 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4360 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4252 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 5224 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 5352 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 5224 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 648 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1316 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1996 MicrosoftEdgeUpdate.exe Token: 33 5456 setup.exe Token: SeIncBasePriorityPrivilege 5456 setup.exe Token: SeDebugPrivilege 4084 MicrosoftEdgeUpdate.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5008 7zFM.exe 5008 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1972 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 884 2968 Maxon_App_2024.0.0_Win.exe 112 PID 2968 wrote to memory of 884 2968 Maxon_App_2024.0.0_Win.exe 112 PID 392 wrote to memory of 1144 392 Maxon_App_2024.0.0_Win.exe 114 PID 392 wrote to memory of 1144 392 Maxon_App_2024.0.0_Win.exe 114 PID 884 wrote to memory of 3360 884 Maxon App Installer.exe 115 PID 884 wrote to memory of 3360 884 Maxon App Installer.exe 115 PID 3360 wrote to memory of 1972 3360 cmd.exe 117 PID 3360 wrote to memory of 1972 3360 cmd.exe 117 PID 3360 wrote to memory of 1264 3360 cmd.exe 118 PID 3360 wrote to memory of 1264 3360 cmd.exe 118 PID 3360 wrote to memory of 744 3360 cmd.exe 119 PID 3360 wrote to memory of 744 3360 cmd.exe 119 PID 3360 wrote to memory of 3104 3360 cmd.exe 120 PID 3360 wrote to memory of 3104 3360 cmd.exe 120 PID 3360 wrote to memory of 3680 3360 cmd.exe 121 PID 3360 wrote to memory of 3680 3360 cmd.exe 121 PID 3360 wrote to memory of 2552 3360 cmd.exe 122 PID 3360 wrote to memory of 2552 3360 cmd.exe 122 PID 3360 wrote to memory of 4776 3360 cmd.exe 123 PID 3360 wrote to memory of 4776 3360 cmd.exe 123 PID 3360 wrote to memory of 2236 3360 cmd.exe 124 PID 3360 wrote to memory of 2236 3360 cmd.exe 124 PID 3360 wrote to memory of 4236 3360 cmd.exe 125 PID 3360 wrote to memory of 4236 3360 cmd.exe 125 PID 3360 wrote to memory of 4988 3360 cmd.exe 126 PID 3360 wrote to memory of 4988 3360 cmd.exe 126 PID 3360 wrote to memory of 4892 3360 cmd.exe 127 PID 3360 wrote to memory of 4892 3360 cmd.exe 127 PID 3360 wrote to memory of 1596 3360 cmd.exe 128 PID 3360 wrote to memory of 1596 3360 cmd.exe 128 PID 3360 wrote to memory of 2528 3360 cmd.exe 129 PID 3360 wrote to memory of 2528 3360 cmd.exe 129 PID 3360 wrote to memory of 4392 3360 cmd.exe 131 PID 3360 wrote to memory of 4392 3360 cmd.exe 131 PID 884 wrote to memory of 1724 884 Maxon App Installer.exe 133 PID 884 wrote to memory of 1724 884 Maxon App Installer.exe 133 PID 1724 wrote to memory of 4188 1724 cmd.exe 135 PID 1724 wrote to memory of 4188 1724 cmd.exe 135 PID 884 wrote to memory of 4568 884 Maxon App Installer.exe 136 PID 884 wrote to memory of 4568 884 Maxon App Installer.exe 136 PID 4568 wrote to memory of 2312 4568 cmd.exe 138 PID 4568 wrote to memory of 2312 4568 cmd.exe 138 PID 4568 wrote to memory of 2312 4568 cmd.exe 138 PID 2312 wrote to memory of 2856 2312 VC_redist.x64.19.exe 139 PID 2312 wrote to memory of 2856 2312 VC_redist.x64.19.exe 139 PID 2312 wrote to memory of 2856 2312 VC_redist.x64.19.exe 139 PID 884 wrote to memory of 4520 884 Maxon App Installer.exe 140 PID 884 wrote to memory of 4520 884 Maxon App Installer.exe 140 PID 4520 wrote to memory of 4924 4520 cmd.exe 142 PID 4520 wrote to memory of 4924 4520 cmd.exe 142 PID 4520 wrote to memory of 2452 4520 cmd.exe 143 PID 4520 wrote to memory of 2452 4520 cmd.exe 143 PID 1360 wrote to memory of 4384 1360 explorer.exe 145 PID 1360 wrote to memory of 4384 1360 explorer.exe 145 PID 884 wrote to memory of 4632 884 Maxon App Installer.exe 147 PID 884 wrote to memory of 4632 884 Maxon App Installer.exe 147 PID 4632 wrote to memory of 1280 4632 cmd.exe 149 PID 4632 wrote to memory of 1280 4632 cmd.exe 149 PID 4632 wrote to memory of 3084 4632 cmd.exe 150 PID 4632 wrote to memory of 3084 4632 cmd.exe 150 PID 4632 wrote to memory of 1812 4632 cmd.exe 151 PID 4632 wrote to memory of 1812 4632 cmd.exe 151 PID 4632 wrote to memory of 1828 4632 cmd.exe 152 PID 4632 wrote to memory of 1828 4632 cmd.exe 152 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RG_MagicBulletSuite2024_DownloadPirate.com.rar1⤵
- Modifies registry class
PID:228
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1972
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4884
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RG_MagicBulletSuite2024_DownloadPirate.com.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5008
-
C:\Users\Admin\Desktop\Red Giant Magic Bullet Suite 2024.0\Maxon_App_2024.0.0_Win.exe"C:\Users\Admin\Desktop\Red Giant Magic Bullet Suite 2024.0\Maxon_App_2024.0.0_Win.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\7zS89B22DF9\Maxon App Installer.exe"C:\Users\Admin\AppData\Local\Temp\7zS89B22DF9\Maxon App Installer.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1c370b8c-c150-4367-a0cb-0a30ea8671a4\postflight\fuse-windows-postflight.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Red Giant" /t /grant *S-1-1-0:(OI)(CI)F4⤵
- Modifies file permissions
PID:1972
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Maxon" /t /grant *S-1-1-0:(OI)(CI)F4⤵
- Modifies file permissions
PID:1264
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" stop "Red Giant Service"4⤵
- Launches sc.exe
PID:744
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:3104
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" delete "Red Giant Service"4⤵
- Launches sc.exe
PID:3680
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:2552
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" create "Red Giant Service" binpath= "\"C:\Program Files\Red Giant\Services\Red Giant Service.exe\"" start= auto obj= "NT AUTHORITY\Localservice"4⤵
- Launches sc.exe
PID:4776
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:2236
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" description "Red Giant Service" "Provides common services to Maxon products."4⤵
- Launches sc.exe
PID:4236
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:4988
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" failure "Red Giant Service" reset= 0 actions= restart/600004⤵
- Launches sc.exe
PID:4892
-
-
C:\Windows\system32\timeout.exetimeout /T 5 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:1596
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" start "Red Giant Service"4⤵
- Launches sc.exe
PID:2528
-
-
C:\Windows\system32\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:4392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1c370b8c-c150-4367-a0cb-0a30ea8671a4\preflight\fuse-windows-setup-preflight.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Maxon" /t /grant *S-1-1-0:(OI)(CI)F4⤵
- Modifies file permissions
PID:4188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp266c4ba1-7f5d-4954-8e84-16d5303e7a12\postflight\vcredist-postflight.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\tmp266c4ba1-7f5d-4954-8e84-16d5303e7a12\files\VC_redist.x64.19.exe"C:\Users\Admin\AppData\Local\Temp\tmp266c4ba1-7f5d-4954-8e84-16d5303e7a12\postflight\..\files\VC_redist.x64.19.exe" /quiet /norestart4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Temp\{D27D9870-4C3C-403F-B641-68C404133D02}\.cr\VC_redist.x64.19.exe"C:\Windows\Temp\{D27D9870-4C3C-403F-B641-68C404133D02}\.cr\VC_redist.x64.19.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\tmp266c4ba1-7f5d-4954-8e84-16d5303e7a12\files\VC_redist.x64.19.exe" -burn.filehandle.attached=572 -burn.filehandle.self=580 /quiet /norestart5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpd5a916f8-79cc-42ed-9f60-b80a8ae59c36\postflight\mxnotify-windows-postflight.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\system32\taskkill.exetaskkill /F /IM MxNotify.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\explorer.exeexplorer.exe "C:\Program Files\Maxon\Tools\MxNotify.exe"4⤵PID:2452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4e65565a-6097-4411-ad71-143936dc80b9\postflight\mxredirect-windows-postflight.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Maxon" /t /grant *S-1-1-0:(OI)(CI)F4⤵
- Modifies file permissions
PID:1280
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" stop "mxredirect"4⤵
- Launches sc.exe
PID:3084
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:1812
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" delete "mxredirect"4⤵
- Launches sc.exe
PID:1828
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:2168
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" create "mxredirect" binpath= "C:\Program Files\Maxon\Tools\mxredirect.exe" start= auto4⤵
- Launches sc.exe
PID:3680
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:4988
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" description "mxredirect" "Manages scheme ownership for Maxon products."4⤵
- Launches sc.exe
PID:116
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:5064
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" failure "mxredirect" reset= 0 actions= restart/600004⤵
- Launches sc.exe
PID:3500
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:4240
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" start "mxredirect"4⤵
- Launches sc.exe
PID:3280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpe1ffa55b-69b7-428a-93ba-af5243fd8a8a\bin\install-mswebview.bat""3⤵PID:3472
-
C:\Program Files\Maxon\Tools\MicrosoftEdgeWebview2Setup.exe"C:\Program Files\Maxon\Tools\MicrosoftEdgeWebview2Setup.exe" /install4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4396 -
C:\Program Files (x86)\Microsoft\Temp\EUDD48.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUDD48.tmp\MicrosoftEdgeUpdate.exe" /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true"5⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4020
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2524 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4992
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1916
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4908
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNDUuNDkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTIxQjQ5RkYtOTczNi00NEQ5LUIwNzQtRjczOTE1M0JEM0Y2fSIgdXNlcmlkPSJ7NkVEODFDNDktQThBMi00QzRELTgxNUYtMUI4OUFERDhDMTA3fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins0QkYzRDUxRi02MENCLTQwREItQjVGMi1CMERGODZERjUyQkR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0R4T2JqSEdhK25SYTJhdEMzd28rSUVwQzc4K1pZZUFVYmtYcERDMmNqN1U9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xODcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTQ1LjQ5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBpbnN0YWxsX3RpbWVfbXM9IjQ1MyIvPjwvYXBwPjwvcmVxdWVzdD46⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:4800
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true" /installsource otherinstallcmd /sessionid "{121B49FF-9736-44D9-B074-F739153BD3F6}"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2340
-
-
-
-
-
C:\Windows\explorer.exeexplorer.exe "C:\Program Files\Maxon\App Manager\Maxon.exe"3⤵PID:2428
-
-
-
C:\Users\Admin\Desktop\Red Giant Magic Bullet Suite 2024.0\Maxon_App_2024.0.0_Win.exe"C:\Users\Admin\Desktop\Red Giant Magic Bullet Suite 2024.0\Maxon_App_2024.0.0_Win.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\7zS881BA4DB\Maxon App Installer.exe"C:\Users\Admin\AppData\Local\Temp\7zS881BA4DB\Maxon App Installer.exe"2⤵
- Executes dropped EXE
PID:1144
-
-
C:\Program Files\Red Giant\Services\Red Giant Service.exe"C:\Program Files\Red Giant\Services\Red Giant Service.exe"1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:4804
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\Maxon\Tools\MxNotify.exe"C:\Program Files\Maxon\Tools\MxNotify.exe"2⤵
- Executes dropped EXE
PID:4384
-
-
C:\Program Files\Maxon\Tools\mxredirect.exe"C:\Program Files\Maxon\Tools\mxredirect.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
PID:4776 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C47DDB1D-B4EA-46BB-BC5A-0CA129EF776C}\MicrosoftEdge_X64_126.0.2592.61.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C47DDB1D-B4EA-46BB-BC5A-0CA129EF776C}\MicrosoftEdge_X64_126.0.2592.61.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5016 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C47DDB1D-B4EA-46BB-BC5A-0CA129EF776C}\EDGEMITMP_62D66.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C47DDB1D-B4EA-46BB-BC5A-0CA129EF776C}\EDGEMITMP_62D66.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C47DDB1D-B4EA-46BB-BC5A-0CA129EF776C}\MicrosoftEdge_X64_126.0.2592.61.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4628 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C47DDB1D-B4EA-46BB-BC5A-0CA129EF776C}\EDGEMITMP_62D66.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C47DDB1D-B4EA-46BB-BC5A-0CA129EF776C}\EDGEMITMP_62D66.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.62 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C47DDB1D-B4EA-46BB-BC5A-0CA129EF776C}\EDGEMITMP_62D66.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.61 --initial-client-data=0x128,0x124,0x120,0x100,0x11c,0x7ff6b253aa40,0x7ff6b253aa4c,0x7ff6b253aa584⤵
- Executes dropped EXE
PID:3332
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNDUuNDkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTIxQjQ5RkYtOTczNi00NEQ5LUIwNzQtRjczOTE1M0JEM0Y2fSIgdXNlcmlkPSJ7NkVEODFDNDktQThBMi00QzRELTgxNUYtMUI4OUFERDhDMTA3fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins1RkVGMjlFNi1FMzZELTQ1RUYtOTMwMi1EOTU0M0MyM0I4QTN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEyNi4wLjI1OTIuNjEiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuZi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy83MTM2OWRmNC05ZTlmLTRhMWItOWFmOC05YThiNWFhNDU0OGQ_UDE9MTcxOTUwMjU4MyZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1QRHJ4Rm1zVHJkMDdQOVpab2ZrSWRFZ3I5RXJxdVhMNHhYYjRWWEVpbkxOaTBDZk8lMmZvaFBpeTFUSmFKQU9yQkZxUDZUTm5FUDhvTGc5TVNMUDFkTHNRJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBkb3dubG9hZGVkPSIxNzI5MDc0ODAiIHRvdGFsPSIxNzI5MDc0ODAiIGRvd25sb2FkX3RpbWVfbXM9IjE3MjgxIi8-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc291cmNlX3VybF9pbmRleD0iMCIvPjxldmVudCBldmVudHR5cGU9IjYiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIxOTY3NTciIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSI3NTAiIGRvd25sb2FkX3RpbWVfbXM9IjIzMzQ0IiBkb3dubG9hZGVkPSIxNzI5MDc0ODAiIHRvdGFsPSIxNzI5MDc0ODAiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjQyNTQ3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2168
-
C:\Program Files\Maxon\App Manager\Maxon.exe"C:\Program Files\Maxon\App Manager\Maxon.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4516 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=4516.3976.7618241871502329503⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Program Files directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:1424 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.62 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.61 --initial-client-data=0x178,0x17c,0x180,0x154,0x188,0x7ffb40320148,0x7ffb40320154,0x7ffb403201604⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=1824 /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2724
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1876,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=1824 /prefetch:34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2024,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=2284 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3620,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=3644 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1972
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=4004,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4852 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5652
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=4824,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5832
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2128,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=2144 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3400
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=4980,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4392 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5272
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=5004,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=5000 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5484
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5088,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4708 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5532
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=5068,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=5000 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5432
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=4668,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5784
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=5000,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4800 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5972
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.61\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView" --webview-exe-name=Maxon.exe --webview-exe-version=2024.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=5028,i,8512872196014732693,10842601666162166046,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4528 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6132
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3956,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=3708 /prefetch:81⤵PID:5392
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5224
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5352 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3000F8AA-08D6-4447-AE92-73EE94122DDF}\MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3000F8AA-08D6-4447-AE92-73EE94122DDF}\MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe" /update /sessionid "{C87B32E4-0E72-4803-B73A-8F332AF6F060}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3648 -
C:\Program Files (x86)\Microsoft\Temp\EUE493.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUE493.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{C87B32E4-0E72-4803-B73A-8F332AF6F060}"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4240
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Modifies registry class
PID:5604 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Modifies registry class
PID:728
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Modifies registry class
PID:3160
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Modifies registry class
PID:1880
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDUuNDkiIG5leHR2ZXJzaW9uPSIxLjMuMTg3LjQxIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iNDIiIGluc3RhbGxkYXRldGltZT0iMTcxNTE5NTMwMyIgY29ob3J0PSJycmZAMC41NSI-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTE1MjkyNDgxMDUiLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
- Checks system information in the registry
PID:5660
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNDUuNDkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Qzg3QjMyRTQtMEU3Mi00ODAzLUI3M0EtOEYzMzJBRjZGMDYwfSIgdXNlcmlkPSJ7NkVEODFDNDktQThBMi00QzRELTgxNUYtMUI4OUFERDhDMTA3fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntFQ0M0QkQzMC1FMTE0LTQxNDAtQkFCMi1FM0M2NEE1MTI3Qzd9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDUuNDkiIG5leHR2ZXJzaW9uPSIxLjMuMTg3LjQxIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9IklzT25JbnRlcnZhbENvbW1hbmRzQWxsb3dlZD0tdGFyZ2V0X2RldiIgaW5zdGFsbGFnZT0iNDIiIGNvaG9ydD0icnJmQDAuNTUiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy80YWQ5Y2I2ZS04MjQ1LTRlNDctYjI5OC0xZmY0YjA0MjU2ZTE_UDE9MTcxOTUwMjkwOSZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1iY2UlMmZ3ZWc1YkppbmxYWmdTaGolMmJHdXlWYXp2OUI3ZkMxWFlGVDcxV3U0eUNSZFZIalc1b3lKN0NldWY0RUMlMmJmc0JxOTclMmZ2b295dThGMnB3UlZNNkZ3JTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBkb3dubG9hZGVkPSIxNjM0Mzc2IiB0b3RhbD0iMTYzNDM3NiIgZG93bmxvYWRfdGltZV9tcz0iNTE2Ii8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHNvdXJjZV91cmxfaW5kZXg9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxwaW5nIHI9IjQzIiByZD0iNjMzNyIgcGluZ19mcmVzaG5lc3M9InswMDlDRTQ1Mi1FQzdBLTQzMEQtOEU1OS1DQ0UwRDIxNjZGMkN9Ii8-PC9hcHA-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjEyNC4wLjI0NzguODAiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0MiI-PHVwZGF0ZWNoZWNrLz48cGluZyBhY3RpdmU9IjEiIGE9Ii0xIiByPSI0MyIgYWQ9Ii0xIiByZD0iNjMzNyIgcGluZ19mcmVzaG5lc3M9InswODFEQTIzQS00OTgzLTRBRTktOEI2Ni05QzNGREFFQzAyNjN9Ii8-PC9hcHA-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IjEyNi4wLjI1OTIuNjEiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZT0iNjM3NyI-PHVwZGF0ZWNoZWNrLz48cGluZyBhY3RpdmU9IjEiIGE9Ii0xIiByPSItMSIgYWQ9Ii0xIiByZD0iLTEiIHBpbmdfZnJlc2huZXNzPSJ7NzlGNkE1QTMtMzg1Ny00QThGLThENkUtRjg2MkFDQzU4MkE4fSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:1924 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjExMC4wLjU0ODEuMTA0IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0MyIgaW5zdGFsbGRhdGV0aW1lPSIxNzE1MTcxMjQwIiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNTk2NDM3NTI3NDg1MjAxIiBmaXJzdF9mcmVfc2Vlbl90aW1lPSIxMzM1OTY0NTg1Mjk4MDE4NjQiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMzExMTg5IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxNDUyMTEyMzMxNCIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Checks system information in the registry
PID:2008
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A60303E3-0E4C-4697-98F5-AB9323935965}\BGAUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A60303E3-0E4C-4697-98F5-AB9323935965}\BGAUpdate.exe" --edgeupdate-client --system-level2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1256
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODcuNDEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MjU5MzhBQjItOUQzRC00OTc0LTlEN0QtOUJBRkI4MDJDODlGfSIgdXNlcmlkPSJ7NkVEODFDNDktQThBMi00QzRELTgxNUYtMUI4OUFERDhDMTA3fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntBRTdBNjQyOS05NEJFLTQ1NjAtQjZFQy1BNzIyRUEzRTAyODl9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7MUZBQjhDRkUtOTg2MC00MTVDLUE2Q0EtQUE3RDEyMDIxOTQwfSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMi4wLjAuMzQiIGxhbmc9IiIgYnJhbmQ9IkVVRkkiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxNDUyOTI0ODI4OSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0NTI5NDA0Mjc5IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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_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-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Checks system information in the registry
PID:1456
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\MicrosoftEdge_X64_126.0.2592.61.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\MicrosoftEdge_X64_126.0.2592.61.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
PID:3680 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\MicrosoftEdge_X64_126.0.2592.61.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:5456 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.62 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.61 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff6d2ffaa40,0x7ff6d2ffaa4c,0x7ff6d2ffaa584⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4292
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3160 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.62 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.61 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff6d2ffaa40,0x7ff6d2ffaa4c,0x7ff6d2ffaa585⤵
- Executes dropped EXE
PID:4508
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.62 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.61\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.61 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff7dfe3aa40,0x7ff7dfe3aa4c,0x7ff7dfe3aa585⤵
- Executes dropped EXE
PID:3760
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODcuNDEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NTBDRTMyQTYtMUNDOS00OEFFLUIwOUUtQkJCQ0NBRjlCRDlFfSIgdXNlcmlkPSJ7NkVEODFDNDktQThBMi00QzRELTgxNUYtMUI4OUFERDhDMTA3fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntBMTFCNEY5Mi1CMjQ0LTQ3MTktOEQ5OS01NzRDNERERkExRjZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7aFZmRGpNZEZHNkZnS3MwTno2ZW1yWUNTZzZUUXZEUG9tb2xSYXlRWEJLND0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4Ny40MSIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJJc09uSW50ZXJ2YWxDb21tYW5kc0FsbG93ZWQ9LXRhcmdldF9kZXY7UHJvZHVjdHNUb1JlZ2lzdGVyPSU3QjFGQUI4Q0ZFLTk4NjAtNDE1Qy1BNkNBLUFBN0QxMjAyMTk0MCU3RCIgaW5zdGFsbGFnZT0iNDIiIGNvaG9ydD0icnJmQDAuNTUiPjx1cGRhdGVjaGVjay8-PHBpbmcgcmQ9IjYzODAiIHBpbmdfZnJlc2huZXNzPSJ7OTdBMzQyM0YtNkJGMy00NUIzLUIwMEQtRDIyNUNBNzMyRUJCfSIvPjwvYXBwPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSIxMjQuMC4yNDc4LjgwIiBuZXh0dmVyc2lvbj0iMTI2LjAuMjU5Mi42MSIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJjb25zZW50PWZhbHNlIiBpbnN0YWxsYWdlPSI0MiIgb29iZV9pbnN0YWxsX3RpbWU9IjE4NDQ2NzQ0MDczNzA5NTUxNjA2IiB1cGRhdGVfY291bnQ9IjEiIGxhc3RfbGF1bmNoX2NvdW50PSIxIiBsYXN0X2xhdW5jaF90aW1lPSIxMzM1OTY0NTg1NTE4NTc3MDAiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0OTE5NTYwNTQ3IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0OTE5NzE2OTA0IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0OTQ1ODEwNTgzIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0OTU4Nzc5NDM2IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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⤵
- Checks system information in the registry
PID:756
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD5f9e45fe262a291c37f52e1baf1cbb75c
SHA12c3a47de71610e3ad80e34fa7d0af9690d56d8ea
SHA25676974a5e0e00af7c5d759a30b04ec614e819a4fcbe418fb1312b0426b87d0b26
SHA512a7ea36dc3c2322f5bdc97ed4c2cf4d1a6d8261f80ad774155e557127b0b3491aa6fa9bab14bc2f65d483bb9a3680ff0c8f8920b0920b3058e0aa5f992b22f94c
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{1FAB8CFE-9860-415C-A6CA-AA7D12021940}\2.0.0.34\BGAUpdate.exe
Filesize17.2MB
MD53f208f4e0dacb8661d7659d2a030f36e
SHA107fe69fd12637b63f6ae44e60fdf80e5e3e933ff
SHA256d3c12e642d4b032e2592c2ba6e0ed703a7e43fb424b7c3ab5b2e51b53d1d433b
SHA5126c8fce43d04dd7e7f5c8bf275ba01e24a76531e89cc02f4b2f23ab2086f7cf70f485c4240c5ea41bf61cb7ceee471df7e7bdc1b17dfdd54c22e4b02ff4e14740
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.187.41\MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe
Filesize1.6MB
MD5a9ad77a4111f44c157a1a37bb29fd2b9
SHA1f1348bcbc950532ac2b48b18acd91533f3ac0be2
SHA256200a59abdeb32cc4d2cec4079be205f18b5f45bae42acb7940151f9780569889
SHA51268f58a15ef5ba5d49d8476bee4a488e9a721f703a645ddd29148915d555ca2eb451635c3b762e5a0f786d69bb5cba9bffac3eeee196f1ec7ad669e2d729fe898
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0ACF566A-AD05-4CA4-AE9B-964895410ABC}\EDGEMITMP_B896C.tmp\SETUP.EX_
Filesize2.6MB
MD5ee18b680b1f0ee5dfbb02ff022df7594
SHA17a07366bd7eae804cf0c88ae9ad69cb5e9601213
SHA256da4c9db214517f8efbb3630be9b4eb6487a39eacedda40018ff01f5a221f19f8
SHA51246e74c99eada1ea40c024dabf1bcbb5e1baec85ea96cc4c93a32b6c2cd83730b0353af469f2b0e098e72f48dd774363261758bfd1276b354d60eb5fd9432f509
-
Filesize
209KB
MD5d7d541bd3dd228ad24dadfc4089b0704
SHA13fe7399267cf9bce649922d8ea0be9a5ffa77f67
SHA256cedade653a1e8d68809199c87a65a7a69fb360f67177262e651253cf0316b842
SHA512aca02d3bc55b7301257c56232b899145ad3266c210997d9eae664a0c6b6796e646a93db012e0a1b0d446cd64c55f916ab6f9a822b7b6b5faabfb75e3b5e3f011
-
Filesize
203KB
MD5d51ad58ff2e702fcf54e5580c3d5195b
SHA1cf65da922713ee8507fd7976ebf4786b83d194c4
SHA256e14aa9b45f08b41fa555568396b38c3cef3827ce46c95ac1c34b34fb65cb20a9
SHA512c9d40c6c22a9115162b34b24fe24f8da5c263b634067ace2822e6cc3206c01a546ed1df3dde09e31cdd86d0b175dddf696e9a5fea63987175c187428056f9e3d
-
Filesize
237KB
MD5b6e0a6427151dfaeca0fc7d84b6e9523
SHA1a03f31f6a8e0fc7f386993a8e8082c383b41a438
SHA256f70cddb720fb4e482704693af2fb2cd862c8ca324a13cb009d8ed30c95184f23
SHA5126a4c673c12a7b8970a6920b4d832fb42680f2b277a832f28f2c41d57821cf7e8a46f562ec6783b81b7eff71365af0f713230a454793396518578c5536d124c29
-
Filesize
2.5MB
MD50c9199555050145619d3adb0b9c86d90
SHA1e290a258869bb45a52c3cec13cfe042c6cd411f7
SHA256eaca58832f1c5d40db402d8165997893be10c42f86b372ab253c66cdacef1cf7
SHA512ca71932635875224d1cf439294065db925d1c46609b529b589e1ee874f24f2a838a366fc083e42444f8e1ff0eba6ae0c8db6e43ced9eb6c15897d2308d8b2bd1
-
Filesize
26KB
MD5cb78d1e912542bc2299cece8348c9f52
SHA170f35b8fc2ee00e8f47b67e8b3b8cc018cd4e29d
SHA2569b432eb71b7b94dbe7e9890ad112f1570a74221eb766d5b40c105daa03697b8c
SHA512fb58db15d3a258a85a3e93a8cc752ccc3d42655f9ab7d9730afa1ac2a301555f37f5a15daf10933d32b2c8e566acafa2a267ffc7103814e7fe924733c54ce9d6
-
Filesize
829KB
MD57c3b449f661d99a9b1033a14033d2987
SHA16c8c572e736bc53d1b5a608d3d9f697b1bb261da
SHA256ae996edb9b050677c4f82d56092efdc75f0addc97a14e2c46753e2db3f6bd732
SHA512a58783f50176e97284861860628cc930a613168be70411fabafbe6970dcccb8698a6d033cfc94edf415093e51f3d6a4b1ee0f38cc81254bdccb7edfa2e4db4f8
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
Filesize
66B
MD50c9218609241dbaa26eba66d5aaf08ab
SHA131f1437c07241e5f075268212c11a566ceb514ec
SHA25652493422ac4c18918dc91ef5c4d0e50c130ea3aa99915fa542b890a79ea94f2b
SHA5125d25a1fb8d9e902647673975f13d7ca11e1f00f3c19449973d6b466d333198768e777b8cae5becef5c66c9a0c0ef320a65116b5070c66e3b9844461bb0ffa47f
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
24KB
MD510edea4ee1040c44abc59b9dcf380da1
SHA100db6a4f5867b0095b47db27f29f473d3d2e15df
SHA256371a851127cbc51c47722088dc40fe41014f9a32986d8bbe2b4f1a80fadcc450
SHA512fcc780922882d611bcbb282e3471ba23baccbbe6a3963960df9ea803879bd0d94b73c2808c8f99aa200ee7f5ad497f48a2f8c46b3714946fa770a98c03f13b6d
-
Filesize
25KB
MD55bb76b62151333328f4002471f9398fc
SHA1bb34c4b834637c21d003ae5a7db2c0fd9350c499
SHA256b17849ae3cdd873980d244f2d24cef476723447ccfb3c86af5cf05feb6b37c49
SHA5120ceb06ca64af35882db4001ce82087efde313828af6d0849e7bb331ca35ab540b6531bfd923c1cd4c14768c228b7c6a09df6695126c245208e2ccaa4d7466a8d
-
Filesize
2KB
MD5b283a4de2d3c556b3618eb79c90fa2f8
SHA19412dbc55f2e1126f4baddd6ca071027bccefdac
SHA2560f1a83ae4c1dc455b8826b0fd2c1d163a16ac9777a46ef92ae805a59ffbf6a6b
SHA512f62daffd19905b9fe823b356ce0142ff936955ea81d66ce5d4c07666122b090e87d601e6342fa4995c98e58b3dd766183dbd25b07acd8568d5d6c8b193861768
-
Filesize
3KB
MD58269206e526ad4641fd56d61207f5fb0
SHA1cf9c0315ab12da16095268d41df3624bdd4c3c71
SHA256cef7da7a49af8a3e4fc1f74ac9506e300ab535d94a5215fc4399874072c1c2f9
SHA51242bac8fedc68c0b4562f57e15cb823c7211c0511424b9e1d32bc5e343633041b5cbd776a6ea7c3fd31d6cf92d4d63c2e7670bce9fb07ae4213a3d25b8108fc36
-
Filesize
591B
MD5c3a4abf0c560ee2cd2bb10c842d1d0a3
SHA10dddb52041664986885a70afd0a5be3eacebfead
SHA2568295adc7f4ba17385a1dc77be707a8d70ed2a1e090cc6369199a48d318aa1123
SHA51228c2622ba0d0a0bb269df5a1d016380eb201ba91060b06b9a0bd0326f31392e2e39f2f76f54dc544bed5a58290ae3cbdc31e901a8453d94b32c9b3fb133cbfd3
-
Filesize
118B
MD57382df3436e28823e7705418f7f9fef3
SHA1e241409ea6b1cc4e6fa0a4e61d19f07792d992f5
SHA25671c8e273d1cc4de2d7bff87d6fe13f77e4071afcfa5972acab0d501d7348c5e8
SHA51259b7435e97eca653295d361636e4e58f989717560063cfd9d065bf78bbdd051b539c21dee3c027966748ffb1fe6771eb932a5a9453886b5867156e9ee626bdbe
-
Filesize
384B
MD5c949262e59029c6c1da9407e9d2ba473
SHA14e34b98b9d6b3730420eff38d2d7b2bf08f1838a
SHA2564bc0955c25432ada9f350f3746934f81519e3c8bdfc5432ca297f30e44b0348f
SHA512f9208ab3f7c18e11c433d7df8c92fc0d597e5af4d74a1bcc5c95ed47a3f8c3f56c8e1e76885231d705a10ead0a086c1d9d1d33c4b195c3e3becbab45eb0c15e7
-
Filesize
148B
MD5d509b622851c509adaa88a5e6dfb0e24
SHA11e674f172d253f1e70651ab934f94a84533ba3be
SHA256e83162cbbead45ff9fa871a76c8d10ddbafa230746ae23e0666d9693cec09b57
SHA512430ae775ec9549302f822bb59e002d350c1da09ca8e0ca52fdd5719be76f3764f3296477651e08d03278abd2a5a8bf9746290983fe8c929b8814a800b2cb4d4d
-
Filesize
70B
MD5df43f42739fa48dfee1072cbd43cce38
SHA14d4b57b61d13b23c5c7d0deba10144c398eda28b
SHA256baddf5451e44d85bf81e190d55c8e400d27bf1d7f04fff73ef9b8e32b513987e
SHA512586233d551f2d62cfd691e0c5baa7d7749a5c718a54d821f6fd97097399d892db2f0f81b185b838bfed0fc4792f6b65fccc8e2c4290bd808b22be48acbb322d5
-
Filesize
67B
MD52377e68d0f1ca2a07c0664618c9768d5
SHA1d27e9704b6960d70f9a7aa85c178345201e4e9ef
SHA256655181fbaae52a419f0700e04e8e7c1e3ce0a3c63c6245c965b72b575aa2cfa5
SHA512fb59a3dd99e5b85b0662e95a3dfdaf0a1d293cc65c3fa56b778e85bba5aeb21b8f7ae544069c271c218c1fcc57044c20eb77e76cefd52e285135809fe35f418e
-
Filesize
158B
MD5de0caa208052c910098e7618f1378eb3
SHA1154b7b6be2906637985a73ad2f6d8a9e626e4b25
SHA256499b23e780391860c7e73bc993e4ba299c2f68d4ae9f1ac5a5a9f3214fb824f2
SHA51251a313f00bad9b1dd87c8aff6e9d6e0aac6672ee4856e403c1af0109043a78b0de5efc6cdb2257ba7b9e34dddabed6bfad48bd8ad5d7b6c8ad85b869bc1cbad5
-
Filesize
191KB
MD582a59832291b455d62a5791f3e4de513
SHA19916c5d66aacad7377c29846aaff2a17e02bc280
SHA256ffbc169a6c02454f23e572a73bb7ef3189647c1e28e3d7f7b14b2ad3a19376ab
SHA512ece19cad714872b34965e05d8c90de878fb6c5f061b1842d45c8ccaef6b3d4f46f57624715d9ce1a8d9386e533e9d31b33a6a9146ad4e1a67e535d58eaa61469
-
Filesize
7KB
MD51ca17cda9639526423f3b18714b5f9fa
SHA117d9660045bb7740f40c1224feb579bb31a503e2
SHA256768c32c80f64926efd6638db719b0ca464a8707b0a52695143a3f0d90bf4bd90
SHA5124741e2ba94786efefcf75be734aff43ea7d0224309c1ae4a586ed08b97d0d84e6362eb12dd7088bd951bce08b8b62d5a85954db066c148b2edfbbd4c4f5f8eda
-
Filesize
884B
MD561556c5b8e45f33bfaa3e64cfa114e89
SHA13941d8359aa83704a2603afc02fe0bb692c88beb
SHA256a7d9241bea63864d171b253a0429c4a27b297c40fe84fc1eed6ae6331d2179fc
SHA5120380979a3558dcdbfffe622c726698809a11e46ad9313141c0a4a5c09256854164f240709001133824fe668755efd323a11b78a4d80e5393155e2b8127f3ebb3
-
C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
Filesize
280B
MD57ec3287729ac2c51d6d3650cfcc67a8c
SHA1bd4bddd43ed4e45de3842a30924c186d3d134db4
SHA2561a7d5c10cc157b3d88fce0ddd3ed3822cd334911f56fe82bfb7aacfae2527bee
SHA5120b726bdb14bdfc16e4d82c53d197bc43c5932e04970ea0d013c518203456387f4fa63eda29db578ecce2b4ba3d0766b093d1fa343f7fd917b054925a0c213fd0
-
C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\Default\6d252f2c-20d2-4848-b839-7af9a7452a99.tmp
Filesize6KB
MD57c7614f1108c8bb7f12a21485665906b
SHA1f0b33d8a1a2bb63f470ad1b88bbe227e5991aa95
SHA256f21c608cffcf9b7e31ea45fa64346624716ceb0c9c6bbdf183c13ab1114266dd
SHA5125a40fe8f017ef10df1840df9ca8d7ee4f546186a9578ea2da519b7079d144773a76b92e5409f1fba4b2a306f111782aa8b3cf721fb2578e933eb32d59dcf76e0
-
C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD526b608d6091489877cdd36a555eeab2a
SHA1e6c8bb0d0b940a3749035f0262aae3f98d2a37c8
SHA25679af5b6fccfce2c98cfd516ff7e2e1ed5d84e8744e03ee7bdf67224ebc3ef487
SHA512a943c35459e201b446d1722623ca222b0dd24a0f87b895522b5b4ef0b6c14f4aadef8bfd8095f8215d6c2d4c86bcbf3d312368f8b8dd479d3b57bb43bafd5a81
-
C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe5e9141.TMP
Filesize48B
MD53d7478f6027f0963604a6676f10dcad8
SHA1b4c7f4b2413390e8282da0c05a2aae1c24972c07
SHA256473cbaf8c420b219dac83d92bd994c931c4f332b2ed268ee03a892940804b576
SHA512eb11abd443747bc0084da8a79cfe0aecf28c7785425945e071926dbcf34cb7d19edd6d536c18da4fe8a2f333d13a175f447b654dfb4e3503faba7ccc47028e2b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\Default\Network\Network Persistent State~RFe5f44f1.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\Default\Network\SCT Auditing Pending Reports
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5257ac7e717f620a0de1262482eea5daa
SHA110b019a6761d5171d07e45eb70b5e47cbbd62e23
SHA256571c180d999e45eafae0cf26e0938cf0df925d907a7b3f3f9c30091059fcea7c
SHA512469ad945c5a88ac5b82a6d6f4ae9698af435ef9456b0bd7b0355483ab7aafb48d2e9795e90ccd2591d980d1d3835b067dc85a6dd95224addb3d2d314a885fa9b
-
C:\Users\Admin\AppData\Local\MaxonApp\UserData\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
1KB
MD5f08e7be8ab2dcd03e717b925bf72adb7
SHA17a24209d3d8e86f372bffefc869e0d5887eb5978
SHA2564758c1ce1bc3864446429a718380a40465bfb6440e9a9c1672899ea9c93a405d
SHA512804ae476fcf20343a46e59e777b6f3cf3ad5f583d92e51374a2764a92e8c3f527554b2b5980a47a0fb9423d05c1d42f3e0b303db6c52b9f87feeadb4ef18a0d0
-
Filesize
2KB
MD512408f3decf92310295de2aa5273e5f3
SHA18b08f5591645e33523459594837f0e4ac8801e8e
SHA25658c8c4a22620bbb822d7588c00641dcf41a5b5e8e07b64dbb67932cef5a06266
SHA512a5e62f43eef619643d61ec7f53aa5191f980e4637f6afa7f217f2588d077cce091ef54e76e1ca733de8b6dc4c0b6be54a40370f265cbc75239bde16b56569584
-
Filesize
3KB
MD596de377595b751a97e99ecfadc348928
SHA144d036bcee5233fdef5de3bbc5a3dbdb6668b4cd
SHA256a8310229f6e69dfc623b5b482de3c271e940a2a3f420b7e9ed0fdc050718862d
SHA5122f825e12ee17d1dfee0eea9d40db08c046adbe1877e47b86e74f02b21b7854911633a9be0e9b24a619aa23a646374f67a468e094a99441f53c394946fa0e2a90
-
Filesize
17KB
MD5641f066357b44b7566ab6ffdef357065
SHA11b63ac08bebcffc321de2e62e775717235a5080f
SHA256aa887b95787420a6ce9c02bc4069abcfa5adf9c2e0e8169977d8dc8684c9880f
SHA512a65e1dbc7da638855fe356a29840aed1823f2293d766300122ff25c8ddc2ea7779c71677d9cf04456e97902ae295c1436bcdc4c87c193a3a21817af48ed0d8a1
-
Filesize
18KB
MD5d7cd4aa8d7a78b228be01324d9b971b5
SHA15c2ba8140a1f18d9f89fdee3322f9f7562db069a
SHA256ded61407ef1ec287532acbccae0d2f3bc80f9e75ce174cb8b71a96340207cbf2
SHA51212ca468b75a238b54e549dfdd99b65ce8a1982ba00c6a33993ebf0ed2a800ceb1a91bfe95628feb26ff9269a9c38054c7065f9f7dc24f73f58ac221cebf84b6e
-
Filesize
16KB
MD5101b191bc270e0ee50583e07eba16062
SHA1680494e89b23bbfe11ba8a281aa113447d0989ca
SHA25646e4ff9630f64d2eec86816850369d4373ee0b7e44c8a3b6a2843d221eaac563
SHA5127a45f6ce4d76fc2f75d99c118c451ead7561e8b538dff23fa1f173046f0a793d7ba87a3fb4827ae8c5b53f88b781a334e4c850da6c135801661d2c23845111f4
-
Filesize
1KB
MD54e4824775fd8bf38edcbd0e2dce273b1
SHA11742fe35a150c329d815a8b2c6d79d9afc824d47
SHA256faf9392d70afef13940da63d4cffcc0e46ad9cadf37b76439913ce20a1ae5720
SHA51234bd01685d4c038f2a560d36a2fe31ccb054fdc66c15e447b604f4f7c3770f1eae0b739a9bc9df7ab11eada7dcc3e934d2c2e3f1c366f3e8bfb3b6ee511f5b71
-
Filesize
536B
MD5395d7b68a23ad8da1c7ea9494b3aa10d
SHA1899c137b05eb22291ffb73a8a7e0f3119ca5cb6c
SHA2564f326db7ba4fd3e8ff63d6221940c82154bfa5b797b5780f7f6277354a531098
SHA512eccc010d2fba7b48f48de8dd92f397d5a6aea450b8e8ccf46afc199e9f93afff5dc6aaac4f18ad12abba8a9ac2b0b05d689dcab0c9d3599fed66a14d5f3c034b
-
Filesize
2.7MB
MD53f2bd91f5599fc8fd1cde587a04043a1
SHA1aadf112495df0f4943df7ff068eaa2c6d851cea9
SHA25693b519d27ce74f48279c5a79e5854bc5b715bcb2da878fe84e2ac781e657faf4
SHA5124353e462e5baa9a6e541df38e6d71976e71a1ec9d5def67b94d8f00a1436894bbcec146a0a065f81ef54f0c7159695049e52780e6a6856e4df71c50e452c85cc
-
Filesize
7.6MB
MD5eb7b62227fe7e580f45d8053482e03e0
SHA129108a3661e9d60d216b201f6015efb2faa06a06
SHA256b8d5a92404144fd6a7cdc23dd8a43763a4d99101906daa1fd582d4047e6d4e0c
SHA512dbc9896522f2ba976f5d35a82e4b146dc52c6c97dafc6cf2e9e54caaa808db0fc5604ebff849b69e906327b0790e1ac3d2cffa039e9a27f8076ee417ea051c61
-
Filesize
308KB
MD5e4140afe17992f0ea15af49ce4d66ab4
SHA144f779594d6b14c44402b90369d269a95d7caead
SHA256a790b38e30d6a95f90ee128123ac456d1e983992af468bb1bbbe448f15e73e97
SHA51271bfa6b480cd5733b9c78d4372c8e5aa30caf9e6beac840396dcc8b4ad8874159570cef6703e56380dfd43344c98c19ef1e5b25d00a98aade72a83185dfa947f
-
Filesize
5.8MB
MD59106431ef779b6a7535bb6d7ffbed648
SHA130676650227027c8660f449af17914e206e23991
SHA2569feac96364f1f620c9354a533a54f8b76852c3e2c40f14e3f1cd9806bb599462
SHA512004692f533e7b81647b110fbef968e092108dccf0a31a14d449de3c648e782bc61808f5dc6d984f7db712d73d7f85b6d605859dfe19a5a0569557d98451f8293
-
Filesize
6.7MB
MD5aeb14989912373ca03240f5a602698d3
SHA18a38a68263ad15b94e6c51bb2b6a6b395a7ea53c
SHA256e731ced39949bea3631b4d765248051190f52140d1e9dcf50c3265406d71969d
SHA51220bdd9add6fbc73e6b720d9f277862431d4d44e2a1d4b593e75ceb4d2294a7585ff846612ffccda0e9e49c6ee36f57979a79dcc348994c9c65f21f6e30872a7c
-
Filesize
14.0MB
MD5fc8bb9bd7715fe146a04c058a72f3958
SHA17b770f0e63b86a67dd5cc78c3e9903b403cd18e4
SHA256be75aec2f9bcadd75be44aa89069427f51fe2ddeb0374db6818fbb332fc65275
SHA512628de889d581625ad76b9c545715615736f1f0e7e9ac6910d7e0c2d8fa5b979469ba8dee72248d1dcf02fda4a5565631d2863752066a21c9bc5ddd10b9aebf4a
-
Filesize
354B
MD57a2a04830f74027c386c971c5bfe5bd1
SHA1190d98f779d0cfa398e8fbb4e2b8f508da339553
SHA2560d67cee1656cdf3789f4aae55f5a83b1acbb60c6668c86dcf4d83d9665bd260f
SHA512ac2656624bd206e034d87fce090ef1a0a58ff21f6f56d12f99eed3f2b136a906bff7b0a4cb429391a2f0d2268949e415793db8c0367fd7b07fee9ddd9695077f
-
Filesize
409KB
MD5c0be78971c747d08c55e747296f407f1
SHA14f48e6c64cb532db1d18563298e23214eba7ea73
SHA256e7c232c2dc3f2f62300adcd008ddf3936d155624bd2795d03a9adfd8aa84618e
SHA512b55bf05bf9bba41b01cda4d7845a7a481dc0499f8ca8b951c7b2f3ee71bc8aceee6fcf917872a51e5dc0cadae888d3070884842cb17497189f69ae6049ba1a1e
-
Filesize
314KB
MD50b29f9c5f816c884b266079f7437fdc8
SHA1581190c1a3f0b497e5d7e0a93c878e40342c947b
SHA2565f60528ce0bd72496606c2f141b85998a876834fd17ad8dc039db47959913503
SHA5129c71f408f42cb858771ccd5734362498903345afff103cb0512144f741b4e85b2b09586f5dfb363d02fb72356a23e8774d5d956ef8ee8b3b60acad904969add2
-
Filesize
1.6MB
MD5bd9922ec6c8389b55d8879dfb915c40f
SHA1b4d77cde12d82833d5fcaa472be9293c7d05e1ef
SHA256fab3b2ed7c4f6f67c1ec33a6c724e2f7e5ef2a7bc05cd9d3de50a2a1472bbb5a
SHA512abc0bfe127325cf4b6093470c8450553a70bc66c03145029db7986d70e1e137904321c6b96934148a7c8f19e8e4f65acd3267a831a38c03ae80b2abd8c66f1cd
-
Filesize
11.3MB
MD5d7c218bae5f27c25af0d19fdba2a46a1
SHA109be45a0e3be6f831079eb12fde4673ddf3bdc9a
SHA2560055a91eb5df4183d97010db45f234a155ce271fc9082e15a34430808bad1e73
SHA512849c7fa7bf4039e863dfe987b253c27b3937b820e82dee866c3b77f9b7225cc72a00b6f4bb197fbbdffb19c68b68124c1928665d7407233a1e101b3c98aa3577
-
C:\Users\Admin\AppData\Local\Temp\tmp04d1b3c4-87a4-4b19-9c77-fd19b343d2e3\app\rga-uninstaller-helper.exe
Filesize698KB
MD5f78cddf69715e25a7af7c3b9b56f244f
SHA13bb6c8d849b12118b86ea2a888aeefe82d536e4f
SHA256b040716acd5f3c92ede67fe4903eff0cd62ae2905f8d4e19397cc0891da21814
SHA512f12f8b162ae1622a4eb73f3d703fcd01f2996dfee68a7ca8d50bde23a8616e6531fcc2f72b0c5a260aa68d683148abd3bc94954d90336c8b05e8b96f4d2bfb5f
-
Filesize
1.8MB
MD5ec519ddb892f726741ea454c36799ab3
SHA12cdf2a2777084f45ad0dec3d71a158ace2a0e9d1
SHA256e95fc49a5da780fc363f6427c32b9c6d746c13b54d5fa6b567771641318fe59a
SHA512e918742f4172c67f71cc1cd61aefa99f02a58b7e4fa5314b7d1f209f7ffb492c03cb864d8f6d5e48785caf83f760fe324f406d3256e259c2ec6aa7a552eebbda
-
C:\Users\Admin\AppData\Local\Temp\tmp04d1b3c4-87a4-4b19-9c77-fd19b343d2e3\app\uninstall-appmanager.bat
Filesize1KB
MD5fbf11c65bd839cf80fc0d2fd9b2ae19c
SHA1820c5cde78199b53c85758a1de1f42e92dbb853e
SHA25627dc1a433c3457ea2920f340de7662b7ea0f1fa066b0d63377d7d5fa919ceb98
SHA5122d631555d01b7104539a7dd4c50fdcc9d3955fb2f57ae848e639050f990406a7148922c5129160d2d0c18e885c6e392437b845b6398b816afea51ebc7fbdd01a
-
C:\Users\Admin\AppData\Local\Temp\tmp04d1b3c4-87a4-4b19-9c77-fd19b343d2e3\translations\mxa_en-US.json
Filesize29KB
MD5316aa5125309f257b079f5ab87ec168f
SHA1a7f9d276138c7cd8554de661216d0e275a723fc4
SHA2566cc3925e156ef0ffa7e7a687f403436aacc67e86aefc9624bece8be7ec867df1
SHA5128bd34ea9663f30151f81e37fdac9ea4f7f1add7a3e22f2d5484d00e6cb2a5b4914a45599ff7bd1c45a8d90e90628cfc40bead13030ff486a589d1cf8b6ad34b3
-
C:\Users\Admin\AppData\Local\Temp\tmp04d1b3c4-87a4-4b19-9c77-fd19b343d2e3\translations\mxa_ja-JP.json
Filesize35KB
MD58c3d7eacd7f7bbe557f8913f900d38cf
SHA1ffaf488516aff7387cd874dbf3e590d86135a6af
SHA256c5bdca69feeafaecb5fa147df35ebaa91750a2b6a956d901abe4c573ecc6edc9
SHA51222ce74c47e807eadca0907440f9505d9940f730146801a3545ac3fdb0ed337537e1165df392623596f4016a92d0e60f763ddf51bcd124c6f4e2fbb9740661d09
-
C:\Users\Admin\AppData\Local\Temp\tmp04d1b3c4-87a4-4b19-9c77-fd19b343d2e3\translations\mxa_zh-CN.json
Filesize25KB
MD583baff8120022aeaa0b75dc8df9fde95
SHA191b63bf237c6c1982f157c0e86f53c7044e72d1b
SHA256ffc196f6fed35328b982bdcd455cfbfff9eebc5e40bec9ef90aa2985323e1170
SHA5124e69ebc0840951bd6392f55e395d26e28168ab2509793e12f138c488f40a55a1a33f3fef137df390e08a7124c4ff89903511bf9de6eb4821ace97eec22555ee0
-
Filesize
10.8MB
MD50a5a4fd8d9e284c95dbcd40717529f44
SHA1d5a73955a5fc4709d48fe441f56184e31bc2a57e
SHA256d820f5a51a718a32296be7a36dabf4c42f6fcf22d16e6e2eaccccd8ad87f96b9
SHA512932074a73176ddc7b9e3dff650b479ac57824e2e5116203189f5bbe650a0a6460cd94f64d517aae8bc9e5829f50fd9993f26940d7ee9343fdcac184ca689c1e2
-
C:\Users\Admin\AppData\Local\Temp\tmp1c370b8c-c150-4367-a0cb-0a30ea8671a4\app\uninstall-maxon-service.bat
Filesize1KB
MD50458eaf2fc13c745121436de121e743b
SHA19787955d5f8a3f923ac621492bcac9ca178fc3d1
SHA2563b0933f37b5d665b3d386bf661813b9efa6f018dfebdd9203c10c13f4c68535b
SHA512441e57898fe9cb7ca9488f1f34e2c2bfd0033867cce3a666389e0ae4866cef24644cb2f7b03676b89405ee8ea6d502d5d2c51265bc153867fc222766d8ca2134
-
C:\Users\Admin\AppData\Local\Temp\tmp1c370b8c-c150-4367-a0cb-0a30ea8671a4\documentation\acknowledgements.txt
Filesize56KB
MD59ab666120c65ad27426995b1af297a48
SHA15995af88672c1994efbe59f545d2aad6252df1bd
SHA256eb1d0f2daa1f8e4a8f0f3c9c6fd281878e16ccf4f9d5c2bb00626281e40dc205
SHA512085245871e99906630b5044044cf92b1e643eba6aba57fe3a5e64b0b156389701e95efe5e39c0e566064381a72b8b8f42d52b8c37ba9b17f7b733e4a76662b01
-
Filesize
259KB
MD5a71e41ad46a251d27df41b0cdae0e0da
SHA104e16855c997e25acab07092487590fb44176750
SHA25673fa89177adee0ad06ed89646f659914b702d4894b34ea198571f8e1ab55ec1d
SHA5128cec5a0ef770c9bed13abec23bea5804ae21bc6c7fe5974719e6f1cc96c1a6fd62b9e1c46eeda2e8c49dea6743fffc5651587f25b32cca14d2e712feec43eb35
-
C:\Users\Admin\AppData\Local\Temp\tmp1c370b8c-c150-4367-a0cb-0a30ea8671a4\postflight\fuse-windows-postflight.bat
Filesize819B
MD57c3cf64ccf4db3ac83e16a23e4eb3b10
SHA10ce03bb05771c8866fa32261f4e48446a4bdb33f
SHA256bbb6448d5cef00e6a6a5317a5abf3fd9cae9bb6751908900baf06445bc42bd5b
SHA512fec5a6001c60f8711f9c41fd6cc5dac5aba5cfc9f34d682bb43651dc5598991c51462d5c48ac900a24e12721855659ba343c2a0f1078c39470a0ed31ba8c186d
-
C:\Users\Admin\AppData\Local\Temp\tmp1c370b8c-c150-4367-a0cb-0a30ea8671a4\preflight\fuse-windows-setup-preflight.bat
Filesize115B
MD55c78f14f9915a2ce2c0cd7ec5010d1ae
SHA1e999de38e67515c9cd41cfdb54e216c4efc415ca
SHA256c7bc0bd1d332f9018a35d95b361d3e13253aa53e3c167672c0039a4d8ce5216c
SHA51204ee4d2d1e815b1fe6f8e245e77b8d7e76c9d96e18a584550b198ac50f7e361369f6b0f43d661b51dd9b8618e9e3454664a53ccef2a6c01591063332de07c5e6
-
C:\Users\Admin\AppData\Local\Temp\tmp1c370b8c-c150-4367-a0cb-0a30ea8671a4\resources\all-products-manifest.json
Filesize24KB
MD5f1ec9c2f98d6cafb6f2aa713cc5eb3f3
SHA1f984e7d1eb09a63158871ebbe4fc336fe4be375c
SHA256e43a6dd7d4c71260970bd03d54be127b1315780a8a16639ca1c5b76db6d458f7
SHA51226f88b8142c8104bbe5a0db93d6537653175243d656b9bb24e9e7a32b01b6fc8713210234c347b1772c6d0e2d5ce0a4e1eef887b4be902db271c27a4291c72ff
-
Filesize
601B
MD5e52f73d520c7751bbe46ef28ffbbf05c
SHA143f676a2e44178f0fcd618f09cbcef2071ed686e
SHA25679fed1056f270b628c3ae02f569cfae28dc4e4fcef847b81435e8278a912cc71
SHA5123baf34faca6814a4cc80673917660ea52ff34603d2bba0550d4bc62881e765ebbcc1969e599c1601b18f27eefdbbb37bef497e91548b6ecbfdd37ff34fc4ca0f
-
Filesize
589KB
MD51604766c127c21ab3434a24a6bd21493
SHA1a4dd9845a8827ee1e89a4111d73b4ea73714fb3e
SHA25620e6aedbc28a142c1275e2ee4b69ab8ed3f3d51e4bb7712e0d6174cb64bdec0c
SHA512726468d4b28c654e0e469bd4618003ec80ea80d16371e3d6048f440bb32160a74705f5b4e01b58452d9fbd539db52305d133afe8cb8288b5634dffa6ebed60aa
-
Filesize
1.3MB
MD52903de10542e3b3a2ff2aee1d0291189
SHA119f53f081c27203609e46dd11ead7eab908f6b30
SHA25621cd6884068e71a4e9ef4a9f687f9f87d84cce36f7797175f4d76fabce87a1a0
SHA512354955f1e8ef47d7c58dfbbcf5069e3b4b748fd233307b772a31c2b63b5683ce3001ccabd765fdde469d22f9b73e224bc78f4dcc0c0bc797ec5c37ccbbf253e3
-
C:\Users\Admin\AppData\Local\Temp\tmp266c4ba1-7f5d-4954-8e84-16d5303e7a12\files\VC_redist.x64.19.exe
Filesize14.3MB
MD5264c296cc0bf00db6ba8e7bf8cc4e706
SHA1837a49f9eaacda7c077a8bbea149a52d766b81c0
SHA2567d7105c52fcd6766beee1ae162aa81e278686122c1e44890712326634d0b055e
SHA5129f197af069535896f866d2853689c8e0243fe5c89feeaf6a027315f31bb0086bb0a6234e77a4427481fb2dbe32c3c0d748f9de82ee439086745658a825bed5e9
-
C:\Users\Admin\AppData\Local\Temp\tmp266c4ba1-7f5d-4954-8e84-16d5303e7a12\postflight\vcredist-postflight.bat
Filesize342B
MD52896b5c307eb33c9e30f25704f1e805f
SHA14678cf9958a7314206e54e5d055ad7a4f65400a0
SHA2564e1329927ec28e08fcbe6af712705c571ef2ad72435d994b55be6c494f96fe45
SHA5121f1600c5721b77ff675c9f95b7bdf6fa83984af31459ffb35d69b0529df4012584b84c4e02505151bef3f84e484b3fd04be23a712e7d1f8dfdf9e4508b016db1
-
C:\Users\Admin\AppData\Local\Temp\tmp4e65565a-6097-4411-ad71-143936dc80b9\postflight\mxredirect-windows-postflight.bat
Filesize630B
MD57f4b4e211a4df311c4c353dc9c34d038
SHA15c46b580f5b37be9effcd76e9f4fa29a56f6dc1d
SHA256c276acfec8e0181a2ae35dff29c1b051091fba70e9aa1d076cc0a4429fc20a5a
SHA512a78600025a16e6a69b6b2861061fd2721fb68019dc5dcb7d8850fe4c6f0cfe353fe5d968fbb205cf6fad8ab9a0ab795f4170585ba01cffefe0d4cff01a80cc42
-
C:\Users\Admin\AppData\Local\Temp\tmp4e65565a-6097-4411-ad71-143936dc80b9\resources\mxredirect.log.config
Filesize616B
MD5373cd25ef8b1b01a13121d92855680d8
SHA14d94d4ce9f09ac5ce5e15ef95d067b6508aa70e0
SHA25661cd3d1b458f7d7012504bfb237a969b9cc08ec03bfcae801aa4ff9b8a806f78
SHA5122d5dfb93feceef016d670b94e06a7510df727091fbbe8416cc2551a66a2ed8f5eab80a270465d64003e930376965eb8224102373c97bf5971761db35ebe607c4
-
Filesize
692KB
MD54cceb8905113d439744ee148e34e7821
SHA1abc1abd7964b6bf6f6dc0e5c44e5f5391d8b268a
SHA256fc3a66fb8d3683496a9c864c5903dccefba5d88feee9568cefdf9f6e4f3c1891
SHA512b6ef84b9012dc26002c1bf10211e3d56b5e8120c2d331dd11ccaf7d60f4f86ad70837ed5113e8c263f30749793273b0761e5cc2661430bfb430c363b1d044ba9
-
Filesize
698KB
MD51f29793a7524fb76ec9fb5541ef9d0aa
SHA1d86b1ae5bac48eb7fb6201caaac600a2027f9b4e
SHA256979eb511ab9a6cec73187e3ec04e7ebbb80af9fe94176cc51092bdd16da05d75
SHA5126dbf5ead5fd33c14ba3ab9ae780e677dcbe5e418065de7e03a8ccb09b19d3a4dcb1f7440847735463bb52e0250ac38bc0fbec86d40e17d46332b67204da00169
-
Filesize
1.1MB
MD570d9b62275daa012c6de319c1d6a9502
SHA1f0dd67f778e8548856fd7068e5169eaea85176e2
SHA2563f0404c19cf4cb370a8ccfdce8893173345c3ddfc5d32ce34a80653800731a24
SHA51244364e3abf3ec16fb9a0aadc49f5943deae537dc437fbaa6359a037b12e66f071bb120b62f3d671dd30a59bdbe4c1161b657003a379f9276fb92ee6f3432e547
-
C:\Users\Admin\AppData\Local\Temp\tmpd5a916f8-79cc-42ed-9f60-b80a8ae59c36\postflight\mxnotify-windows-postflight.bat
Filesize106B
MD5d2926859650503d8e62b0db8e6a2c18b
SHA1373fd2b988df44b574693e8781cdc1213360633c
SHA256aa8c150f29af2200de9ce0336c55bc5c76a64f5434d7f8da26c0cecebc573798
SHA51252040403587f9a0c7f2d5fb6f3de86f649276ad8f42a63eba45b87d58f69a2551191f2a8720d6364bf108638d5650400f782088ebeb2c0b665ebdf510761009e
-
C:\Users\Admin\AppData\Local\Temp\tmpe1ffa55b-69b7-428a-93ba-af5243fd8a8a\bin\MicrosoftEdgeWebview2Setup.exe
Filesize1.7MB
MD56abf61dd5a6318d76a11ce43b4bee001
SHA1546fac452bb8892bed42b79b17dc0c86ca5ae7dc
SHA256389601cbd7e9256ce22348e3ceb2c33e39ddc7a8c75db897d269dc23b17ad11d
SHA512e454b2bb8ee2bf1355613afdf8389076fae5ffb8305ca2748cb05b597b54f039647e9aced03946dd6c0057305de80ca69db09cb2e539c6645fb2da6abf12ea7b
-
Filesize
68B
MD59e307d7ca44484c85fecf3d1cf7b1a59
SHA1590497a3a89c0cbfa9d9db7429a2c4712aaa078f
SHA256d5b69e95318804f103ebcdd26a77e27224decf02962c0f5d8e83fe615b1dd228
SHA512f3e8bb2adbeeb84e699f70dfddd72e86ca0f05827b9f788478c5143d616d1382725e404720213bd056afe5851907553c0e5f1eac10737301b6f73ef7a5f4973d
-
Filesize
36.1MB
MD560abaff7aadffb7a6b794859dd39f8fd
SHA1abec95384036d9d99d94d00c4c2b1db452afd9c9
SHA256760560b03a07975649da6a74ca9cc46f5ce5b7c9d38b10f6daaa6fcefae77efb
SHA5129b23560fa7be23c2d059365c953f354bbc9780f11eeca1c5924441019a964dfb631c388715371ef5a3a383d10f968591100482d8204f8c0e07526ebe68b82641
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
Filesize
632KB
MD5562711caf0d942d286fd28d34ebf9fdf
SHA1001b037c732b497e390bd756901e64ce0d84d885
SHA2563556010aa72b67d16dc6b406aecf493185c92f38ad410924959175fd39192b61
SHA512447ea79c0fe30b5458d139d903bf738126c8159250a5b732ca9afdb7536be3ef5c81857852034fbdf385d9bbc43e1c77dc9618f7ad0b60ff3d9c526711c30060