Analysis
-
max time kernel
109s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe
Resource
win10v2004-20241007-en
General
-
Target
44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe
-
Size
1.8MB
-
MD5
aac12149429e9c1770d6e4961c07533e
-
SHA1
a6318976aeb0164108f9ac1c93593a3a0f90682f
-
SHA256
44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b
-
SHA512
9f73f70325088610173f66400adfaa63825e602311b9e11abbb08d7d2f91e50109a76c8d87313fe69770d5105c1b47352626fbefeb033bb8fc3815575c55a18e
-
SSDEEP
49152:mSU3ky/VaNbbridO5vT8mJotZfNDAhhhxTjF17C:mS9y/INbbrh5bhmtPDWXD7C
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation setup.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 14 IoCs
pid Process 3172 MicrosoftEdgeUpdate.exe 3352 MicrosoftEdgeUpdate.exe 2752 MicrosoftEdgeUpdate.exe 3872 MicrosoftEdgeUpdateComRegisterShell64.exe 4476 MicrosoftEdgeUpdateComRegisterShell64.exe 1772 MicrosoftEdgeUpdateComRegisterShell64.exe 5116 MicrosoftEdgeUpdate.exe 2132 MicrosoftEdgeUpdate.exe 1052 MicrosoftEdgeUpdate.exe 4204 MicrosoftEdgeUpdate.exe 3404 MicrosoftEdge_X64_131.0.2903.99.exe 5024 setup.exe 3044 setup.exe 1572 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 16 IoCs
pid Process 3172 MicrosoftEdgeUpdate.exe 3352 MicrosoftEdgeUpdate.exe 2752 MicrosoftEdgeUpdate.exe 3872 MicrosoftEdgeUpdateComRegisterShell64.exe 2752 MicrosoftEdgeUpdate.exe 4476 MicrosoftEdgeUpdateComRegisterShell64.exe 2752 MicrosoftEdgeUpdate.exe 1772 MicrosoftEdgeUpdateComRegisterShell64.exe 2752 MicrosoftEdgeUpdate.exe 5116 MicrosoftEdgeUpdate.exe 2132 MicrosoftEdgeUpdate.exe 1052 MicrosoftEdgeUpdate.exe 1052 MicrosoftEdgeUpdate.exe 2132 MicrosoftEdgeUpdate.exe 4204 MicrosoftEdgeUpdate.exe 1572 MicrosoftEdgeUpdate.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\N: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\O: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\P: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\Q: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\R: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\X: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\K: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\W: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\M: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\I: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\J: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\U: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\Y: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\Z: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\E: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\H: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\S: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\T: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\V: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened (read-only) \??\G: 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Checks system information in the registry 2 TTPs 10 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification F:\autorun.inf 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
resource yara_rule behavioral2/memory/4376-1-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-4-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-3-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-6-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-18-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-16-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-11-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-7-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-5-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-194-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-195-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-193-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-19-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-210-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-217-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-218-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-222-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-224-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-227-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-226-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-234-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-236-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-239-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-241-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-249-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-251-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-253-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-255-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-257-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-260-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-265-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-267-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-270-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-269-0x00000000024F0000-0x00000000035AA000-memory.dmp upx behavioral2/memory/4376-369-0x00000000024F0000-0x00000000035AA000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Trust Protection Lists\Mu\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\uk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\Locales\mr.pak setup.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\AdSelectionAttestationsPreloaded\ad-selection-attestations.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\dxcompiler.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\msedgewebview2.exe.sig setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Trust Protection Lists\Mu\CompatExceptions setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\WidevineCdm\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\Extensions\external_extensions.json setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\msedgeupdate.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification C:\Program Files\msedge_installer.log setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\identity_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Trust Protection Lists\Sigma\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\ru.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\Trust Protection Lists\Sigma\Cryptomining setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\msedgeupdateres_fa.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\msedgeupdateres_fi.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Trust Protection Lists\Sigma\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\gl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E13F639E-2FDC-4315-B940-20D4BB9B0009}\MicrosoftEdge_X64_131.0.2903.99.exe MicrosoftEdge_X64_131.0.2903.99.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\is.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\lb.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\MicrosoftEdgeComRegisterShellARM64.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\BHO\ie_to_edge_stub.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\identity_proxy\dev.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\VisualElements\SmallLogo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\msedge.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\Locales\sq.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\onnxruntime.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\wns_push_client.dll setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\msedgeupdateres_te.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\msedgeupdateres_nn.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\msedgeupdateres_quz.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\he.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\te.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\Locales\es-419.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\msedgeupdateres_pl.dll 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Trust Protection Lists\Mu\Fingerprinting setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\libEGL.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\identity_proxy\win11\identity_helper.Sparse.Dev.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\identity_proxy\win10\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\identity_proxy\win10\identity_helper.Sparse.Dev.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\msedge_elf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\onramp.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\Locales\hr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\bg.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\identity_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\MEIPreload\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\Locales\en-US.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\Locales\es.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\AdSelectionAttestationsPreloaded\manifest.json setup.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\es.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\it.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Locales\vi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\AdSelectionAttestationsPreloaded\manifest.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.99\Trust Protection Lists\Mu\Content setup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\e57d419 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe File opened for modification C:\Windows\SYSTEM.INI 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5116 MicrosoftEdgeUpdate.exe 4204 MicrosoftEdgeUpdate.exe 1572 MicrosoftEdgeUpdate.exe -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5} MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\lastrun = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ = "IPackage" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods\ = "5" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ProgID\ = "MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB} MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\LocalServer32 MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine.1.0\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass\CLSID\ = "{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback.1.0\CLSID\ = "{E421557C-0628-43FB-BF2B-7C9F8A4D067C}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B532B342-0E34-448B-9EDF-1D55C04041F8}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine.1.0\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods\ = "5" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.151.27\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebMachineFallback.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.151.27\\MicrosoftEdgeUpdateBroker.exe\"" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService.1.0\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{B532B342-0E34-448B-9EDF-1D55C04041F8}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods\ = "6" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 3172 MicrosoftEdgeUpdate.exe 3172 MicrosoftEdgeUpdate.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 1052 MicrosoftEdgeUpdate.exe 1052 MicrosoftEdgeUpdate.exe 4204 MicrosoftEdgeUpdate.exe 4204 MicrosoftEdgeUpdate.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 1572 MicrosoftEdgeUpdate.exe 1572 MicrosoftEdgeUpdate.exe 3172 MicrosoftEdgeUpdate.exe 3172 MicrosoftEdgeUpdate.exe 3172 MicrosoftEdgeUpdate.exe 3172 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe Token: SeDebugPrivilege 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 764 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 8 PID 4376 wrote to memory of 772 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 9 PID 4376 wrote to memory of 1020 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 13 PID 4376 wrote to memory of 2796 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 49 PID 4376 wrote to memory of 2908 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 50 PID 4376 wrote to memory of 3028 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 52 PID 4376 wrote to memory of 3520 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 56 PID 4376 wrote to memory of 3616 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 57 PID 4376 wrote to memory of 3812 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 58 PID 4376 wrote to memory of 3920 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 59 PID 4376 wrote to memory of 4020 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 60 PID 4376 wrote to memory of 1088 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 61 PID 4376 wrote to memory of 3952 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 62 PID 4376 wrote to memory of 2528 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 74 PID 4376 wrote to memory of 2516 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 76 PID 4376 wrote to memory of 852 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 83 PID 4376 wrote to memory of 3172 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 85 PID 4376 wrote to memory of 3172 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 85 PID 4376 wrote to memory of 3172 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 85 PID 3172 wrote to memory of 3352 3172 MicrosoftEdgeUpdate.exe 86 PID 3172 wrote to memory of 3352 3172 MicrosoftEdgeUpdate.exe 86 PID 3172 wrote to memory of 3352 3172 MicrosoftEdgeUpdate.exe 86 PID 3172 wrote to memory of 2752 3172 MicrosoftEdgeUpdate.exe 87 PID 3172 wrote to memory of 2752 3172 MicrosoftEdgeUpdate.exe 87 PID 3172 wrote to memory of 2752 3172 MicrosoftEdgeUpdate.exe 87 PID 2752 wrote to memory of 3872 2752 MicrosoftEdgeUpdate.exe 88 PID 2752 wrote to memory of 3872 2752 MicrosoftEdgeUpdate.exe 88 PID 2752 wrote to memory of 4476 2752 MicrosoftEdgeUpdate.exe 89 PID 2752 wrote to memory of 4476 2752 MicrosoftEdgeUpdate.exe 89 PID 2752 wrote to memory of 1772 2752 MicrosoftEdgeUpdate.exe 90 PID 2752 wrote to memory of 1772 2752 MicrosoftEdgeUpdate.exe 90 PID 3172 wrote to memory of 5116 3172 MicrosoftEdgeUpdate.exe 91 PID 3172 wrote to memory of 5116 3172 MicrosoftEdgeUpdate.exe 91 PID 3172 wrote to memory of 5116 3172 MicrosoftEdgeUpdate.exe 91 PID 4376 wrote to memory of 764 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 8 PID 4376 wrote to memory of 772 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 9 PID 4376 wrote to memory of 1020 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 13 PID 4376 wrote to memory of 2796 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 49 PID 4376 wrote to memory of 2908 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 50 PID 4376 wrote to memory of 3028 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 52 PID 4376 wrote to memory of 3520 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 56 PID 4376 wrote to memory of 3616 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 57 PID 4376 wrote to memory of 3812 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 58 PID 4376 wrote to memory of 3920 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 59 PID 4376 wrote to memory of 4020 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 60 PID 4376 wrote to memory of 1088 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 61 PID 4376 wrote to memory of 3952 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 62 PID 4376 wrote to memory of 2528 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 74 PID 4376 wrote to memory of 2516 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 76 PID 4376 wrote to memory of 852 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 83 PID 4376 wrote to memory of 3172 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 85 PID 4376 wrote to memory of 3172 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 85 PID 3172 wrote to memory of 2132 3172 MicrosoftEdgeUpdate.exe 92 PID 3172 wrote to memory of 2132 3172 MicrosoftEdgeUpdate.exe 92 PID 3172 wrote to memory of 2132 3172 MicrosoftEdgeUpdate.exe 92 PID 1052 wrote to memory of 4204 1052 MicrosoftEdgeUpdate.exe 94 PID 1052 wrote to memory of 4204 1052 MicrosoftEdgeUpdate.exe 94 PID 1052 wrote to memory of 4204 1052 MicrosoftEdgeUpdate.exe 94 PID 4376 wrote to memory of 764 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 8 PID 4376 wrote to memory of 772 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 9 PID 4376 wrote to memory of 1020 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 13 PID 4376 wrote to memory of 2796 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 49 PID 4376 wrote to memory of 2908 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 50 PID 4376 wrote to memory of 3028 4376 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe 52 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:764
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1020
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2908
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3028
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe"C:\Users\Admin\AppData\Local\Temp\44e287fe6a9916ed3d0f984a21ea33e3ab554f970a7d2fd32d82c286399d3c7b.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4376 -
C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUD4A5.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3352
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3872
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4476
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.151.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1772
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTUxLjI3IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBpbnN0YWxsX3RpbWVfbXM9IjEwNDciLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5116
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true" /installsource taggedmi /sessionid "{0E1A1F19-8200-4F62-898C-1D354B2476EC}"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2132
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3616
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3812
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3920
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4020
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1088
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3952
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2528
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2516
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:852
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTEuMjciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTEuMjciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MEUxQTFGMTktODIwMC00RjYyLTg5OEMtMUQzNTRCMjQ3NkVDfSIgdXNlcmlkPSJ7RTlBMUU4QTEtM0I3RS00MjY4LUIzMDMtMkFDOUZFMThBMUY4fSIgaW5zdGFsbHNvdXJjZT0idGFnZ2VkbWkiIHJlcXVlc3RpZD0ie0U2QkMzMTFGLTlCRTctNEE0Qi04OUE4LUUxOTIzNDgzOEQwNn0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgbG9naWNhbF9jcHVzPSI4IiBwaHlzbWVtb3J5PSI4IiBkaXNrX3R5cGU9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iNjciIGluc3RhbGxkYXRlPSItNCIgaW5zdGFsbGRhdGV0aW1lPSIxNzI4MjkzMDY1Ij48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iNSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E13F639E-2FDC-4315-B940-20D4BB9B0009}\MicrosoftEdge_X64_131.0.2903.99.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E13F639E-2FDC-4315-B940-20D4BB9B0009}\MicrosoftEdge_X64_131.0.2903.99.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3404 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E13F639E-2FDC-4315-B940-20D4BB9B0009}\EDGEMITMP_C8013.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E13F639E-2FDC-4315-B940-20D4BB9B0009}\EDGEMITMP_C8013.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E13F639E-2FDC-4315-B940-20D4BB9B0009}\MicrosoftEdge_X64_131.0.2903.99.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
PID:5024 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E13F639E-2FDC-4315-B940-20D4BB9B0009}\EDGEMITMP_C8013.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E13F639E-2FDC-4315-B940-20D4BB9B0009}\EDGEMITMP_C8013.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.140 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E13F639E-2FDC-4315-B940-20D4BB9B0009}\EDGEMITMP_C8013.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=131.0.2903.99 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff713942918,0x7ff713942924,0x7ff7139429304⤵
- Executes dropped EXE
PID:3044
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMTMxLjAuMjkwMy45OSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc291cmNlX3VybF9pbmRleD0iMCIvPjxldmVudCBldmVudHR5cGU9IjYiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIxOTY3NTciIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSI4NzUiIGRvd25sb2FkX3RpbWVfbXM9IjI5MTg4IiBkb3dubG9hZGVkPSIxNzY4NTU2NDgiIHRvdGFsPSIxNzY4NTU2NDgiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjYwNjg4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3472
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5f6ef6691c60c40c1b64c857aa7140f65
SHA10a18181edb6539ace366e7d804e37ec558c52b79
SHA256df10339c63d2f24162ffa7d61c797f46a4ec4d91f1f74c3290646a232c7e9c56
SHA512bf2829c18f109ee181518b7819a23782fdee4f81644a9d062e060ccac7a2df27d2f49cb3c26d63e6c9e2aed6ff166f2af596c0365284ef1dc0a70363ea8fd404
-
Filesize
209KB
MD53c2ec71dbec0629c92ee081fa5523190
SHA1c34429bccfa61fc4d2bfc7be42227017fcefd4a9
SHA256d357502511352995e9523c746131f8ed38457c38a77381c03dda1a1968abce42
SHA5122a50c2c3b1391b0450cea7dd02b96046fed3e5467cc0e317b4950514fff46ed07a64fd48a917ebc1d86247f30d274bab9efafed2d4e05fc485d55e9c254bd448
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
160KB
MD5e7ddb7d2103fd518652eca1328f21510
SHA136bf5749f398a586ec1481cc42a3a6f5deb3754b
SHA2568666d49f5af22615eacbb8b389098c2e7276e6040c937aba970a1dd46fefa7d5
SHA51266c44138de7053a38ed25a01d5c03b08b2d91b2845b54efe6e0be79f843fbd07a81aa0796965e8de027cfb3f9ba362fd34694535f5a72d8c0dd56ea5488b97f7
-
Filesize
204KB
MD59db970fa6963695477e8a3691c5d9940
SHA1e5b57ead1f5d0fbc3185a3761103e55b69ca03d0
SHA256d5d69fb701c077892a587f3ecbb1010ec0846f5046b05a653a7994154420c328
SHA512fdfabf237fbb833f76c9968e99e887a6bc732b9be13bdb3723c472251b11faacc16eb73377ee5b532d2e6faa03e103106120d80b2d4ac0cc843c4c9951b310b8
-
Filesize
236KB
MD5b6a524d1abeb4868b67e780ea6c2e267
SHA1fbe541805bc0922f0a1c1eb9f09125a7f38a32a9
SHA256113d781452ea8d2632d50a6c64c4b1728d8d158964c0ea99e6e0b23cc9861d89
SHA5126a8df76159c0ed181e35084d75cf2edc36a0e16f93c1115d6c455b544cb2b409a447ecd1e7ae976cb2518a9cc1298df25d8ad946d4a2b89c1b3ee4b9f035c8ad
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.4MB
MD593d198acff9bb99fd6dd2f0b972a4172
SHA1a1667b10a8536b773d0c0fc9dae19f0320f95336
SHA256a88a49608b123e5241c4ebe8d69dfda70c0b3d87640c4d4a565c99b8ec00aa12
SHA512b3e5fcbad61f038848dda8cbfc40664285aabce4fcbc0ede274a9d1296216a4ab3b6a3ead902f204dbeadf7d6cfabf56f50f277e18f47b399217087996c140eb
-
Filesize
27KB
MD551e0f6293052a9ed32eebadb0e78dba2
SHA1b6f109d95760e6a8da19f760b54e35316d50db47
SHA25665f20a53718c547b675f0ebd8ce406ae2dcbe242f50fbb631e0d052befaa1a87
SHA512d4ca2fa4b832537d9dcdb6358aee50824085c4327957cfe6465e5af7ddc8245158959ecd6b7767686033c799df4deca06716d8bfdfb55d297436cf65769d1161
-
Filesize
23KB
MD5a6c941f474e1c7266ab500cc932ad294
SHA1cfff3bcf205666ca3b17b65d82a7aed01888af6c
SHA2565ad20f36db95fabbb0f8c62b94bbd532db8083e0f380191180613bd2579a5481
SHA512a7b36bef2929df59999a9fb32a0a2cd8982d90e552ceb29730ed544ba0009192659b360d02181a894943571030b5e0f7ee63b3449be489527718de318a1eaaca
-
Filesize
25KB
MD5ad19703ff751e308a0e64e5aa88e018d
SHA1aec05b96d8a10a2d6f3b09691b1f2512af92948d
SHA25613a26667a4fd42a7d9fe3b61fa5ddf959d93642b051a8ad43ef87d38619cdc82
SHA51256f7599ec7ac2db9b6d8e7c632f1327caa97395c18f436052e7482fa9d12d65c14f84dfb9e6052529a133e36201cb76ee5cab37da5ad1bb8def1abbf885f3c5f
-
Filesize
27KB
MD557147d7160d98f0e550abbe56f09e12e
SHA18463be34d9a2852f57ff18763d8ef7d2c070e544
SHA2561ba80418686eea5fc7ece5d0d4f0dd4bcdda9df6abf5bf0e8bd941ee2972ac7b
SHA512f1020a91b43c40eebd8f6f61dcba9588c6b4966bc5bd50fa806f3a0c55ec6f9921f44bf36915fcec541df540f40f2e6f3c073a9f1fc2b603db590887cf8b2dc9
-
Filesize
28KB
MD5033e5cfa0a2627efca17f13824ad5092
SHA19f7357fd9a06f4e59cbeb4492bbed4d364789e9f
SHA256de0b777c86d95dc5e9d0614ac8a5dc1b559791a2fe11385d3758e6f7021d5cb4
SHA512453508c01d40a9c6a7c4359ec991f94201be1090f663828f1f4b962734852c6ea761a75fa590669436ec0d74025d1654ec0d4dfa116d0a2f8680d54c6efb6662
-
Filesize
28KB
MD5b5c174c65533a224015e940453ebf7bd
SHA1e812e228587a9c8eb7ec7e5d838da264fbd3eb9a
SHA256f9b9730b97f160b22bb9e5f96c2fe623e4cd1ec8d58b36c05e62b92b6eed29e6
SHA5120ca1668e224130c9b9638c979d1e833ff3e4452d9007f1748d4d126a0dd99d829e8dd46dcd0606f5202534e8e483d3af5f5b300d92063a8294338f2264c58ead
-
Filesize
28KB
MD503159478c2c5416cd03b90fdbb85f60b
SHA13015e5b79be506516f05366c36e885fa15675bc0
SHA256ae58ce60a6171b2fbee56f58bfe6e38f5efe568af13355b1d3f6b6c66e5b7906
SHA51238071382f91847641e19ed957e695f45b6b76fa4b91d90db1251dae00df07d6757a6e382098ec8afb35f04fd01c8dcbd661bf0b7a1bea1054b24fbc29a29cf6c
-
Filesize
28KB
MD5ceb156024e4c9b36bc3e217201fc2322
SHA1e126d7953d5c49b724617e1f8b81edb64a769dfc
SHA256ff10d60ec3ff0cd35ce090823bcb2fdd18c825d7ee6ce17655431739e219c17e
SHA512dc74407f6b2f237479d6fde428be3fa72be3e2efe4d8dfb8e5430c119deb39ea0c9d63cde654376e7a190be0a220eaab3343df76a01059316b5b6c444479abf9
-
Filesize
27KB
MD532018e13551cc7fabff9b9d281d3bea8
SHA149796fd79c9c76e45358f21d8f9fabbb81f928db
SHA2566eab69d9cf28d403706e0dced218b3bfdce328cfed3103812388734bae98c693
SHA512e960f0eeb0cbd3393b575b91c953ed5bd8c9146aa8b8aa113605d646e48b4c4ba4faa8987889fc72dc2d786c8c4200867689c1cd8867c3f3dd9a249537ddae4b
-
Filesize
28KB
MD537eb7b29ec5007edf219acb6779d791e
SHA14097b0b293e2e5c8908b8baa7bc41128ad4abaed
SHA256e9b2d242cef0bf2f10824e9435eaa9cbe196c88c6692c0707bcb532580dafa8f
SHA512e9a8a52b7e52e85468edc9503bc1970585c178bcf8c29c662b17bed4d4399ac0b756a67c926b79f2a409f91de3067fb39a4e7f36efd5fa7ea720b841f3d50371
-
Filesize
28KB
MD513de822ff2627018bdb4c30c14463dcd
SHA19e09b285785ec4ccd6b307176212edba410b128a
SHA2569871893788cb63a024923941c1ad02da611e27328745eab33f73b42d62c9eaa8
SHA512e4e0d039f6250fd0ff78e34103909eaf13c45396900107342dc8b727b03c0e58aedad3deba7958f282e74e1a3ceb840c3cd38edf4ec10a1eabd768c1325b19b6
-
Filesize
27KB
MD5dd7622f55ba5a8253f7140ed8619d71c
SHA10cc78f6db200f6da0d0c631e36335f9720fe4ae7
SHA25690eaa4bf9fb360730d5d9567206f0740d77007492725973e4dfd3b934cae13f8
SHA512aa46fb3b01045f2f04999e66ecbe17e43212287fa08f36e6197240fd4c1686411682d0a915d7d72ba105a350c22dd7b0e2690fded93742d027efe9bca37709e6
-
Filesize
27KB
MD57fa587fc34b1f4ccff8687202d5ceda8
SHA145a5c0ea96d729664401facb37bde3d764158c5e
SHA2568dddfa9c3cb4a5f6d756b80c254e2c260cc902bc029e01708bb0828abb7ca0a6
SHA512137d520fbeb25c8dae9717c2ec4ddff1a070af074d7586afbdaa8c069f62aeae1157cc8e1b08ba40db4729314e3beb0e6fb601f017ea7e8f885a948dfa454b03
-
Filesize
27KB
MD5d02196748b8425bc2c8140f4e83a78d2
SHA10969bb02aae0ef1af7f96aba45f3941d088f9eb7
SHA2562dfbb4caa84b3be64aa909d4cf63ff4efa02695d6a378e358943c623dbf2a178
SHA51253df9dac034f7a2713b7030236c9d123f4ff2eb0fe8048f5c6902459fa812572b41b7f6c01c565cd3acb38c44ffaa2ef649dcfed76d4a2ecc6a7b22c3c53da26
-
Filesize
29KB
MD5a8a9599b126dc0e904efd055f7137c6e
SHA1061824f41d8a4d2f8ef8bef3ef2cf32a443aa326
SHA256d97203d6a65b7069423228c962639a9b8772588515baf875ff3f4a3f5bc78726
SHA512e7ad1f5c7e63cf6b3f819b8b690e078d7e7be2a4bc1df6c94132e4c3e46a4cb26b509c0f28a5647a2b1749ead70d3896f4ae4c5378f3542911a97a5842d98a61
-
Filesize
29KB
MD5e14d69cce787e19d164c3f7c0ae61332
SHA1d19d3856cf7caa2b725e1b83e861e2cd907128c0
SHA256e8187fea1b82843af60eae0e49ba184e05d36f112024c029fa0125c5d7067a64
SHA51226d984b35b12fbb416d5b27eeb8784bf5200e2d2ce618c6e2974e1336cab0f62ba82296494027ce3b73e402aa43d9b66abbe19107d74376d3490f012587c1b10
-
Filesize
26KB
MD506e1502286ac9dc94e223f186df41132
SHA1946166c0e8e57e17caedf5df17242e91f5772e81
SHA2561ec5c1132baaf9732b5bc30e6d870d5537e6bf3baf9516f66f4bf0c95c1e8b6e
SHA5129c5091c95c22d87070c6a750d66feea3e42b51cf474c5ae5566d4321acf64c7ecf37687dcc3eedeeafd568c608778b2b0e06e329ebc77c24997896b755b24ca1
-
Filesize
26KB
MD5c97f93ffe9d5e3e5bbc04b168650cd00
SHA1fb035621aed66c60271df3111eecec2d178a021c
SHA2566c9f604468d01e0db22903555ce58fba91b3bc1168057bc3cb0d056c4c785ba9
SHA512b6c86093fb142af4c47b478920106eae03552ada516429bbdb249e51b4caa8a7ed49c741c8bd469c853a2e36f99b5c6a79a7414e7a7848d6027351216d6b7f27
-
Filesize
27KB
MD54bcd1fee36fe6a0cdaaada40907c3d8b
SHA151eb3487585e51c3c263089bad695e0922264a79
SHA256a9b4c3aa17f41e577f3d8f47e7b1b0eb57e83a67e14f3b9796a6224f0bf13a9e
SHA512f1ce2504c051301c361ba081b41b655e2a9f6add8152f5e93867dde1d2974c7723475b935ebe815c0bfcb97b9cbcb783e9c1141786a1445e8ec44bcce2e215cc
-
Filesize
27KB
MD5f3cad4dc9b85dfadd1a2f7f23f6a115a
SHA1e6326bae48881a877b2ea0e7abad5ea8833b8aee
SHA256cd0b3d6c02257f25cac07adbc2e04745afa7677e1546de60e445a1e1cde7a2dc
SHA512e870f2a49e8f33ec90cbffd783c6bdeb8259afd0bd6851bb94f471c900e6f67e12e1da16d549564da15d65e7c517bac0f983ee3395770dc7f57a31158980bff4
-
Filesize
26KB
MD55179538542bf7b9d09fed7c6ce5f36b6
SHA1485a7ba019a79c9edf5170c66f20093a8e244054
SHA25646a9baf759ff770d2abf7fd7f2dda8b1f3336f3dc477889a93b25a12e839d9d2
SHA5120b60f7c21b9421c52caa00052d1c2c3c0b4bbdb2ece783e4c9dc4b288e56c21452040ab6f0e2a024e73f6fffd4bf0c5b348975bb73e197220082e4eaf55505ef
-
Filesize
27KB
MD5b2a5bfeb8421a42a6d4e4bbe0af1ff9d
SHA12949dacb397f669812acbd2a44d45b6fd87de110
SHA256e9be16e58573ad3a66eac5330eeabde2e6b07d47862a78b4a4552cb04570488c
SHA512a89ba89ce32116fd085bd11a2c5d164e6c37e5519a8547481eaa8e1b75837920831abe2f86b6454821c133f1a7d8c1ef3d0b7cacbcfb0570d88affdeea35c81b
-
Filesize
26KB
MD5a6e0e94a5118406a49967eff69e5f95e
SHA1cb97b85f6c45cb1635a05e2ae678861758ffb5dd
SHA2563757d9f64dc9050b4b4a880be38c563202f5d4e9d4bf5c6209abfd4392aba906
SHA51211d5d98ee13b6c9da1d69b6958adfd3b078e6e4c887b056e33c59893be044ebe6fe74b3367959cc8248c2067ba54220e4333f63942da78f9cd0eef56da5222de
-
Filesize
27KB
MD55bcd5010264333cbfb0005678db9079c
SHA167049ceaee6f1021cd4cd7b2886c92aac5d6b047
SHA2563e1325f1f1f95d9fffc554d656720e19499ad8f658b1ebbfd4e4d1623639a6fc
SHA512f32a204d75683bf6a26a60e0ea41db3048dcbeb868955adde28b16786b6be8a91587cc8432a8d5a2de70b151d954543f0477fb56b26be5f0efbe25dff89fcbd5
-
Filesize
28KB
MD510bcbf6c7efd39b40c4d7819103f83d3
SHA1dc870a07ab956e2bd519424553373e53dd50ff6c
SHA25636ee1d98a48726048f1db8a34a474bd595d42836ef3c9f45ad8fc7876f6f5782
SHA512cd4cafc77ba66912d3fd46fecc2eed59f4b19de1564c42948d01e0e8a5d1150f71d59827179eedcbe12cf4308fb13023eba30f1590cb70dbdf4df29eb9e495ed
-
Filesize
29KB
MD5f443e9d9a090641a0108f2bac5f00332
SHA16e8efd1f83dc26490920f0135f36f2e91df08c8b
SHA256ec194ff30119639d586d6bed4a57fa16cc7d1024f09313c55f54311f123bcb88
SHA512892323d6497ab36a049f59e49de8c23e5ce880aca811c3423621585838bbdb64c0e95f62f22d9353ad3efc84383be52eab2797b8067fba66689763d0a9287f63
-
Filesize
29KB
MD5d60d8b7d2861cb74672a085694c4a080
SHA1c4be46de53e224e53db055d17b3393edecdaa7bb
SHA256ccdda5523459637f0d7b8766fd282b70c2849185dff5935dc2dce1cac89b0e80
SHA5126836a47ab09acfbd526d0dedd46c16b7879138d2511afdb8321c615d122f3a7c51997fab1cb9407cc6ac6ad19862e25035b133f30e0e74cff50e7a0ea4b3baa3
-
Filesize
27KB
MD513eb51cc09c9f16c2744daee640a5cbd
SHA1eee30a7fd1fccf3dbae9c1dfa6d77122cb05536c
SHA2569ccb338c76156396388f1bdcdd8ab56dddd3e7d0c9e58ad0d36f749a3edb6ec8
SHA5126fe703743bc6db042561a9d84a4dc3219fbcf4b362808979adf8e89bac7a89ba39d5d4e72137dc74ac7406a89a057001b2cfe84715a5e26a7790353c56acf748
-
Filesize
29KB
MD5000f0f4c7002bcf241d5d4a93bdfced3
SHA1826c174c8ccdc75455bf4a68051ad0850be05593
SHA2562faa96d51684d46d93bfb700d518144bdb50cbdd73fe18e24a1f47d769cd097b
SHA5127f83df76b5fa87311157a5388440b2737197381a4153c0f3ede0774fc9dc545875ebb5f3c274fde3e428b0e8c067663fed95c25be8be8e8c2de97d1d761027f7
-
Filesize
27KB
MD582583acb95a791851f88d38726823703
SHA1fa7da649160bb78939193f159060d6bcede11527
SHA256b76cf107610560354caee4c9519b3e8a94376394a4abaa32fcec5ab1d83f976d
SHA512d62868ea81a124bb07a655c3f6be7723977171102ae160b48460c2e466f2206ea98a68b64cc8e5e0a8a7dac1fcb10ef7c7fbdaaa4b67a2ff6feeea368e2969f9
-
Filesize
27KB
MD5b18de93a0ab6c5150128c1ce85871960
SHA182639dc738bb9b9bdaf37b1e487b51517e819cbb
SHA256d598eb005612e0a84ebb5a6b38bb3b963ef10d3c97bc27d6b31d2a5225fc239f
SHA51284454597904b5c20edf356a706621f2434c70cf22edd2367b20d6d3417112c8341d7aa4e9b46a9473311727288298bbdefce3118838588082f92a6a348efd2dd
-
Filesize
27KB
MD5a77de8d46c5da2a1d07af61bee8923d5
SHA1752a6202592f979edb850f9cd48667cff85eea4a
SHA2565a8471a73dcf56c3e65ef855c6c559ce36a52c40f061902106ed9ee1c80600b1
SHA51276dd9ff39e8bb06583ed2547dd6f42b29346b2ddf9b4ad5aae19182e7f6b0aa491a71758cdf08bcee2f071ab477f6f22d0793ce5d41c83c267daf2a1823bc051
-
Filesize
27KB
MD580af740b5c50c78d3f9821f3e8638660
SHA1629c5ebb042870b650b6f78223b70ccf3cc39e84
SHA2566b30deee4522880198b706250c919c4ce2f8b63481489f309b7fe5014ee655d2
SHA512cba44d0d42292660a7a27f5b5f3781b353d4131d3eb3e4c74e08455f8dda64143b7757b2b0c62ac839984beecc4617a7e836f286de4d75d6d2ec458f334dfb3b
-
Filesize
28KB
MD51e959547bab52467f7c7bfe671ae2f20
SHA140f98aa0e71d40333e9b45ebfb18440e4a9eb0c8
SHA2566048c07a850c8378268d7331ed804ec2fbbaa0659553382f72a423ff738df9b1
SHA5123442ec3f25c2e9b0441d8e6dc2aeb8efffdeb646d8b1d2c0125490d3d59551d11a60827d0b7beb8fd1cb5c41af73100d44edfa01e5dd42b53d05f738a7ee538c
-
Filesize
26KB
MD5b6e391edc3d1a78dea08f684d06b1b24
SHA16167d7bf6df527354e3f4201510472b677c00bec
SHA2565351fc8c0e42c1c4e33b5a04c24109398bf5a025ada9379d9a7b408c0623e261
SHA5124fe94f41583f1d5638a59efdabaf44b32e1f83b0dc39d068261f7c1e663682ef9dea3e01466005faff9340eca75c0f2fa3ac65903133c82d44a5cabb0101cec4
-
Filesize
26KB
MD589067e8802d0ad17c733a647f0f68f39
SHA1f06dc0f692b894964c6a2884c1e52032f3f25c2f
SHA256aa80041ef7b479789fc61cc85c82a340d36ebfe40f849e914ca2a86332167e6f
SHA512307d443ee5753066051d907339e6c4de9b2e2b18f33c2fece7a6c78ac26af9d1ed40c631baf86e4e724e5825856b68ae58cc307b21a2c723f8ca783348824a4d
-
Filesize
28KB
MD5abd3a4a91ac6a253a658495fb7f6ea60
SHA1ea00d0f58a9324a9b33c1b0840a330d529df27a7
SHA256b4d1a7bc6fd4606b7dbc95d817202bd01493205daa10a930e2cc2b18d7604c73
SHA512da1d32215921f6127658923137ad735e803e47b7ec70cdc0bb98ef738a2ff568c6d652ec12cdd41de6b2d6ab311df948b88927da009172d246a9c353145ecb59
-
Filesize
24KB
MD55d91d3770cf8cd752253e5e0bd15082e
SHA1c039fed60ff86c3b7318b07f097b25be1ed3732e
SHA2569d702e95f6d914bef2fcb2a8eb796148f6c25762484ce9f9a29498a84c9890ec
SHA512f90a461894aaa711b49154dcfa7e18d05f2741f89007a868f6be705fc603ef9c65fda24d8431422b3fe1d4d329ea5a5e7e8566bc1bdec866b96e2d5f0acc5541
-
Filesize
23KB
MD5f8fdb56313d6154ceba519bfcda2ef09
SHA16afd055e09104abf4c2b53c05d1a6f7040ddab7f
SHA256ee2afb2574f5502f782de600edbac64d14947f40f930eeba2a126d706015f211
SHA512dc8d83d769aff1aec6bbf6fe680e76c764087869e4ad1606d89870a9e5f29ec1e7ca875d1f5f6368bc9f047cead3f7bba8311f9f10197c6e005b692216b9ad8c
-
Filesize
27KB
MD50de94422ac7e5eb02e60e9b23b61b1f3
SHA18051f13584a48cadad9d487941c5b8d6c382288e
SHA25695024ee97cbcb460b76eb3914a10f35f87632f5c845700b4479a4238cb2da529
SHA512b515ba34a5bc3d4923119f3699c30bf412dc017d6968e195eb6662e4dd548ef36c5b3bd0c4a603f99d6850fbdb0c0ec850251ff0a5947ad41d7d5cce2b7c27ee
-
Filesize
27KB
MD51d4c0529d47e3c533b8ca75f406a2881
SHA1d3d6d8d422df088260aa0c5159c657341446443e
SHA2562f7b1f2c0193166a5882f51d727967b52f7177e9aa0cad37bdeaf974eec12b64
SHA5126eefd37c80ed38ebeb58a8b1e4638645fa199ca8ec0f8cddc6204e32b16bb9ed8f572eb60f33203d9727b2a2f964b382813f6216261fe7c77c7551e23008a5be
-
Filesize
26KB
MD57b11c313b35d6dfdc9e924e56388e2ea
SHA157e801aeb1dfba6388a7a03b16c24a1bac577c81
SHA25615e79d9ac3c0f75ef5963af2fc8c0fca4d4ce78cd94d6ffa2551726c8ce0d0fe
SHA51250c91ad0ca6f04bb597ee0ead44208fbfd491e603740772ee5f1ec3f527130171c3e3c0cf682030d1d70b349c5969305de005036f7f67eaf27c41118dcd6d72c
-
Filesize
27KB
MD5423e2be502390f13d1b2d97e10c15eab
SHA12b0de5cebafd5eb9004c2635c36f66feefe798e1
SHA256b77fcf90e7f5381fa319802f434ca5dc9ee6ad0cfead4afe59f3a9dac7445c5d
SHA51277a329e28604e12d4389ad17fc1191c23883fbb8344936ebe27345d530c4635de882c6fc7438dc93a55d348946085b74e2dedf28535d97f2024c3c4eb1455d4f
-
Filesize
22KB
MD50ac2cab38e96067b2badf2342bc3cf44
SHA18647ee323d0fe4fb7b56172fa0ebfeb2d991d4dc
SHA2569089b103d1725f84e6c068d4885695953cc93570251d56427801f0e1d5f9fa57
SHA512bba32d2d9a293766259d9f6e0b2e480c9263fee8656eaf1af3796f4743e428c777db69d1e58ce74e22a8bf560cc244d9e75f08fff9ff4b2b08e8dadc5686ac44
-
Filesize
26KB
MD5dc923f6292b04d83706ee61341ca7ef0
SHA1b343284e4d574a36139c019d644897d62a29a5e3
SHA25691ba12d89d5e651f5b70d8d5142f5f9a6de1783a544c71ecdca15d7254fb6121
SHA512d1f0d59296238c360de803300115f44fe4084ee185a23d90892fad35c4476a87d3c398dc802b273a76f017e912eea5624712df6f7a8164a0ec54cc0ed28893c7
-
Filesize
29KB
MD54e21cc5558f9b019636ec9fed354f678
SHA1111361a33b0dd811a9c3ec3b7c65f54f421420cd
SHA2568b0f4f465da08fa82d98c8af1cc22716c54818161bc258d763810c1ad4a1dd77
SHA512c370c6a1e0e3e25a5f2797658a07fbe2de28542d8cbb37abdea9440ff841a52df630e11784e41b03da99a657886486845eebf2b91e0892eb87ce654f33032002
-
Filesize
26KB
MD5132cf2f99e786032fb2ee18a7f255b1a
SHA1862c66cb074e88d4498fefdb3ed67e30682b2fc6
SHA256d35000bea1d48ff2301376168e8e5a7acf57ff8371f158dbf93b0dfaf053b242
SHA512ee394b124e51053239c21570c3dcdd106bec45acea960261d352cd4238291c350fc22ec7e11bd0f9fc82b0dcf2f71619a9630bacfb1d621eb526e92d4b2fdccb
-
Filesize
26KB
MD5450d253ce2c3c620981c05fd59288a27
SHA13fc3325e700c83dbd7ee86c8a2547e1f90f43e37
SHA25603c74a2122241e6793ecced16a940f8b36935ee952ef45b36299de61d4b90e81
SHA512a3734fea4463aae29fb7d6e23e8feb81ffc3ac64a55c901e530a9bb18774325d69aac8dd829fedeeca66f8b5ee9d772643524e0ea5fafef3ae99a3d09d4cee6f
-
Filesize
27KB
MD51aa89c4ef80ca5e2be6ce45a4158ba8f
SHA1e0747961862ad0cbc83261d2a4180d5b5341f08c
SHA25698db378e75eda360fbcc74e22111aff9771fb707d081915eb46793b5b7eff7e5
SHA5120f2202a4c38b23c49259e00e103d42fd35f834cf7fbedbe8889b044725959763cb52a1c62b62aaded3ae7a4261a11cdc5349f0e67b73ce2e3647648220e692e7
-
Filesize
26KB
MD56bf8e6b2e028a15663fd2230d81132c3
SHA161030e4adf68ae5e840e7773592aaf13f84c5c02
SHA25648572b116d002c6e956353b2dd90be740cbafff702cb48e42bccc8ba3716aa91
SHA512d1508193dd2c196d133b874db0445aef4310cc8f7c50dc70fd82f360a9f0f0313c658c1bf58e9fb511847c8a9970bbef8b81d80717797f895b0a238b076bcd02
-
Filesize
27KB
MD54106a9023ae77d4041e44910641f4ed0
SHA1780fedebe09ea061fd90eee42a2f674bb63be6a1
SHA25613101960ca99c29e3ff0929a049f52d8451e9fc51d10c781057d8d3659866819
SHA5121969955af43887b225be481910eab24185f582fc7c04650322f5cb0fa81f7472e69f46c4c3feb5af2b29f1219eaf29eb38ecf59f51973f28c01ce752f6402766
-
Filesize
29KB
MD5829f540454981ceb53f5212e8f07898e
SHA1544162d29848c91882bbd93d35353efe1b0697a9
SHA256f5679de7da75a40b4125b5eb31d6c466e6180e9567b828f980b14e2dc279cafc
SHA512056cf4f010a9f38662a1a1550e31c28ac2aaf454a47c8ecb6a929f17c5da21853b2eb9145f39cb75600677d6296bbe85f75747aa6d9a2e0beb09c78802a0c897
-
Filesize
27KB
MD57809a2ae4daa00b518d4441fa38ead1f
SHA1191743ac6b9b07677e96abc74457e20482bc9703
SHA256c29709e567f89ae6ced8352ca979b6d7b8a90240e7ea37549e13bd5bacfec054
SHA512e8cc5a3db7541e05e26e5a270b84636ab3485c3c9044721331d7d69745b68f42bec597de96d768559e2b402a284a515afac68579735c1a3e74d16270df369c93
-
Filesize
26KB
MD58bbd86eed454f0411c953a729ab4cdb6
SHA159aac8154e9e3adef3ee8d12da34df6a09cb1356
SHA256967a6a9ecf0a34aa59a21a6117152604239223391bacf770b85d7be1cca2f7c4
SHA512029761fcb687bf69db7d263b032cfc1bf41f9b00866c18695775c3ee8031f37a31f2edf8196ad243bed6f04ff4a580c1acf1bd08bc1aeccfbf27dc906ca32cd7
-
Filesize
28KB
MD5ef26571422804efebf165e0574ec9bea
SHA1ab58b9176900ef83652edb414c8d8596c3f02a9b
SHA256edfc3f1d981ecf3c3429f886ea39bd280fde25b2ae26dfcbd47c4c265e7db880
SHA512b5291ea1d485dec1bcb212fcc6692fe9a3900039c214f2eb9b157b834b37e01d348268cea4e875fca60537756b967cf756f256ea830917f66705574ac61638f6
-
Filesize
280B
MD575eeaa9783e5f9cfce9ac0b098111123
SHA1b21570077c80021254b17b5c67df7b85455f5ca8
SHA256431a5e5c3c80d16a7935bd26a5727a6d856c66c6e88019cc8045a260ffa110a2
SHA51200bf281c1fe43c43542e07c9b47fbe549cd5f55e258393a74dc98732df24592cb2d82d4d0bc6a9fb9200e045361145268b302c423a43b7f48e02617b4a4ae35b
-
Filesize
130KB
MD53cf27596090aa6a19f89c1fb999b5d05
SHA15ffe69d04364056ff0b76e3768fabf28642dd15b
SHA256046b07478ac9bc8a5e2210ba92c5365f41f1f2c36c8509069d3c790274603ece
SHA5124a5b37b0dd71d0abba7ffa3714585ca230d463355fbbc314d15ac19e82876cf286b3cda1130fd3989f28b0e73c9cdceaf01d47c3d562f22ef8d03aad03f59cf1
-
Filesize
97KB
MD5cf85b40eb83d27643e3da1eeebbb2999
SHA135b16a56d2d1b9e354948185e056d46f214af583
SHA256a3fa7937ad7996e00fa62aca8b1207f028cc4bb507072ab2ed1232e948ea4941
SHA51287c4bbb2ef91461024e3ed13ebf41d60ade6c11a6a808dcd0f19dfc66869a158d2e92bce974ef1f054f05b7b9a471acf200296daedf458dd8c13c9d88763086d