Analysis
-
max time kernel
1711s -
max time network
1802s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-06-2023 06:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://new-test.scenexe.io/
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
https://new-test.scenexe.io/
Resource
win10v2004-20230221-en
General
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 3264 netsh.exe 3232 netsh.exe 1624 netsh.exe 3576 netsh.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RobloxPlayerBeta.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exeRobloxPlayerLauncher.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerBeta.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerBeta.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerBeta.exe Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation RobloxPlayerLauncher.exe -
Executes dropped EXE 62 IoCs
Processes:
RobloxPlayerLauncher.exeRobloxPlayerLauncher.exeMicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_114.0.1823.43.exesetup.exeMicrosoftEdgeUpdate.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateSetup_X86_1.3.175.27.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exedismhost.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exeMuMuInstaller_1.5.0.5_gw-overseas_all_1660206303.exenemu-downloader.exeColaBoxChecker.exeColaBoxChecker.exeColaBoxChecker.exeColaBoxChecker.exeMuMuDownloader.exenemu-hypervisor-5.0.18-x86-overseas-0412214109.exeNemuSVC.exeNemuSVC.exeSUPUninstall.exeNemuSVC.exepid process 4992 RobloxPlayerLauncher.exe 2176 RobloxPlayerLauncher.exe 2464 MicrosoftEdgeWebview2Setup.exe 4912 MicrosoftEdgeUpdate.exe 4188 MicrosoftEdgeUpdate.exe 3900 MicrosoftEdgeUpdate.exe 1864 MicrosoftEdgeUpdate.exe 1780 MicrosoftEdgeUpdate.exe 2200 MicrosoftEdgeUpdate.exe 3380 MicrosoftEdge_X64_114.0.1823.43.exe 3236 setup.exe 2988 MicrosoftEdgeUpdate.exe 1052 RobloxPlayerLauncher.exe 3376 RobloxPlayerLauncher.exe 2936 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 1568 MicrosoftEdgeUpdate.exe 4416 MicrosoftEdgeUpdate.exe 4812 MicrosoftEdgeUpdateSetup_X86_1.3.175.27.exe 2924 MicrosoftEdgeUpdate.exe 2040 MicrosoftEdgeUpdate.exe 2660 MicrosoftEdgeUpdate.exe 3764 MicrosoftEdgeUpdate.exe 4440 MicrosoftEdgeUpdateComRegisterShell64.exe 4168 MicrosoftEdgeUpdateComRegisterShell64.exe 600 MicrosoftEdgeUpdateComRegisterShell64.exe 4200 MicrosoftEdgeUpdate.exe 1208 RobloxPlayerLauncher.exe 4336 RobloxPlayerLauncher.exe 2352 RobloxPlayerLauncher.exe 2000 RobloxPlayerLauncher.exe 3032 RobloxPlayerBeta.exe 4272 dismhost.exe 5036 RobloxPlayerLauncher.exe 1528 RobloxPlayerLauncher.exe 1640 RobloxPlayerBeta.exe 2968 MicrosoftEdgeUpdate.exe 212 MicrosoftEdgeUpdate.exe 3044 MicrosoftEdgeUpdate.exe 3036 RobloxPlayerLauncher.exe 2936 RobloxPlayerLauncher.exe 3328 RobloxPlayerBeta.exe 516 RobloxPlayerLauncher.exe 4272 RobloxPlayerLauncher.exe 2148 RobloxPlayerLauncher.exe 704 RobloxPlayerLauncher.exe 3156 RobloxPlayerBeta.exe 4844 RobloxPlayerLauncher.exe 4928 RobloxPlayerLauncher.exe 1476 RobloxPlayerBeta.exe 2412 MuMuInstaller_1.5.0.5_gw-overseas_all_1660206303.exe 2132 nemu-downloader.exe 2836 ColaBoxChecker.exe 3184 ColaBoxChecker.exe 1156 ColaBoxChecker.exe 2988 ColaBoxChecker.exe 2064 MuMuDownloader.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 2176 NemuSVC.exe 4264 NemuSVC.exe 3392 SUPUninstall.exe 1684 NemuSVC.exe -
Loads dropped DLL 64 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeRobloxPlayerBeta.exedismhost.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exetaskmgr.exeRobloxPlayerBeta.exenemu-downloader.exenemu-hypervisor-5.0.18-x86-overseas-0412214109.exepid process 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 2040 MicrosoftEdgeUpdate.exe 4440 MicrosoftEdgeUpdateComRegisterShell64.exe 3764 MicrosoftEdgeUpdate.exe 4168 MicrosoftEdgeUpdateComRegisterShell64.exe 3764 MicrosoftEdgeUpdate.exe 600 MicrosoftEdgeUpdateComRegisterShell64.exe 3764 MicrosoftEdgeUpdate.exe 3032 RobloxPlayerBeta.exe 3032 RobloxPlayerBeta.exe 4272 dismhost.exe 4272 dismhost.exe 4272 dismhost.exe 4272 dismhost.exe 4272 dismhost.exe 1640 RobloxPlayerBeta.exe 212 MicrosoftEdgeUpdate.exe 2968 MicrosoftEdgeUpdate.exe 3328 RobloxPlayerBeta.exe 3328 RobloxPlayerBeta.exe 3156 RobloxPlayerBeta.exe 3156 RobloxPlayerBeta.exe 2000 taskmgr.exe 2000 taskmgr.exe 1476 RobloxPlayerBeta.exe 1476 RobloxPlayerBeta.exe 2132 nemu-downloader.exe 2132 nemu-downloader.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe 4356 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
regsvr32.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exenemu-hypervisor-5.0.18-x86-overseas-0412214109.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeNemuSVC.exeNemuSVC.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919391-a492-11e5-a837-0800200c9a66}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32\InprocServer32 = "C:\\Windows\\system32\\oleaut32.dll" nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32\InprocServer32 = "C:\\Windows\\system32\\oleaut32.dll" nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32\ = "C:\\Windows\\system32\\oleaut32.dll" nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32\ = "C:\\Windows\\system32\\oleaut32.dll" nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919391-a492-11e5-a837-0800200c9a66}\InprocServer32\ThreadingModel = "Free" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919392-a492-11e5-a837-0800200c9a66}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32\ThreadingModel = "Both" nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919390-a492-11e5-a837-0800200c9a66}\LocalServer32\ = "\"C:\\Program Files\\NemuVbox\\Hypervisor\\NemuSVC.exe\"" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32\InprocServer32 = "C:\\Windows\\system32\\oleaut32.dll" nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32\ThreadingModel = "Both" nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919392-a492-11e5-a837-0800200c9a66}\InprocServer32\ = "C:\\Program Files\\NemuVbox\\Hypervisor\\NemuC.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32 nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919390-a492-11e5-a837-0800200c9a66}\LocalServer32 NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919390-a492-11e5-a837-0800200c9a66}\LocalServer32 NemuSVC.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.175.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919392-a492-11e5-a837-0800200c9a66}\InprocServer32\ThreadingModel = "Free" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919391-a492-11e5-a837-0800200c9a66}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81919392-a492-11e5-a837-0800200c9a66}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
setup.exechrome.exechrome.exechrome.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
RobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerLauncher.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerLauncher.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerLauncher.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerLauncher.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerLauncher.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerLauncher.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerLauncher.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerLauncher.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerLauncher.exe -
Checks system information in the registry 2 TTPs 20 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 44 IoCs
Processes:
cleanmgr.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exedescription ioc process File opened for modification C:\Windows\System32\LogFiles\WMI cleanmgr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt RobloxPlayerBeta.exe File opened for modification C:\Windows\System32\LogFiles\WMI\SpoolerLogger.etl.001 cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\Scm\SCM.EVM cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\WMI\FaceRecoTel.etl.001 cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\WMI\NtfsLog.etl cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\Scm cleanmgr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\System32\LogFiles\Fax\Outgoing cleanmgr.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt RobloxPlayerBeta.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\system32\LogFiles\setupcln\diagwrn.xml cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\WMI\FaceUnlock.etl.001 cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\WMI\SpoolerLogger.etl.002 cleanmgr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\System32\LogFiles\Scm\SCM.EVM.1 cleanmgr.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt RobloxPlayerBeta.exe File opened for modification C:\Windows\system32\LogFiles\setupcln\diagerr.xml cleanmgr.exe File opened for modification C:\Windows\system32\LogFiles\setupcln\setupact.log cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\Scm\SCM.EVM.2 cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\Firewall cleanmgr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\System32\LogFiles\Fax\Incoming cleanmgr.exe File opened for modification C:\Windows\system32\LogFiles\setupcln\setuperr.log cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\CloudFiles cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\Fax cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\setupcln cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\Windows Portable Devices cleanmgr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt RobloxPlayerBeta.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt RobloxPlayerBeta.exe File opened for modification C:\Windows\System32\LogFiles\WMI\LwtNetLog.etl cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\WMI\RtBackup cleanmgr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\System32\LogFiles\WMI\Wifi.etl cleanmgr.exe File opened for modification C:\Windows\System32\LogFiles\SQM cleanmgr.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 64 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
RobloxPlayerBeta.exepid process 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
Processes:
RobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeMicrosoftEdgeUpdateSetup_X86_1.3.175.27.exesetup.exedescription ioc process File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\VoiceChat\MicLight\Connecting@3x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaApp\icons\ic-more-friends.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\Cursors\Gamepad\IBeamCursor.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\Menu\hoverPopupMid.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\Debugger\Breakpoints\logpoint_disabled@1x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\TopBar\emotesOn.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\Controls\backspace.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\Controls\TouchTapIcon@3x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\shaders\shaders_glsl.pack RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\PurchasePrompt\RightButton.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\Chat\ChatFlip@2x.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\PlayerList\OwnerIcon@2x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\PlayerList\NotificationOn@3x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\VR\Radial\Icons\Recenter.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Microsoft\Temp\EUFF04.tmp\msedgeupdateres_tt.dll MicrosoftEdgeUpdateSetup_X86_1.3.175.27.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\AvatarEditorImages\Sliders\gr-slider@2x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\MaterialGenerator\Materials\Asphalt.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\PlayerList\UnFriend@2x.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\loading\loadingvignette.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ViewSelector\top.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaApp\icons\ic-more-friends.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\VR\rectBackground.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\Settings\Help\XButtonDark.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaChat\icons\ic-checkbox-on copy@2x.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaDiscussions\buttonStroke@3x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\VoiceChat\SpeakerLight\Unmuted20@2x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\StudioToolbox\AssetPreview\ReadyforSale.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaDiscussions\search.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\avatar\unification\R15.rbxm RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\MenuBar\icon_leaderboard.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\StudioSharedUI\avatarMask.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\fonts\SourceSansPro-Semibold.ttf RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\LuaPackages\Packages\_Index\UIBlox\UIBlox\AppImageAtlas\img_set_3x_3.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\TerrainTools\mtrl_asphalt.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaApp\ExternalSite\twitter@2x.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\StudioToolbox\AssetPreview\Rejected.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\Input\DashedLine90.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\LuaPackages\Packages\_Index\UIBlox\UIBlox\AppImageAtlas\img_set_2x_2.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\TerrainTools\icon_shape_cylinder.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\Emotes\Small\CircleBackground.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\PlayerList\CharacterImageBackground.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\InGameMenu\TouchControls\touch_action_move_2.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\114.0.1823.43\Locales\mk.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\LayeredClothingEditor\Icon_Preview_Clothing.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\PlatformContent\pc\textures\water\normal_21.dds RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\114.0.1823.43\msedge_100_percent.pak setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\PlatformContent\pc\textures\grass\normal.dds RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\Settings\Slider\SelectedBarLeft.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\114.0.1823.43\Locales\fil.pak setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\VoiceChat\MicDark\Unmuted100@2x.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaApp\graphic\CityBackground.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaApp\ExternalSite\guilded.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\PurchasePrompt\PurchasePromptBG.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\VoiceChat\MicDark\Connecting.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\scroll-middle@2x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\DeveloperFramework\button_arrow_down.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\RoactStudioWidgets\toggle_off_dark.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\Settings\MenuBarIcons\ReportAbuseTab.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaApp\ExternalSite\facebook@3x.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ExtraContent\textures\ui\LuaApp\graphic\CompactView_purplelayer.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\ssl\cacert.pem RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\icon_following-16.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\sounds\ouch.ogg RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\content\textures\ui\scroll-bottom.png RobloxPlayerLauncher.exe -
Drops file in Windows directory 34 IoCs
Processes:
svchost.execleanmgr.exetaskmgr.exetaskmgr.exesvchost.exedismhost.exetaskmgr.exetaskmgr.exetaskmgr.exechrome.exedescription ioc process File created C:\Windows\INF\netrasa.PNF svchost.exe File opened for modification C:\Windows\Logs\CBS cleanmgr.exe File opened for modification C:\Windows\Logs\DPX cleanmgr.exe File opened for modification C:\Windows\Logs\WindowsUpdate\WindowsUpdate.20230220.183348.647.1.etl cleanmgr.exe File opened for modification C:\Windows\Logs\dosvc cleanmgr.exe File opened for modification C:\Windows\Logs\SettingSync cleanmgr.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log cleanmgr.exe File opened for modification C:\Windows\Logs\WindowsUpdate\WindowsUpdate.20230220.183101.269.1.etl cleanmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\INF\netsstpa.PNF svchost.exe File opened for modification C:\Windows\Logs\DISM\dism.log dismhost.exe File opened for modification C:\Windows\Logs\DISM cleanmgr.exe File opened for modification C:\Windows\Logs\NetSetup cleanmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File opened for modification C:\Windows\INF\setupapi.dev.log cleanmgr.exe File opened for modification C:\Windows\Logs\DPX\setupact.log cleanmgr.exe File opened for modification C:\Windows\Logs\HomeGroup cleanmgr.exe File opened for modification C:\Windows\Logs\WindowsUpdate cleanmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File opened for modification C:\Windows\setupact.log cleanmgr.exe File opened for modification C:\Windows\Logs\dosvc\dosvc.20230220_183124_128.etl cleanmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1847152663\3867481604.pri chrome.exe File opened for modification C:\Windows\INF\netrasa.PNF svchost.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File opened for modification C:\Windows\Logs\DISM\dism.log cleanmgr.exe File opened for modification C:\Windows\Logs\CBS\CBS.log cleanmgr.exe File opened for modification C:\Windows\Logs\NetSetup\service.0.etl cleanmgr.exe File opened for modification C:\Windows\Logs\Telephony cleanmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe -
Launches sc.exe 19 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 2108 sc.exe 2568 sc.exe 1008 sc.exe 4680 sc.exe 2104 sc.exe 2056 sc.exe 3388 sc.exe 3820 sc.exe 3044 sc.exe 2572 sc.exe 1116 sc.exe 2964 sc.exe 824 sc.exe 2928 sc.exe 3616 sc.exe 2516 sc.exe 4892 sc.exe 508 sc.exe 1668 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3396 3392 WerFault.exe msdt.exe 4852 3328 WerFault.exe RobloxPlayerBeta.exe 3592 3156 WerFault.exe RobloxPlayerBeta.exe 4360 1476 WerFault.exe RobloxPlayerBeta.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.execleanmgr.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs svchost.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exebcastdvr.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 bcastdvr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bcastdvr.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
chrome.exechrome.exechrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Processes:
RobloxPlayerLauncher.exeRobloxPlayerBeta.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exeRobloxPlayerBeta.exeRobloxPlayerLauncher.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\RobloxPlayerBeta.exe = "11000" RobloxPlayerBeta.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\RobloxPlayerBeta.exe = "11000" RobloxPlayerBeta.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerLauncher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerLauncher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION RobloxPlayerBeta.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION RobloxPlayerBeta.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerLauncher.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION RobloxPlayerBeta.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\RobloxPlayerBeta.exe = "11000" RobloxPlayerBeta.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exechrome.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exechrome.exesvchost.exeMicrosoftEdgeUpdate.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\MigrateProxy = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133308515337322334" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeNemuSVC.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeregsvr32.exeRobloxPlayerLauncher.exeMicrosoftEdgeUpdate.exeRobloxPlayerLauncher.exeRobloxPlayerLauncher.exenemu-hypervisor-5.0.18-x86-overseas-0412214109.exeMicrosoftEdgeUpdateComRegisterShell64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{13A11514-502E-022E-6180-C3944DE3F9C8}\TypeLib\Version = "1.3" NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{431685DA-3618-5EBC-B038-833BA829B4B2}\TypeLib\ = "{9DE81000-A492-11E5-A837-0800200C9A66}" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C8E667B2-5234-1F9C-6508-AFA9CEA4EFA1}\ProxyStubClsid32 NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4C7F4BF6-5671-2F75-0FBB-A99F6218CDFC}\TypeLib\ = "{9DE81000-A492-11E5-A837-0800200C9A66}" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D70F7915-DA7C-54C8-A7AC-9F173490446A}\ProxyStubClsid32 NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C5B5AFE3-5A6F-05EB-C9B6-5DBF98538B67}\TypeLib\Version = "1.3" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EDBA9D10-55D8-B440-1712-56AC0C9BC4C5}\ProxyStubClsid32 NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DE887F2-B7DB-5616-AAC6-CFB94D89BA78}\TypeLib\Version = "1.3" NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D0D93830-70A2-587E-895E-D3FC9679F7B3}\ = "IGuestFileRegisteredEvent" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00C8F974-92C5-54A1-8F3F-702469FDD04B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AECCC0A8-E0A0-527F-B946-C42063F54D81}\ = "IAudioAdapter" NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{91F33D6F-E621-5F70-A77E-15F0E3C714D5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7844AA05-B02E-5CDD-A04F-ADE4A762E6B7}\ProxyStubClsid32 NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B78DAEB-F52F-53B9-99E8-5A3C226CBE2D}\TypeLib\Version = "1.3" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{101AE042-1A29-5A19-92CF-02285773F3B5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6DCF6E8-516B-5181-8C4A-55EC95177AEF}\TypeLib\Version = "1.3" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{E92E8AF9-A2D8-48A4-B704-3024EC20EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3F63597A-26F1-5EDB-8DD2-6BDDD0912368} NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6DCF6E8-516B-5181-8C4A-55EC95177AEF}\ = "IMousePointerShapeChangedEvent" NemuSVC.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\NEMU.VirtualBoxClient.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E925C2AA-5FE4-AAF6-91C5-E9B8EA4151EE} NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C8ADB7B0-057D-5391-B928-F14B06B710C5}\ = "IGuestFileEvent" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\DefaultIcon RobloxPlayerLauncher.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31587F93-2D12-5D7C-BA6D-CE51D0D5B265}\ProxyStubClsid32 NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E253EE8-577A-2497-6759-88B8292A5AF0}\ProxyStubClsid32 NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc\CurVer MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox\URL Protocol RobloxPlayerLauncher.exe Key deleted \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\roblox-player\shell\open RobloxPlayerLauncher.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Classes\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32\InprocServer32 = "C:\\Windows\\system32\\oleaut32.dll" nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{788B87DF-7708-544B-9EEF-C116CE423D39}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79D15DEF-E2AC-47E8-87F1-1AFD6FC3CFB4} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C48F3401-5A9E-53F4-B7A7-54BD285E22F4}\TypeLib\Version = "1.3" NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{334DF94A-7556-5CBC-8C04-043096B02D82}\ = "IBandwidthGroupChangedEvent" NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B79DE686-EABD-5FA6-960A-F1756C99EA1C}\TypeLib\Version = "1.3" NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7C5E945F-2354-5267-883F-2F417D216519}\ = "IVetoEvent" NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{97C78FCD-D4FC-585F-8613-5AF88BFCFCDC}\TypeLib\ = "{9DE81000-A492-11E5-A837-0800200C9A66}" NemuSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ = "Microsoft Edge Update Update3Web" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DFA7E4F5-B4A4-54CE-85A8-127AC5EB59DC} NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{024F00CE-6E0B-592A-A8D0-968472A94DC7}\TypeLib NemuSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe -
Processes:
RobloxPlayerBeta.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 RobloxPlayerBeta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 RobloxPlayerBeta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 RobloxPlayerBeta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 RobloxPlayerBeta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 RobloxPlayerBeta.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exeRobloxPlayerLauncher.exechrome.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exetaskmgr.exepid process 5076 chrome.exe 5076 chrome.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 3608 chrome.exe 3608 chrome.exe 1692 MicrosoftEdgeUpdate.exe 1692 MicrosoftEdgeUpdate.exe 1692 MicrosoftEdgeUpdate.exe 1692 MicrosoftEdgeUpdate.exe 1692 MicrosoftEdgeUpdate.exe 1692 MicrosoftEdgeUpdate.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 4992 RobloxPlayerLauncher.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 2936 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 4976 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
cleanmgr.exepid process 4256 cleanmgr.exe -
Suspicious behavior: LoadsDriver 13 IoCs
Processes:
pid 4 4 4 4 4 636 636 636 636 636 636 636 636 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 30 IoCs
Processes:
chrome.exechrome.exechrome.exepid process 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exefirefox.exedescription pid process Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeDebugPrivilege 3040 firefox.exe Token: SeDebugPrivilege 3040 firefox.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe Token: SeShutdownPrivilege 5076 chrome.exe Token: SeCreatePagefilePrivilege 5076 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exefirefox.exetaskmgr.exepid process 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exefirefox.exetaskmgr.exepid process 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 3040 firefox.exe 3040 firefox.exe 3040 firefox.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 5076 chrome.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe 2820 taskmgr.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
firefox.exechrome.exepid process 3040 firefox.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe -
Suspicious use of UnmapMainImage 7 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 2936 RobloxPlayerBeta.exe 4976 RobloxPlayerBeta.exe 3032 RobloxPlayerBeta.exe 1640 RobloxPlayerBeta.exe 3328 RobloxPlayerBeta.exe 3156 RobloxPlayerBeta.exe 1476 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exefirefox.exedescription pid process target process PID 5076 wrote to memory of 5096 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 5096 5076 chrome.exe chrome.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 4224 wrote to memory of 3040 4224 firefox.exe firefox.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 2152 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4048 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4048 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe PID 5076 wrote to memory of 4900 5076 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://new-test.scenexe.io/1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8c00d9758,0x7ff8c00d9768,0x7ff8c00d97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1680 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4388 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5116 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5244 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5596 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5384 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5104 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5700 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4792 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5008 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3136 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3140 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6000 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3120 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3572 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6008 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=1504 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 --field-trial-handle=1824,i,4323118146865785882,14140148484105635587,131072 /prefetch:82⤵
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" roblox-player:1+launchmode:play+gameinfo:6QA5HwOdirdVquP8oqBf8rVoTUUACUOiUNYjBoByc8JIYUomiUdNJi3nVI_W1Vgd7cpcP1E9qqjc49Qj5J5YJL9YIJCzeS4qtMAfio90h_g9kR61Bl9bm_4hCL_2obG6AoCJzBTWhU-KXs13xVad4sOGF8xH57Z3cTd7OfKEwGdiIfRPBlEhlvWxMVIS1U7DmLzIEnRsUE0lVaaRhljbi-EjPdWHiBA1NnzuLvGtWD4+launchtime:1686378183484+placelauncherurl:https%3A%2F%2Fassetgame.roblox.com%2Fgame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D175399992364%26placeId%3D4924922222%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D1e7c8499-b071-41df-81e0-f4695ad29faa%26joinAttemptOrigin%3DPlayButton+browsertrackerid:175399992364+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3539e67194ee6ba0c99d6e96abe3b09d611a4794 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x664,0x668,0x66c,0x5d0,0x674,0xe58c44,0xe58c54,0xe58c643⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe" --app -t 6QA5HwOdirdVquP8oqBf8rVoTUUACUOiUNYjBoByc8JIYUomiUdNJi3nVI_W1Vgd7cpcP1E9qqjc49Qj5J5YJL9YIJCzeS4qtMAfio90h_g9kR61Bl9bm_4hCL_2obG6AoCJzBTWhU-KXs13xVad4sOGF8xH57Z3cTd7OfKEwGdiIfRPBlEhlvWxMVIS1U7DmLzIEnRsUE0lVaaRhljbi-EjPdWHiBA1NnzuLvGtWD4 -j https://assetgame.roblox.com/game/PlaceLauncher.ashx?request=RequestGame&browserTrackerId=175399992364&placeId=4924922222&isPlayTogetherGame=false&joinAttemptId=1e7c8499-b071-41df-81e0-f4695ad29faa&joinAttemptOrigin=PlayButton -b 175399992364 --launchtime=1686378183484 --rloc en_us --gloc en_us3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe" -d4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.0.450084633\1474300222" -parentBuildID 20221007134813 -prefsHandle 1676 -prefMapHandle 1668 -prefsLen 20888 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7b62f77-46a5-4dc8-8799-5aed8b9a8c42} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 1756 25aff922558 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.1.365420555\151949945" -parentBuildID 20221007134813 -prefsHandle 2084 -prefMapHandle 2080 -prefsLen 20969 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a508c0c7-f488-4d11-9be9-166fdaaa0d01} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 2104 25afef0e258 socket3⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.2.1495170931\1729247767" -childID 1 -isForBrowser -prefsHandle 2756 -prefMapHandle 2752 -prefsLen 21117 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cef45563-3804-4271-bc22-122ca93cd0e6} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 2788 25a8c935b58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.3.2029293209\565629269" -childID 2 -isForBrowser -prefsHandle 1352 -prefMapHandle 3116 -prefsLen 26562 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {564259f9-76b4-4e78-b41c-6ff1437a9f0a} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 1284 25a8b2b9c58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3040.4.1120467502\1187505006" -childID 3 -isForBrowser -prefsHandle 3612 -prefMapHandle 3600 -prefsLen 26562 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b8d5e8a-52fa-484c-92c1-89cc30d1b1f4} 3040 "\\.\pipe\gecko-crash-server-pipe.3040" 3624 25afd164158 tab3⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exeC:\Users\Admin\Downloads\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3539e67194ee6ba0c99d6e96abe3b09d611a4794 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x6e4,0x6e0,0x6e8,0x6a4,0x6f0,0x1778c44,0x1778c54,0x1778c642⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Temp\EUF8D2.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUF8D2.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjBFRjY4QjAtNjg1Ri00NTdDLUI0RkYtNUUyNjc4QTcyQTAwfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5NkQwRjgyMi1GOTdDLTQ2NDUtODFFOS03OTE5OTU0ODY5NjN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iNCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE1MDYzLjAiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxLjMuMTcxLjM5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Njk2NTEzMzAyIiBpbnN0YWxsX3RpbWVfbXM9IjE1NDkiLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{60EF68B0-685F-457C-B4FF-5E2678A72A00}" /silent4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjBFRjY4QjAtNjg1Ri00NTdDLUI0RkYtNUUyNjc4QTcyQTAwfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InszOUU1RkYyMC1CRjNGLTQwODEtQThENi01RUQ1MDYwNEIzQTR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iNCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE1MDYzLjAiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBuZXh0dmVyc2lvbj0iMTA2LjAuNTI0OS4xMTkiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIzIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NzIwNzcyMzM4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{95B7E873-5182-40A5-A1F2-7ABACBFEF138}\MicrosoftEdge_X64_114.0.1823.43.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{95B7E873-5182-40A5-A1F2-7ABACBFEF138}\MicrosoftEdge_X64_114.0.1823.43.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{95B7E873-5182-40A5-A1F2-7ABACBFEF138}\EDGEMITMP_4E5D2.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{95B7E873-5182-40A5-A1F2-7ABACBFEF138}\EDGEMITMP_4E5D2.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{95B7E873-5182-40A5-A1F2-7ABACBFEF138}\MicrosoftEdge_X64_114.0.1823.43.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjBFRjY4QjAtNjg1Ri00NTdDLUI0RkYtNUUyNjc4QTcyQTAwfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InswNjgzM0VENC0wNjhFLTQ1OEEtQjA3RS1FNDAwQTNBNEQzM0J9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iNCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE1MDYzLjAiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-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-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2OTI1MDcyOTc5IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iOTQxIiBkb3dubG9hZF90aW1lX21zPSIxOTgyMiIgZG93bmxvYWRlZD0iMTQ3MjQzOTc2IiB0b3RhbD0iMTQ3MjQzOTc2IiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSI5MzkyNyIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\SystemSettingsBroker.exeC:\Windows\System32\SystemSettingsBroker.exe -Embedding1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s RmSvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s SstpSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
- Drops file in Windows directory
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s RasMan1⤵
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 0000000000070264 /startuptips1⤵
-
C:\Windows\System32\bcastdvr.exe"C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer1⤵
- Checks processor information in registry
-
C:\Windows\System32\CastSrv.exeC:\Windows\System32\CastSrv.exe CCastServerControlInteractiveUser -Embedding1⤵
-
C:\Windows\system32\msdt.exe"C:\Windows\system32\msdt.exe" -ep SystemSettings_Troubleshoot_L2 -skip TRUE -id AppsDiagnostic1⤵
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
-
C:\Windows\system32\sfc.exe"C:\Windows\system32\sfc.exe" /scanfile=C:\Windows\system32\Qmgr.dll2⤵
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" sdshow bits2⤵
- Launches sc.exe
-
C:\Windows\system32\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe" /reset /allusers2⤵
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" start bits2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start bits3⤵
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5627C4DD-1E4A-4670-9D9F-60B2520CDEC9}\MicrosoftEdgeUpdateSetup_X86_1.3.175.27.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5627C4DD-1E4A-4670-9D9F-60B2520CDEC9}\MicrosoftEdgeUpdateSetup_X86_1.3.175.27.exe" /update /sessionid "{C731DAA9-4B8C-495C-BCBD-45CA6DB386AA}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Temp\EUFF04.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUFF04.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{C731DAA9-4B8C-495C-BCBD-45CA6DB386AA}"3⤵
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.175.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-4⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzczMURBQTktNEI4Qy00OTVDLUJDQkQtNDVDQTZEQjM4NkFBfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntGOTg1MTE5RC01MTgyLTRDNUYtODdFMy05QjVFRUE5QTNBRTN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iNCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE1MDYzLjAiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTc1LjI3IiBsYW5nPSIiIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9IjAiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9Ijg3NTIxNDM3NjgiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iODc1MjM3MzkyNSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI4OTM3NTA2NzY5IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy81ODFhNGQyOS01M2Q1LTQyYjQtODM2Yy1iMjdiNjYxYjEzODI_UDE9MTY4Njk4MzE1OSZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1VJTJiQ0xEZUtiRnVmY2JZYmE5djRQZXRvaVlvaTUxMjBobjBlSWtTMEY4VkVLck5ONndHYnA5V00lMmJ2NndWM1kyUiUyZmJpdyUyZk9LZHBScXhMSzRyV29MSjN3JTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMTYwMDk4NCIgdG90YWw9IjE2MDA5ODQiIGRvd25sb2FkX3RpbWVfbXM9IjE4MTc1Ii8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9Ijg5Mzc2NzY2NzEiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iODk0MzI3NjkzNSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxwaW5nIHI9Ii0xIiByZD0iLTEiLz48L2FwcD48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iMTE0LjAuMTgyMy40MyIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJjb25zZW50PWZhbHNlIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZT0iNTk5OSI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0ie0Y3MDgyMkYwLUE4ODItNDA0Qi04MDdGLUFDRjMzOUFCRTJDNX0iLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" ContextMenu1⤵
-
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCW1ED0.xml /skip TRUE2⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\pcwutl.dll,LaunchApplication "C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"3⤵
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3539e67194ee6ba0c99d6e96abe3b09d611a4794 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x65c,0x660,0x664,0x5f4,0x66c,0xe58c44,0xe58c54,0xe58c645⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3392 -s 16003⤵
- Program crash
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xcix2rr2\xcix2rr2.cmdline"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2A79.tmp" "c:\Users\Admin\AppData\Local\Temp\xcix2rr2\CSC685371871D33446CAD31C219835D6B5C.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uoxvidtr\uoxvidtr.cmdline"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2B82.tmp" "c:\Users\Admin\AppData\Local\Temp\uoxvidtr\CSC790E4D916A4AA3841C2834DC3D941.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\srvmxjxd\srvmxjxd.cmdline"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES317E.tmp" "c:\Users\Admin\AppData\Local\Temp\srvmxjxd\CSC11809D914C724AD1BAD912F026F68AA9.TMP"3⤵
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" -app1⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3539e67194ee6ba0c99d6e96abe3b09d611a4794 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x560,0x564,0x568,0x55c,0x524,0xe58c44,0xe58c54,0xe58c642⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe" --app2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of UnmapMainImage
-
C:\Windows\System32\CastSrv.exeC:\Windows\System32\CastSrv.exe CCastServerControlInteractiveUser -Embedding1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s fdPHost1⤵
-
C:\Windows\System32\cleanmgr.exe"C:\Windows\System32\cleanmgr.exe" /D C1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Temp\0AF75935-2114-4B5C-8DC9-EB2F4AA78293\dismhost.exeC:\Users\Admin\AppData\Local\Temp\0AF75935-2114-4B5C-8DC9-EB2F4AA78293\dismhost.exe {E2A6B609-256B-464E-95FA-6E2B6F5E20A4}2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\System32\wermgr.exewermgr.exe -purgestores2⤵
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" -app1⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3539e67194ee6ba0c99d6e96abe3b09d611a4794 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x688,0x68c,0x690,0x608,0x6a8,0xe58c44,0xe58c54,0xe58c642⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe" --app2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of UnmapMainImage
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzUuMjciIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QjVDODdCMjEtQ0FBNy00NTY3LUI1MkMtQTBCMTQxQkYyMTUyfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntBMzIzMTRDOC02NUMwLTQzNkYtQkNDMi01RTQ3MUIxNzRCQjV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iNCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE1MDYzLjAiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzUuMjciIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iMCIgaW5zdGFsbGRhdGU9IjU5OTkiIGNvaG9ydD0icnJmQDAuNjUiPjx1cGRhdGVjaGVjay8-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-2⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" -app1⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3539e67194ee6ba0c99d6e96abe3b09d611a4794 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x694,0x698,0x69c,0x614,0x6a4,0xe58c44,0xe58c54,0xe58c642⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe" --app2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of UnmapMainImage
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3328 -s 19323⤵
- Program crash
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8c00d9758,0x7ff8c00d9768,0x7ff8c00d97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4460 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4456 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4704 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4868 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5008 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4900 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5300 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4384 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4820 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3208 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4672 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4844 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5600 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5716 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5804 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1800,i,15622693472747824189,6858598949140262165,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies Internet Explorer settings
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exeC:\Users\Admin\Downloads\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3539e67194ee6ba0c99d6e96abe3b09d611a4794 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x64c,0x650,0x654,0x5e4,0x674,0x1778c44,0x1778c54,0x1778c642⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ff8c00d9758,0x7ff8c00d9768,0x7ff8c00d97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4380 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4508 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4652 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4816 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4988 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff6a6527688,0x7ff6a6527698,0x7ff6a65276a83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3616 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3824 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=816 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5560 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5688 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5680 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4532 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5568 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5548 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5892 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=4944 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=5680 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6064 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=5488 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=5708 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=3156 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5144 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5136 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4700 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4696 --field-trial-handle=1764,i,13957203949758133493,9966206905938480545,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" -app1⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3539e67194ee6ba0c99d6e96abe3b09d611a4794 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x694,0x698,0x69c,0x630,0x6a4,0x14d8c44,0x14d8c54,0x14d8c642⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe" --app2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3156 -s 4723⤵
- Program crash
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" -app1⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerLauncher.exe" --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3539e67194ee6ba0c99d6e96abe3b09d611a4794 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x694,0x698,0x69c,0x60c,0x6a4,0x14d8c44,0x14d8c54,0x14d8c642⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\RobloxPlayerBeta.exe" --app2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1476 -s 23683⤵
- Program crash
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
-
C:\Users\Admin\Downloads\MuMuInstaller_1.5.0.5_gw-overseas_all_1660206303.exe"C:\Users\Admin\Downloads\MuMuInstaller_1.5.0.5_gw-overseas_all_1660206303.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zFB27496C\nemu-downloader.exeC:\Users\Admin\AppData\Local\Temp\7zFB27496C\nemu-downloader.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zFB27496C\ColaBoxChecker.exe"C:\Users\Admin\AppData\Local\Temp\7zFB27496C\ColaBoxChecker.exe" checker /baseboard3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zFB27496C\ColaBoxChecker.exe"C:\Users\Admin\AppData\Local\Temp\7zFB27496C\ColaBoxChecker.exe" checker /hyperv3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\systeminfo.exe"C:\Windows\system32\systeminfo.exe"4⤵
- Gathers system information
-
C:\Users\Admin\AppData\Local\Temp\7zFB27496C\ColaBoxChecker.exe"C:\Users\Admin\AppData\Local\Temp\7zFB27496C\ColaBoxChecker.exe" checker /hyperv3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zFB27496C\ColaBoxChecker.exe"C:\Users\Admin\AppData\Local\Temp\7zFB27496C\ColaBoxChecker.exe" checker /hyperv3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zFB27496C\MuMuDownloader.exe"C:\Users\Admin\AppData\Local\Temp\7zFB27496C\MuMuDownloader.exe" --log="C:\Users\Admin\AppData\Local\Temp\nemu-downloader-aria.log" --log-level=notice --check-certificate=false --enable-rpc=true --rpc-listen-port=54816 --continue --max-concurrent-downloads=10 --max-connection-per-server=5 --async-dns=false --file-allocation=trunc --connect-timeout=5 --rpc-max-request-size=1024M --max-overall-download-limit=50000K --stop-with-process=21323⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe"C:\Users\Admin\AppData\Local\Temp\nemu-hypervisor-5.0.18-x86-overseas-0412214109.exe" /S /post_target=2132 /D=C:\Program Files (x86)\NemuVbox3⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c netshAsyncCall.cmd 0 MuMuNemuHeadless C:\Program Files\NemuVbox\Hypervisor\NemuHeadless.exe4⤵
-
C:\Windows\SysWOW64\netsh.exenetsh.exe advfirewall firewall add rule name="MuMuNemuHeadless" dir=in action=allow program="C:\Program" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exenetsh.exe advfirewall firewall add rule name="MuMuNemuHeadless" dir=in action=allow program="C:\Program" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c netshAsyncCall.cmd 0 MuMuNemuSVC C:\Program Files\NemuVbox\Hypervisor\NemuSVC.exe4⤵
-
C:\Windows\SysWOW64\netsh.exenetsh.exe advfirewall firewall add rule name="MuMuNemuSVC" dir=in action=allow program="C:\Program" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exenetsh.exe advfirewall firewall add rule name="MuMuNemuSVC" dir=in action=allow program="C:\Program" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Program Files\NemuVbox\Hypervisor\NemuSVC.exe"C:\Program Files\NemuVbox\Hypervisor\NemuSVC.exe" /UnregServer4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /u /s "C:\Program Files\NemuVbox\Hypervisor\NemuC.dll"4⤵
-
C:\Windows\system32\regsvr32.exe/u /s "C:\Program Files\NemuVbox\Hypervisor\NemuC.dll"5⤵
-
C:\Windows\syswow64\regsvr32.exe"C:\Windows\syswow64\regsvr32.exe" /u /s "C:\Program Files\NemuVbox\Hypervisor\x86\NemuClient-x86.dll"4⤵
-
C:\Program Files\NemuVbox\Hypervisor\NemuSVC.exe"C:\Program Files\NemuVbox\Hypervisor\NemuSVC.exe" /RegServer4⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\NemuVbox\Hypervisor\NemuC.dll"4⤵
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files\NemuVbox\Hypervisor\NemuC.dll"5⤵
- Registers COM server for autorun
-
C:\Windows\syswow64\regsvr32.exe"C:\Windows\syswow64\regsvr32.exe" /s "C:\Program Files\NemuVbox\Hypervisor\x86\NemuClient-x86.dll"4⤵
-
C:\Program Files\NemuVbox\LoadedDrivers\SUPUninstall.exe"C:\Program Files\NemuVbox\LoadedDrivers\SUPUninstall.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" create NemuDrv binPath= "C:\Program Files\NemuVbox\LoadedDrivers\NemuDrv.sys" type= kernel start= auto4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" start NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" start NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" start NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Program Files\NemuVbox\Hypervisor\NemuSVC.exe"C:\Program Files\NemuVbox\Hypervisor\NemuSVC.exe" /UnregServer4⤵
- Executes dropped EXE
- Registers COM server for autorun
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /u /s "C:\Program Files\NemuVbox\Hypervisor\NemuC.dll"4⤵
-
C:\Windows\system32\regsvr32.exe/u /s "C:\Program Files\NemuVbox\Hypervisor\NemuC.dll"5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Windows\syswow64\regsvr32.exe"C:\Windows\syswow64\regsvr32.exe" /u /s "C:\Program Files\NemuVbox\Hypervisor\x86\NemuClient-x86.dll"4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c comregister.cmd -u4⤵
-
C:\Program Files\NemuVbox\Hypervisor\NemuSVC.exe"C:\Program Files\NemuVbox\Hypervisor\NemuSVC.exe" /UnregServer5⤵
-
C:\Windows\syswow64\regsvr32.exeC:\Windows\syswow64\regsvr32 /s /u "C:\Program Files\NemuVbox\Hypervisor\x86\NemuClient-x86.dll"5⤵
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32 /s /u "C:\Program Files\NemuVbox\Hypervisor\NemuC.dll"5⤵
-
C:\Windows\system32\regsvr32.exe/s /u "C:\Program Files\NemuVbox\Hypervisor\NemuC.dll"6⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" query NemuDrv4⤵
- Launches sc.exe
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xb4,0xd8,0x7ff8c00d9758,0x7ff8c00d9768,0x7ff8c00d97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4328 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4568 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4324 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4872 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5012 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3592 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5188 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5144 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3880 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2952 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5552 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4564 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4752 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1620 --field-trial-handle=1920,i,17372261902474206875,16503994527386092709,131072 /prefetch:82⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3c81⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeCore\114.0.1823.43\Installer\setup.exeFilesize
3.9MB
MD5f50898b32e6015acc79c2d51e0d71c2d
SHA1f2ba0aded11419cfeb194cf3d4563ff824748b15
SHA256d78c5bc9972b06ce256c5ecf9f63be48baae41d5b65250733b56dc4ddedf7cb1
SHA512dc28bd07283e265e94e67b016b543b02c677ab54faa80c279013f262d398c58c6c54c403b44879ea6dee750287b1b9652c7586b8c421efed0097292f3be6d056
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\114.0.1823.43\MicrosoftEdge_X64_114.0.1823.43.exeFilesize
140.4MB
MD598d0fcbbe8c9e1a5bb9d0a7a8ee8294f
SHA1c53ae3208919e43a4bf3e7bedefeb8a915d177ca
SHA256fb6af04add2dc7627135325efa7eaa2b4d83c78d4fe0eaf0e0a67d45f7e81387
SHA5123d20bf8ee7d3300689f422820ea9dc6c3db89cf633691f8781c229bd8aa034cf9cc3afc4c6dfa40d382c785667116f84b35ae7e22dffc24fb0d9e00b655e4def
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.175.27\MicrosoftEdgeUpdateSetup_X86_1.3.175.27.exeFilesize
1.5MB
MD536f147a5861df7b66ed526345d5becde
SHA18b404f58febfe595a6079294d2aa4d6f3ce029a0
SHA25677ed94948626a855386fb3ac2c1803a58566d35d92b957802f30e80276adba18
SHA5125782bc34fd010fade58435a6787686044bd6ba7980c424061a9d4ade32045288241fa1576d0902cb10d4cb67a37d8d55ca1421867595bc7a5377d62260c63a04
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{95B7E873-5182-40A5-A1F2-7ABACBFEF138}\EDGEMITMP_4E5D2.tmp\setup.exeFilesize
3.9MB
MD5f50898b32e6015acc79c2d51e0d71c2d
SHA1f2ba0aded11419cfeb194cf3d4563ff824748b15
SHA256d78c5bc9972b06ce256c5ecf9f63be48baae41d5b65250733b56dc4ddedf7cb1
SHA512dc28bd07283e265e94e67b016b543b02c677ab54faa80c279013f262d398c58c6c54c403b44879ea6dee750287b1b9652c7586b8c421efed0097292f3be6d056
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{95B7E873-5182-40A5-A1F2-7ABACBFEF138}\EDGEMITMP_4E5D2.tmp\setup.exeFilesize
3.9MB
MD5f50898b32e6015acc79c2d51e0d71c2d
SHA1f2ba0aded11419cfeb194cf3d4563ff824748b15
SHA256d78c5bc9972b06ce256c5ecf9f63be48baae41d5b65250733b56dc4ddedf7cb1
SHA512dc28bd07283e265e94e67b016b543b02c677ab54faa80c279013f262d398c58c6c54c403b44879ea6dee750287b1b9652c7586b8c421efed0097292f3be6d056
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{95B7E873-5182-40A5-A1F2-7ABACBFEF138}\MicrosoftEdge_X64_114.0.1823.43.exeFilesize
140.4MB
MD598d0fcbbe8c9e1a5bb9d0a7a8ee8294f
SHA1c53ae3208919e43a4bf3e7bedefeb8a915d177ca
SHA256fb6af04add2dc7627135325efa7eaa2b4d83c78d4fe0eaf0e0a67d45f7e81387
SHA5123d20bf8ee7d3300689f422820ea9dc6c3db89cf633691f8781c229bd8aa034cf9cc3afc4c6dfa40d382c785667116f84b35ae7e22dffc24fb0d9e00b655e4def
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{95B7E873-5182-40A5-A1F2-7ABACBFEF138}\MicrosoftEdge_X64_114.0.1823.43.exeFilesize
140.4MB
MD598d0fcbbe8c9e1a5bb9d0a7a8ee8294f
SHA1c53ae3208919e43a4bf3e7bedefeb8a915d177ca
SHA256fb6af04add2dc7627135325efa7eaa2b4d83c78d4fe0eaf0e0a67d45f7e81387
SHA5123d20bf8ee7d3300689f422820ea9dc6c3db89cf633691f8781c229bd8aa034cf9cc3afc4c6dfa40d382c785667116f84b35ae7e22dffc24fb0d9e00b655e4def
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Roblox\Versions\version-21bedf9513a74867\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeFilesize
1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
C:\Program Files\NemuVbox\Hypervisor\NemuDrv.sysFilesize
292KB
MD5c7c0b54b2d0e63cf1ea37bdf64a09929
SHA1da80f7113137841fb31d4771ed301ae539cb4e05
SHA2568cb34a10d784ee9b1c566e0fb91013702e9022d92d36d473481cfe3033c3d67b
SHA512b226aa95bc88be5af6c1586f2a24f8d4e5dea96f5da55b0779e90c76fcd85a3c1fc7cb76df355a27503eef7fec502c9e0be7db482cbd9acd70987e1e2f14b8d9
-
C:\Program Files\NemuVbox\Hypervisor\SUPInstall.exeFilesize
12KB
MD543ac7be1484e0b763c8fe11c5b4527bc
SHA1c95906b8320d416d2f887fcc175ab7682d6a6e79
SHA2564563d232fac58e1142a7f368e4fe34a93a5a2b465735f60b5c28829a4fc1f3c4
SHA512aeaccfc188bb419a843d515c19f6ade7040b4aee9b03e5d3440d85968d632d1cc2c3fa1d5baba69559fab50bd78cfbf0247df001040eebc7deb60af74422b12a
-
C:\Program Files\NemuVbox\Hypervisor\SUPUninstall.exeFilesize
12KB
MD5f98432d607c4ed33d88c78d75f38d20b
SHA16b083a1ea5c2e65c6fce7c4ecd155b626ae7330f
SHA2565ab555f3f47a3298b65d53617b766aaa7d42dfcc404bda590a8f4a4814945898
SHA512c51be4f688696fb2c7c9bd19c974c0731cca3030a1a198a6c9b104cb940c81d7b6246d8df65f217682f4153adf60d45da2a62e581923956337a7ac94cb6b3176
-
C:\Program Files\NemuVbox\Hypervisor\nemudrv.catFilesize
8KB
MD5b25f7dccdf2471d6a2dcab2e1e1daeb5
SHA17d0143059d2a5643122a005aa755a37bf99bad67
SHA256b5df21d51135a7151c45f08ce48d8f782c856078342d22101b9f53083d6a5779
SHA5123a545c7e5c10c35ecdd20d730b5fb1f4aecbc2f2b6a367056187d4c83d1f1de004f0488e9035fb2210f204295790730258ede4c79f414bfc9bc38e345f1ac76f
-
C:\Program Files\NemuVbox\LoadedDrivers\NemuDrv.infFilesize
2KB
MD587963cda457d64bb7668a25b27583906
SHA1148ff256058d635454961a4a6db90a43b21b2929
SHA256df16de5181fbbd18c54d16cb287fe12774524ff08fcba475c230aa151ec31fcb
SHA512d3adf16f74cf1923fd50739f0d74ac6e42767d1a542a01af551fa540f286597081c61749aad5ac8f6e07c7132d6971d389ddd9bae4c6f22478591adc51a10955
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
5KB
MD5290217a3295610331ef8acf8632a2a34
SHA1a4a2b390d84f46d490bceddac7a772d1deb11691
SHA256f4c08c6e081425e7c8e6c66b818e99389190980832c0c0ec4aa8abb248b14e41
SHA512e3976ffaf39a85860be9668e0e15624c2a2946615373ef814b4a15540ae774d020594bff14de2cef65253e1729c533ff06b10c37af30440ef0a55f98be5d2fd3
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
8KB
MD558f9fadb215d6e132c73be2c6d84e8aa
SHA16b9a7a943ca3bf104473322bcfcadae44b2c2e33
SHA25649db2ed2420111ea3e44c61c65da706076041a6421df98b3070aef11fdc774ea
SHA5123cad9b2732972596d4adcb9e97a25c719256646932237ad4f3ed92ee1d7870334039cbb1f126fdf5d74e7e9c164998789a3fa782316058d4aaa6d5a618e725fc
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
10KB
MD596e6913223b5a9a498a1b17671ca6009
SHA1a87b91f691252c13654d72d3ddbd17064dc1645d
SHA256fa0ab0ef5ebb947057a4a2e166871ee334fad5deceef903f8e0f8c4f7cf42107
SHA5128c2a5fabb41b083e8322409aa30d0e55f25faa61746835376d529614aa0b3a673ae55111930f379872938e26e3d30ceda667bd25a572839166ef3679001c6db8
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
11KB
MD58d1b6f20a0f350cabc59c78fa32e77e8
SHA181a4799d8fa165ded44041c5c6444b46fea24d5d
SHA25669e18ab74606ee93f79e04c7ff4d677cf183e20899abe71d76a21e94903cbefe
SHA512b5c20c34fd36e7848304b2ee417001039bcf4992b80549bf326af30e1b1b543f1c3cd60a72f1af14a2966ad7e776ef8c6d60380818f9528f9c62d5125d51bd2b
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
13KB
MD5a291a3963ebcbb2450abcac9e3675397
SHA13b7b8ceb244545ceb37addc8ed4167273a8f54a4
SHA2569169ad594447fdb4631e9e7c6b901d16206585618433e85d3c50b0875cad8fc6
SHA5125d6e20d03b47c1dab946f476267904e2ba0657e51ae16d18d881acef831938a91d59cea089289814f69ecf404468b0e191a1deaec76971cce5fbe4db65fd38c4
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
13KB
MD52b6e6e173d4da0152e621966803313a6
SHA1aed0849a0f9953094138fdbd86d9d34e9d089bbc
SHA256acec723b8640f1d51e9dc6d2cb37e09a789ba3a60617d8f00695babd134f1135
SHA5120c1250640ba958684f5a72f2a29b0345f16a9c0a0f758011ec156d5304e0bed73df7362c7b7478ab3c89a932fde1bf41b93b2ecfd4c8057cc62553df5d952431
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
14KB
MD5610d869d87f5b00e24ea78123e10272f
SHA1978d63ac97ff936ceca2cdc7801523e6b03c73e9
SHA256927aeab764732cdc020818653a68b821a464ff98189caf25fe3791bb89e37094
SHA512741d91b37b59bdf4109a738d5de180dbb7a290d698033b2659af28795a9ff2d25eb1f3680e70a08c2dae7d4e5e5e5036a1db3fb9564267393a9a4ecdd6feb90b
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
17KB
MD5b6c9457f1786fbaed6ca1d72fdb38a37
SHA10dad9d566336d5e501da4af30795ffabcc5a4667
SHA2566a0735025a7bacbdee665863af0662252d33b02bb6d7c9449d24e9931514c4c7
SHA512a4ff3a5c2f6788bdc18d73a06c838041c9ca329e4b5b286a3d48d80da55420f7bec4528fcb372fba1d92e441debcb79b4e840a19cf0ec2d2f82f3254496fff92
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
18KB
MD59b664d7b68801e0ac9a2f79e8067f178
SHA19422044f6755c31857f002391700bb743ed3ffca
SHA25674cb431e34b71b8f54d20f2d8e9f34e5e32004f8f27071b1d8dcb3abe3f18d84
SHA512f848c32c63c826b6d3e5bdf09432f534d674541f0e77d00e9c7bf8edb202614c8d774bb21644cad8f900d353fd10c3eed358a4a71ab9e5cbc84463f7bcfe6387
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
22KB
MD5cd438c685d7f0d97ebdefd238be997d0
SHA18af0142a0246c5f181daf8aadab9b0e6486127b7
SHA256c9a820ad651945b603072ad317ed7e9114dcdda3f5ce859d4d64bef19ab0c26b
SHA5129667a520d4f408385041d3f283f667066ddc7af0ad927dd1293087aef12a6c77a6ac8d7d683f1405e477be072ce4c41554570db0d6ed3aa19c7bdcfb384a225e
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
30KB
MD5b8de4a22579b07e5272b27cd52dbb555
SHA1218f7c1e409d9907be7b72f860963c12f769b4a3
SHA256bc99bcf6263cf4f9e701bf1b0a0e7733b2aecd98054faa670423ef08bba0c648
SHA51297dc0aa9db4377db8743f9cf6db83000c13fde8b6a11a9dd557187f9aa7b4c23f057df5c663087c33ea3898d66c1eae25f5e7e8287d2e98106bda860ad6f1f55
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
32KB
MD58d42db51336814e8a8d03edcc9786b25
SHA1b0227810889155715174c799f08a9e9f92e00924
SHA256622c1f73a0a8026ace44882233ca9b4bd0bf16734583b158c3e8caac1c0eb57b
SHA512a396316e04bd951ebf53ab0f6782357d61578efa0b175451672e21e5ee2915b934fed4a27dca6cfaa1a7fe2704cf1cc138d4ead02fa97c9ef08fb0f529cc689b
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
33KB
MD54204fad37384b5fb492b8ca1212ba974
SHA1962b8ca3672300a4d5cb55ade634f5a50436c40d
SHA256c5f9ea99e086aaae4e5d5a4e1b281ba374252ad763165e0abbd184f46abbeb1a
SHA5120dc48b5d90ae2e757a548a3834ca2b82cfb181f8a6af9fa0a72662fa42de5911ec2745d559d1007f4f7aa6aa2ec96f6086a7dbca403fcbcd89bd971ae2ddcca2
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
38KB
MD5f3d8dd0c151f22c5d5dee3afc76bfe84
SHA12f96d17f5291940ef113a8578b2e1ad02e45345d
SHA25629a22cffd2ddead3fd5ad885e3ebb75bb9c72b2fd171a5043198a0245c233fec
SHA51293d31ea1819a5b623a5a2cde1a74e4c868cc2bcf820dad2836ad57dad07b7841a2d6549eaea3477c264b551ed54627b39ed4cdf1f0f6ea4021e4df4670c0cd14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04Filesize
471B
MD5dbe3a6f90afbd158084a49f835827355
SHA1c8d99017e52a67e6be97f54ee3ce8af71034074d
SHA2562d2165801e3a440a742992aae83042c09ff3585f9ff78e0629c0601dc803164c
SHA512674a03a078c6648d2ac47c1d3fdab3eac90d6b48728a2487905817d7351a4e7c8c9bb2a631df943ee90690c6fcd18124a4d22e41746665b6b59b06b59daed34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04Filesize
400B
MD5e41d9cb6b6c6700b330f778e99e7a57b
SHA1a3fea4c698ef1ea5812a59e1024a6be1ec281dbf
SHA256dbcd79da1fcc67a1366f65df7adf7bd305005dee7274c81d11b7684f01b5b022
SHA512c7ced5a920268832592d1e7adaaed76d97e5596cbd103145918fba47d949f38195062293e30dfb5e52f5e1de27896ea79687e9de124c2d569408fc193d522936
-
C:\Users\Admin\AppData\LocalLow\rbxcsettings.rbxFilesize
96B
MD5b8103cff5ff17476e28744770a7a8104
SHA18cef04bcc6fd35d9b10194c8c71b8162c392dc97
SHA256f8092b0e1985fff05d3ea09059cb16a2bd01f47c13355da3d1e2dc9b7a218e8c
SHA512e07b4d16f14d0d3ff7dc30d28b6f30044dcb87bb818347e8e8f763ce43f340e96f791762c8ff338817ca17222f4f8b79e2dff2afc381cacfdab9ea0ee781d234
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\1508469439\2023061006.000\AppsDiagnostic.debugreport.xmlFilesize
7KB
MD52466bc3fd8f406736f82e91ea1a8534a
SHA1f377259d917f736c3e3cdc62a76f6522a988c754
SHA256c31e552d8646ade170963430a325ab53a0bb42bf00835d032a1f1b048265a80e
SHA5123387eeb788c8832edc2e184c1fdfc0cc07702a2da6d26795e8d93aed1749d25d6ff5570c8ae32f6d394f332edc592bfb273aaa5a37277f45d678a11049d69a35
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\1508469439\2023061006.000\BITSDiagnostic.debugreport.xmlFilesize
4KB
MD52fef9a212970006e455d2603bf18e43c
SHA143fc09dc7a1d0f5f463e06ca90164a2fa585c4fe
SHA25609ce5d63454cb7480e936a0f138881123f1a90d7a964fd99e958a7cbaee9a6eb
SHA5126faa7c12d877360054f2cdfd368d2b78735c74cc4f54b843258f336a06159729859ece3b38bc0e77bd1368c181faaf01089ea8f295ab8b03fb9e50639adffb32
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\1508469439\2023061006.000\ResultReport.xmlFilesize
3KB
MD5add942e9a348d55b75883942ddaae2f4
SHA189f4fd57e993ef2655d377d8752a82df482e87d4
SHA256a52097ad98c3319b6ce24c5acd152396f746f1cf790e44980811c37c465e55d7
SHA512802417517fdf5196ea26debb1e9aee8adfdf09a70af996a0d8fcb86757acfd2636421c779f1321eae501fe15deb2a9dcb9ad28e9707d5fb7882fcd567ab4edfb
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\733862231\2023061006.000\PCW.debugreport.xmlFilesize
5KB
MD5c2b741d79c5d2c198ab1e33d1fcf9c83
SHA1aefa03c3b010d056db4cc1ee102872cc40081ba4
SHA25612b046bb8715f6fb3cdec84bcfd1735f49f22909145a57b7f6cc2f87af77c430
SHA512bc7d2602b041df44afdebb4cc94678260e9e5a8db7c82e085c2b5a69ee24edba9dd55b04586dc640a3c4ab5efefb8c74ea14df2c305a575fb0c2396db5ee5ba6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5fbab354013f22bda4e6b9b30404ff61a
SHA1b23b36d993d4c87f3969b853e20d354a09c74c94
SHA256ef46d0cdabc081605ce6dd5e5ffdfd4cf7e1fd0c15e0a6061009e08fbd2dcf05
SHA512e338985644a5a4af0043c2e8a35e55017e7554559637ccedb663c6b74c75f2203d514adf483ebb5fbbc1b681a0d57fc22d4043f8c173ab1b831dd71216591439
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000012Filesize
97KB
MD534b97f8b9e4296af5238fc8f67586b72
SHA1e6c4b92901c1a9d8aa6a7247143c2560a90efaba
SHA25670c158c98bf7abf5e0bb3167edf6ed0d378f9380fabcf281cf0fe59623a0c774
SHA5120df677459ce64c61aa109aeabcf8f91e5a19a98ddc3426818d5cb256e05abab604b2455296e83fd4687798f6f241d470af431ac9e153df95283186c28c3ab4d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000022Filesize
49KB
MD56983568534e8cd4d346a2638a0892bf2
SHA12df1d616ae8f4989dbe9427848e5974b195e0a5a
SHA25602043e5d2b23f9582ee2645e55ac26e556496bf25f15d146eda049af1f8553b6
SHA51211a02ae3e51eea6768f8274178feae2da5398e6c5f62a5d34146ca7edbdd484ff85e59a2e1c61a8c0e1a1eda8af8f9fe9d5470cd357c2b424719b41eb7effce1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b0Filesize
20KB
MD5740d5efbbe21e49b08e78a63a4f47b00
SHA1b28bf093b8030c9f37c94f7b2c17e4451312a031
SHA25665c20a747dc3cd63e7f2fc629aeb1258e4b2828e9b85eb85f70ce500c8f137b4
SHA512005b8fa6cca8720bbbfd67b176f031d7dde7475503eaa9017a72d234724e146257ae16b7f9ba73a43a7bfd51f09b43fcd0e08db9654027686109689502840073
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b1Filesize
23KB
MD5e4b0d20f483b4c24ecffd4678479e3ae
SHA1f0f3175f2c92922d123eac1e3a4c5bc8f6091b49
SHA256ab25f94f51f31d69f3a7ff1959eafe9ddf3fad8e983fa216c91795bae573e13a
SHA51254dda1d96956961788768dd0d5cb0ef9f660898b3b4fd1f6c02d5b092fe3629cb38f478e5e2fa5b074963616e63a235593a2de9e3fb420b502b40ded7430a715
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b2Filesize
42KB
MD5c2681bc0c933bc8b05181356604b7d6c
SHA142fc31a19dc3a9a20b760bcc7e6072152465d6aa
SHA256d214e5e1eaca61e9fd2fabe4c7ab79de36bf322138e3971a17f5f5fb9bbd5a67
SHA512a82c8847126c8ed4795f21612745a5c5225cefcfb8696e74f7d7c773c558cadb68ad7dba4de8d9e1de55d6592e956c590d590e74076a60cc9339c5e66d7d20de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b3Filesize
42KB
MD507c9db325534c6ca53596f5031c81dce
SHA1391f7e3c06683ed34c0e1c581d71d8f566524980
SHA25659c1e0cc47656932b5a9371c73825c8486923a70155199c7b1bc3fce2858a235
SHA512389cc8fb07c9bb639e9809800b085eebb098663513027cc76ac8790002fe40d7246e1e2a25431f750e27a2c5a84a4ca5e6b403aea756115de69fc48ccce27a3e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b5Filesize
29KB
MD59b5ef1b7cf19dbdc075f6929ee5b0898
SHA151411b7d1982526e2e41081b41a2304170c76d20
SHA2566848ca275152cb21d5f7f9ef6f617fb5ffb3b1cb6431723b905a2463aac6dec5
SHA5120fa09f07ae2e213174663621546c8645082e95844d613e42c35e97edc839d3ff6dd5cf630a17c5827900fcd034a85ee20cca1fabf14fd1071730cdabb1085cf1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b7Filesize
24KB
MD50a0ddfb05a4ba9eb584bde69886d80d3
SHA165769a7f025e7cd004a6b8fb4b185f297ab2006e
SHA256c3d5f8e609d7a02e1030b48e6f2bc8370f884566fb4436af0046b6759e818daa
SHA5120b704331d2da398521155c7ced17b0ba7aff8ab54434b1c29d0464895fb9e02863f4c2cae0f94501f40de6fc21ae30fcef9106d1a987f84f173fd1eac6afcadb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b8Filesize
59KB
MD57fd069146ea79b16633bc8b45f90482a
SHA198dfafac54f6f5db51e3baea698208833ed1b642
SHA256a746ba588555b584fe98e42ac1a2dfbb92c2831b54c263f51fe91d124b9214d7
SHA512c31822f497ebb35a5da455e77965f16a83e2007215ae88e64bc21019d8d45fff4671ab4300d9cf518bd2b652d071cc582fdfb99b4807c75e2022755e6c60a06c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b9Filesize
85KB
MD5d4a9bb7e8de8f088750f8da0db9ddee2
SHA1d66ee47dab71c9574724661c929edc45bee2f21a
SHA2560e10069fab6bb3083dba1b56b844c6682e9092ddd9d7932f78aeb902c14a712c
SHA512d351afa877d7abb9152631d5aa897718b9ad10a87bbada7852891a814ff95a6acc961f81641640ee061f7207df0742b5e5ed3d833fea0a1ffb5e0aa219686c70
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000baFilesize
16KB
MD5c01601138955be79d1f85f858bd0878c
SHA10df12604e2b6d37155751adeb5c7ba888950bc46
SHA25657351ebb593c3d775db56cda803190a5032c89a7459585aba724c24279f7afca
SHA512abd8682984d4f00f31029701efee1a5223b74e564cb54889e50685c163356e820891f1a9ded1c86a0d7925bbfd1e96329cb2e3f5cfc2bb43d316860553b7a745
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000bbFilesize
20KB
MD5efd99f6b50b61e6bc88ab81db271f5dc
SHA113a91d8c6aae48306779d950cd3da773bac54a04
SHA2563eb3416904e2d4354a4760874b015d4b7ad0f4f231889eb2e80a7c2ba79c22b9
SHA5123532987383c85b0cb80ada4314a3fd155cfb78d23470aa7ea43c40342d48982bb8b3824b65c05fe496662e433ce65598cc902cc9e51d6a32802709683221e160
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000bcFilesize
75KB
MD5cfb96d489d6396cf9ff1d36b0bc3f2af
SHA18f3b89ac3fc5d643c52c756df11a61447ecae12a
SHA2560006b5074c1baf60711e705e813d3356bf535839eb102181e4ff86d017518443
SHA5126e119685d776ee708c0cc11d5ab8e49ed7687980c07490ab4b8d859a4f511bd67988154bf1d308201d0d8104030eec61d62cceb84e86d1f35525a33872ab9e34
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000bdFilesize
50KB
MD55c5d2dc6bbe0c2c6531c37fbe35786df
SHA10753504bca297b70ccf10065b9dce22ecaa379ce
SHA25660972291b92b7c264b27f9119b43956e5c90ca462332f1378e6d3bacdec43f09
SHA51226b65df73c688503e106892fa96d9b6c7d99895d0ca78773bed28247d827b21febcce39e6f52d5be5c293284f596bba48e82aba4cbcf9187e2626198584266f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000beFilesize
59KB
MD50e057524bdbc36de5063efb92c47fcd3
SHA1ddcb5a7f336cbefd51ae00f5e46c613d83aa3a2e
SHA25641f1c5be9e637cdc83b271ff2d441e541ff6531529d8ab97ec25167989bcfde8
SHA51279b7165fb1ba74faaaea920466b93f5d8e15bd00635b22cfa0f9b757f3103bfb1d8ab6748ca68421f0b793cbd2f48305820c46fb7f774cf726723321b78dba00
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000bfFilesize
62KB
MD535ce7e7a6b67453488eefb7d51d1995a
SHA1439e762440fb2a9a917dacd023499146670bd9e6
SHA256dc9f1caf895b7cd6358d43d689cf8d17ee1c5a9b52e9dc3bfa61fe69f472e709
SHA512f9bdd8f482d38568d84ee1d09d4f1d3d123ea09bd79bb85ff9961a520fd0bd8d3403e9a5fb8ab19f342d10e2b4a38e2a20e501ed07732ad297471a1d7ef3e19f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000c0Filesize
26KB
MD57b6f20dc3aeed86069e87bc52d676381
SHA1a99a7e7f8cff8fb5517eba117cf536291fe512a2
SHA256470818ad77973de0b0437639b63be86d476dea657c4654df24fd99d82842e1ee
SHA5127158b68fc50f4ba83646b2e34c3d23a088cc3850a5549dada4282c28cfbb80f0cbb56ca09f5fd20b050060ae8a26900777d875af4fbd27c461513723b6e14384
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000c1Filesize
100KB
MD511a540b70930acd3b3aa824cb0a6c193
SHA18e1521d83c29d844ce970dadf161988c21c54da5
SHA2562575e3d778070436dcdf2bdf3cc09cda0b4b6e9c9d39817ce130947db4145cf4
SHA51221869e8e012a518fe959b1c83d38b9d7d48bbd5f1bc7be007385cf00f43148d797735118c901214e0b9d751577669d7f7ff68d83429b82df7436408f0e42f0c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000c7Filesize
42KB
MD56eafc48312528e2515d622428b6b95cc
SHA18c21c748004366757a93c587668ab55cb6a4bdf0
SHA256dee6942321440ad24c989d45fd96bf0c0c11e63e04357af2128118eb75eb887b
SHA512c501160df9b93014d510cd22060704b434fac4c6ba242d3e625e1bb6e838aca31889197e74fd4d082f4333147ec18197b2a31619d55d37c9157ec275621ee64a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000c8Filesize
43KB
MD566d562e3299ee732a53db150038c026e
SHA1f514a9e346cd443d196c1bc401f078a9fa147323
SHA256252d971616775193836fe6c0c057edc13c511ed2bdbdb61fbe3c4567a3a8e530
SHA512ee24be2709cb98ccbde710654eb1ba533e432819caa8c6bf1fedfeceec452fa3c5f3b2402efc06e75d59e55b6e7beaa71f88bd049fad8e17449c0fde217a6468
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000c9Filesize
42KB
MD53c102ace52ea35b16da4383819acfa38
SHA191a9953eeaf4ed11a424ea57bd3c2dfaa686c948
SHA256eb447eecadbf640fa5e062754192cd7c2b60b4d37c621320ca3eb7ab25b0c3ca
SHA5121fc15585854512f6b5652719b8443c3e421eb88699035f18a6e13de5528b72d858e5bde40b9c2863effb3c9cd570197fc718d0c2a61b334ef5133efabd050a95
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000caFilesize
41KB
MD538e00f7de6f417aa3a458560a15e2b8a
SHA1b451a3a2ab0b04170804d6cf823c6465f33f6f44
SHA256cafe3fe334035fb21ebef6484cfbe1efa85c46f02113c57f8047c875fb9928c5
SHA512659f0a9a53e98b2e5dd3256c55b96e5cff82f6b323edd5f92f8eb9897e1376329454734c6c799963ae392833d948eac84fb9b483a5a099c9ab942990a18e7f91
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000d0Filesize
16KB
MD501d5892e6e243b52998310c2925b9f3a
SHA158180151b6a6ee4af73583a214b68efb9e8844d4
SHA2567e90efb4620a78e8869796d256bcddbde90b853c8c15c5cc116cb11d3d17bc4d
SHA512de6ca9d539326c1d63a79e90a87d6a69676fc77a2955050b4c5299fab12b87af63c3d7f0789d10f4be214e5c58d6271106a82944d276d5ca361b6d01f7a9f319
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000d1Filesize
31KB
MD55be09c7c686dbba1984fc1a2bacb772c
SHA1b0626f753ce1f18bd01b5c29d86af92a7152e07f
SHA256c85491a931fe791cd1b23d54b42bd7abec503842ed5cb76420ab365c4ff45b4a
SHA5122fb59449fa9a0334e85c0342352037a60378e484ad0e0cc417b9559fa8ef7ac81c972a50dff01d177db0875bf244b3ba90bda0565e269be8e745aa7470e223b7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000d2Filesize
43KB
MD50acd8ff34f3a5c177d02e9011ee74eb3
SHA17985774d3676c27586c71bbf28b1f53598951a05
SHA256ecc55e4682a2b83956e183e86dc4d475e91bf192ea71faab52a8ed8cde83a3a3
SHA512bd5402b5214bbe9e499ec5cd9c6933592e1d3599ee80f72fd2ce2076fcd50dbc355cf3d58e923ae2400d09742768bbe9086c7cebc8d2560e741726bb37374ac2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000dcFilesize
21KB
MD58b0bcc6760e2bfdd8c11554cbbb5007f
SHA118f7d158e9f1314c0d342a0dd058e348cedb3bf0
SHA2564606c5e54504c0973227c166652aea97ea0d1f2a45ec48d655e234f0eae3a295
SHA512567f4c9373e3778e874e75fe09f1c4046793748c30b31d4f341bcb1aec95d5a09aa72a27fc35f782c099b73dc4f965102b5898a0d2353ed2e90ce93b7a4a901f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000deFilesize
41KB
MD5340b6d5e9efa59910192b5b4bf2da623
SHA18484d78237b195a4a83139a39906833209b52343
SHA256caf0725054a38d929285d5d1d726f19ac7b72c8da2b440f259092651f8a426a3
SHA512391e986e401240f353eaddcd3e28eef6541470db41c16c024b3aac94017e88b46151b257f120a07781a2fe8471ae65db1511813cdb36ffa7c0ac6822e28d81ce
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000e5Filesize
18KB
MD5c48224dc7339c03755beef529becce72
SHA194e9b96e5e07d33517e4aba83ec41724bb223732
SHA256ca29dc538428dbca52052446ee25e557d56d74f4e016917f7108f7d80b6b5bd0
SHA51240956f110491581300e6f90468f06b585d686aa8dd3d6fb2d4fa30e308f7d48c96aa68203aafe806dd1051f05150ba35a54a6fde23505673ccbe887fc9bea839
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000e8Filesize
26KB
MD51aced3599af9a77252da4640661efa67
SHA12cc0f3fcae3ca945c2f36b8d49580e301cf553e7
SHA2565e084522c0dcdfafa417f0c0ad5624aaf1ebbe917fd6428802189d7e5dccd189
SHA512abe25cb09abf5982913d2c73aa0b7302a47a4d44e36f2cd760f8e30278ef1efd5cb9eb38cd162972594196a7db0c36c00619edf7cd72e00385d9bd5abf41ceff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00010bFilesize
25KB
MD5874c4625693a79f54f697302a283b95b
SHA103961cd7529afd9ad3429b8086e0e40d3cd53470
SHA2560a7997fe68baeca649f2d5dce158cc6021aa0c73f7b37e4804fb827b0fa8ccd6
SHA5121b241005ce15260c2b68780bc42ec9e49161de74360ec24ae21a39a7c23edcb7938c23c578c97c04c5829f4bc5b0eff3084f89bb8f0fbda498db2a676bd5fb6e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00014cFilesize
37KB
MD55b0c0d429185ff30e04c93f67116d98f
SHA18eb3286fe16a5bee5a0164b131bc534fd131f250
SHA256f1a0b957050b529afc0e94c436976326124ed8968183859c413986487623294d
SHA5126295bcd662325172b15c476d26f23c8794c4f1454e0e8cfd43bca79b45aa03e1ae721ebdada1c52fe7699027fa97699156280ff259ce3cc476e322ccc0337902
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00018fFilesize
48KB
MD5385988367cfeffc830638c03d4818acc
SHA1a2fa767bd472f644c0843e8350ca0d36c87e03ba
SHA2562dd5d9828b09b0aa907f64b6d6658bc7a611d087f59001b13ded6dff843da7d4
SHA512e5f9f5abeca7ac77abe7a9d866c4246178ebd59a781fa3e4c83e43499ceb23f23e2672a60c31ba8bc248c26914f16216f993edbb32d3af2b5d0201881f59a735
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000190Filesize
742KB
MD5b2a58e6ce6b8cf9c489269038bec0a65
SHA158b09be9809c4b07f2583dc6c90b294fe6aa69c5
SHA256c87184a59c02009c75256f837f1508642325c1c41fb7dd1cb4abadab31095f4f
SHA512f7e2dccc0dc862787a9ed7a38c9ddbbee0e990d3b0d89e503c4ff9e549b26a8d227f03b678a37efb6d67410ca7fa3e718a49a49a1bb6ef86a4eeb375d7bce889
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000194Filesize
32KB
MD5bb91a4ce65610ad28b6d2561e4808e5c
SHA11d5e0be7cd264dfe10a168f604468e6081e9121c
SHA256502625806f706a9bc6826a93b9f057849b12c268815eb439f194c758afc3613b
SHA512566b95051f83a355a7825417087e2c6fe8f35db82e05524b80a614280a0ff68bce3926442bd4223d28296d396e64719d1a57ceebe0da5b47fdd3887bc7a79204
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-indexFilesize
48B
MD5e809a8155b189328a521ed5312c09e4d
SHA18cc804e7635899c8b01b796cdb9d524165c5aae7
SHA2564ce326136dac479d3df11ef2fce9ba2f3f3237971bca724f3ebd313bbc74882b
SHA5122a28cf3e9f72bff057bad723d72f1c8bab2d37154f32aca1d8ed57b262e40669f73f47be8d27023cf340920c9699623747c257041101bebf8e961583fe43f452
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD510b4ac8c4dee601a44c87eb907c28da6
SHA1a06dad9aaa1d14a72e0b03630f353038ac497544
SHA256e75492f2f862cd76ccfd02ac93266e9fb11601bbd01533f962cf2055e776541a
SHA5128d8a56a7154d848ab5e3ac0bc47e4a1da3a9086140f78d63fbaf6393df562d04c2f241b4be993068a8fb2f5d5ed93d95394e9f0b4e5bc6a408b2cf4ee27f6335
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD5a8f1473ffc146461e29ab8560cc488d9
SHA10403f7819168c9d9c9592dd522dd180a9fb9d11d
SHA256236af073f393276ca706c0a2e803609c89f3fa0444a818247ce8e87386c98d7d
SHA5124d9504ade05ca965f149054703e93d7e18905a4c94bb3e38a94d6f235a97d88a0feb085af2a926153c030bd0269bebd6434e1a49eadfa16cbd19c4f049444795
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
120B
MD5e73d2995ce90f981c8678f74cabe9540
SHA1dc31261457a98f377282e823dd7c80bc455cace2
SHA2565778f7459307dd76f0013c1daf8674cf1a6538d4c2ea86430abda2267b49a9b0
SHA512d71152c157d7b2e7eb775ef87f370ecaa19efbe313c01a368c92c8ef3c474d248e1dbb9edce5c95739a2593a75b11105337359b0b12e3608019be64744938967
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
4KB
MD529ea9d8eb3c3bb3a08a2a14d2b00bc31
SHA17380e036a69eacd8ac1bfb2ce019fde718e5facb
SHA25677b2e2fb8bb635b3bbf5930447b05ac93997dae205221c36aabb48c868294b7e
SHA5128572844750153f5dd3d3f843aca5e1e4e948a3235f855ccc115d51208e48e847e7c7c89f7bc47a3899fbd2048d23559c30accabe8f44e8166160ad6f3812153f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5c8cdb8e4fa80afba6e78cecd7acb95c8
SHA1525fa56fa36e802ff38f33058fef0aec0eaabcd6
SHA2564d1386d41affa5351826641aab5df38936ee4ba4ee8e7ce81f6f67888d49ad58
SHA5120260eb00ea882e2228b2d4a028a28a02c7ddfe60fb0656a6d8b5a34c00830e20b5e05de793b783c215c4712b7517395c50ab86246cb0864c0f33854b615685d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_web.roblox.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_web.roblox.com_0.indexeddb.leveldb\LOG.oldFilesize
387B
MD5f10c57e08dc4e0196c445141cd9c5dd7
SHA1471a7751a69d7744833f505e8cd0e42a10adc13c
SHA25657c680c94adae60818f78e3cad5d38cb1e18e55d521e7e5258d47e44d359a2fb
SHA512009d78c66ac1c95099c89efed24115f95793bf49d60f15ba65962a3b70fdb0afaeed65e99d79d5c5a2880f8236c64a77b4570cf2c3068e3ddf4fcaa7594a6eaf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_web.roblox.com_0.indexeddb.leveldb\LOG.oldFilesize
387B
MD5952f33d7654f3f785f8f0ffc74ec8a35
SHA1d866663cb1a50f731d67a3c7d731c76da7aca905
SHA2569d0bc4fa72fd99d0fb2f3c2aec914198f690bf6cd2162ed9a31a6a9b1ad241cd
SHA5121ddf4bc148138a8862700fbc645ac697c20cb9278dbff4513f453a7b3294c836c63bfcef2680303d4fac973fb50d7c4e291ee2d76e4092f29487729d5d29bb72
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_web.roblox.com_0.indexeddb.leveldb\LOG.old~RFe588344.TMPFilesize
347B
MD5daa2d6505e20df3e52c4acd7a06c34e7
SHA1c8be055b8360ed6a60dbf8f691427101d1b54fc2
SHA2567dc081789097c6c203d1abd3d89257d9f0ba774c87f769f1f896fc55a33e7e17
SHA5124c84f65f6edd0a224d8984ed8ab6b70da8714b53a8fffada50288a2fc34d450ca72c5969adcbeb84e444035ea19899bc42eacfb8e9636b314aa168e333c62050
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_web.roblox.com_0.indexeddb.leveldb\MANIFEST-000001Filesize
23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\6124e94b-ee2e-481f-8b9d-1a17505d6351.tmpFilesize
3KB
MD533a776a58812e1e4e325ad31947b2002
SHA1f4f1f7c8ac63ab60e6d84221088d5ec1b8464fc0
SHA2567d3874d3855e4e281d4b51a49acb5fbf9b11582d623743cb5560848288386d87
SHA512a0dd00bab90dd21939bec877a9be701d715d6c450270245c3e9285148e007455b4fc8dd269a73e35fb947bfe563974a3440aa651ff4b8dd1ffe9639aa4f49a0e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD53c2d441e207471ee756fec30333bc571
SHA1cf2d3762dda677ee020394da60c2da4b6f68902c
SHA25654895e5a15dc3ec1333e4109551953713518c525e1ffc92091ef52474830be19
SHA512788f8e19d6523e83bfd48026ac40a544e850fecec46ce6ec8178cb17ebd28cb5170ad46e8b961e71d4109141d09ccede651a21a63ae19179e823c48d14e65f6e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD561379e39fa8aaf54c360e6dc048eac0d
SHA10194f0feab2c9b1067ff8190f202be70189900f5
SHA256dfb2946ca26ff0152e91224c6f105e39f20fa43bbf67bd29ac6dc08cbf4039f3
SHA512ec2f1612c14e01c14755d635c9690b68fc8fb892a6b760bf3cd053048a9d56ff38cabc034ac03e10fb09446f4da916609fb065183bd8f589e943f4fe9ff7ee3f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD568701a3f79ba9636f27fc71c77cefb79
SHA1286af5f508ad60c83629b49ab34330c17acfb137
SHA256f8ae6c4dc7fa2961c7a18a0fbb50811f76b74fb1cbba510879869ff1ec2b0364
SHA5129b7c189c17e043f5489f32b09569df68e5983cd3ed0af6a1287c23e1912c1970685e51234fa711c6fd3e2b50140490d849c8fd0e34a5440b785e20c33958ca50
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD532791e30f07eb7abf5c398465d5cf951
SHA1872a6744facb79aea3c73278533c1bd800c84bdb
SHA256268f1e1e39939a2739123bf9c9fab74570fce4f343a9d521b87406b84d10490b
SHA512e61740217d513e7254afa0da123070a7b0c702b74ca04fb40fe641dc0976c1a1c82031d5659ec20b7f3c746f8d61f2367d123ed17c3ebb1e69fa6c0910cd0989
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
7KB
MD58556cec9934e0611efec78fabe685bc2
SHA1f3f721914907ec1385fc6201074fe26742cf28c5
SHA256ebfec1fcef53ea880eca5e3605a8ecb631d9edcb683e6338f91f9da4ef201c9e
SHA512013a8a99548d6b16e41b20caadf9739c9806543c80d66d9ea24cc10e064d3e88f97ba378f29d06cfb878b6b6c7fd7512f51440efb8a887a6fc3aa35ae29150a1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD523d0b7885af379bc8fbbf2036adb81ee
SHA1944da09c888585bacf53c6c17eed19e23ffb5e28
SHA256d4a10245f67746faaa48c314fdeff0b33e291b2c657ac9fe11c42293aebc46df
SHA5121c67a9c7e4e8729d6422b5241502bc2588fae2d90936fe4a3b28697bb375128c3552fdbd8725541a0b7950454de950095ae4f31ccaf4d73797d7c4acb67e3cce
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
84B
MD532b9dc9cc81d0682e78627c873fdd651
SHA146c486386d3e153c3e9b11d54cb52cf0064b71cf
SHA256712196693e3527ac1131831f1a2108b6c0e5c68967b26d51a452611cdfb86e0c
SHA512f18bc37f8b72411548da247aa1394cc5ac03c3bbd98e82eb8ba290ef239ef5b8625cf4835bd41ce7c52766d0bc3bfe9150dd22dbf62f0f05992ddde5fbfdc811
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD5244e9d7ab6fd3699762d199bdb1ba55e
SHA1b18d924700ff646667a1e03a124fe22f302876d6
SHA256fb22a2348b93820c0549c886d0f14168d4acceebd22d304f8ca62e0048a58cee
SHA512912dd7a9fbbb53ecc0721c2aaaa5de6228091b29e506a31dc18de3cfa9c46661fe1043ac09eea05411cf9a6875472e3d7cf1b9ca633b85db010ea9cb55900b99
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
203B
MD5797eeb61903d7bae9bc80a29a79ef79a
SHA11aa92f822add7c7e8ede384087e94e1bfd6425e8
SHA2561f003d258d8c5f4bb38a746989057e514ba1d8884f622e516599b251cd4c61c5
SHA512fb2b21941bd7f1f946fb539bdfe0bca342b8cd5722b47325f89b6c98887a238ff97cf17afa8e7b13c32c1acb8a814665bbbd062d094a81991f0f7ea58c0e10c8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
873B
MD5e6cecbb8a67e36af5ca41635ef0a4429
SHA192a466790793efc622eaad620fb2aaeedf564123
SHA256eb6cacd1b5c64e78c85eb2c44faae00c513d397bde5b0730631ac320f5002dd9
SHA512a33cffe0325a81266030fc89a4d621d6689aae85ee9fa7dc60ace138c95bb90f673c15cec574d7ea316765b0d5164a2fd5820fa066c4f8a26f142404757fdc18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD5c61e4578d20e0813284058583a905092
SHA1152b91252a25f52643d9bf5c5021504bba43f890
SHA256c5829ad09d744166e69fe0d7f3e4e50f51ae75abb01e10db8cd4d74d51ae1873
SHA512143fafe9b987a6cb8d8cebea99a4ca304dbeb1c87200eb00584b8386d1fd1868a9bb68bc6a663277be7988ce3a47fa3447ce9f5d82926623883ce4de431d3610
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD5e9153dc60162a47779fabdd59b9c6b98
SHA15801be6f3a6aa82d2a9ce142c3127f9d6c4cf709
SHA256143e8b63de7b57b706b8e5371b135ab1179f4060145fc06c6c274f25f4d3252a
SHA5124f13562a7bf24f567b01b36b3ec47dafbe8b90ba4b1347bcbb4feb137c4d0b865bd122f9d274245042e0f657f5d599794ed1277854b70664ce0b8294931cd7e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD5367a36edf50c1d9eca49facbfca5734c
SHA1d36d3db0d1ad34615e496a4a0623c64e86a92ebb
SHA2569361b88223e8dd64bdb07803a6e0b27d81c92712bff096872ce249415d021e21
SHA51242bc1ffba81a9088bcc7181dc21347d5c02d531f133cebcd310b989db53328520d4de718272daad8ea93019b572bedc00619b751497a9484d4fd1b25a38fc967
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
7KB
MD581897d8c3b9888ea976f1b2c5c997730
SHA108848fe7313b3592d26ca29bda591d34dc0d2aaa
SHA25677b0b55b02d3faf409de5dc97dfcd7fec00b7e82e0457e28c9a06920f9c0252e
SHA512e59d681bac63d197f3ecfb7c67dd4da509c6dcebb1c93df73d27fb97cde89f024e9511afa69a30e7d50193beea5028a3677d4eaf0e9d46ba25511491b4c9d243
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
7KB
MD550a12eae6ca7a814f40b94bc8f57d057
SHA12feab6d5803fb711a8d8812beee66a82aad9e7f4
SHA256c3cc1eb8e6fbdba030813bfea9cd9cbcfaa4ed5e74d50fba5cfd4aa2baa3760f
SHA5129bd6339ab211237040e9690eea1377c020962bbe6711110731d8b25fa0c788a28677f0a0442c767ebc5f325b5b46e7cf61c5f0a6cd986e0d6e5b896b416e49af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
7KB
MD57f04071255be31a4d636ec6eca6107d4
SHA1d0052b56bd265eb00bbad019dd8a59ec34ff8a55
SHA256dcad42d8228031c0feaa535acaa4e7710a9c5b59f03a6d993a7293bdf47c3653
SHA512d2d223126d7c755c0a5b963cb0d87aab5314fe05a01a5db2f9bcca46f0ef92ec436606519a8acb3dd2acf63bb3d60afd4b791d07322968d6ef1a4612ece052a7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD5c8f6838e4d786b9a911c096f830b5bc3
SHA1d4ac76017cd357e9479bb2b03f9639d777317226
SHA256c04e7014099a3bb5913f48c8f6dfb399b16a5a6acdecffe9b209e8062de3e748
SHA512ba762961750160fe7aca5cb8c80ddcf707deaa8fb383fa6f6a7355c3025b38408cc6e7b389219d129bb5ca6efd7b28eb8faa5f2b71e798a63325abd506cfd2a4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD55b389079fba04a2387093bd2ae1b904d
SHA12984ed425ea6718663f75dfde335bdc6fd3156b1
SHA256416e6badab56716f0ac458006fe3ed057b3963e2d18334663044c072f3ae15fd
SHA5122607303a8d6611d3824f86960b06d68e042f1b4b315b1cfca2c2aad7d2c714582a2e825612775130784ae9513612168d79da35b411a15689e2872d25806c6a58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD5053be724ab23f38ee8698b7616c83a3f
SHA1b8631f14ff79862ec12d2ff7733120e474f56f79
SHA25644ae1ee36fe24cc83f74e2e0156447f34c816729f782b0b7cc7c0140ca82f50a
SHA512eac9dc128f496d536a26ee5f844e96b645b1067d64b162de5f178b085bd2ad15983518b98ce136ea7a541248db2a7c3aa6d1fbcbbb75d15b9f0ab4b115c585d7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD5bc86ee4ea395d67fe9df9f43cbd339a2
SHA195502b33a9ac575d44b16a8e48e56cc328928b38
SHA256c20ed57574bcc34618995430f316e7e2a673e10a605a0e64c0ba9e8f4d83197c
SHA51294cfebbcd96637788ed08ddc956cab45b4187c9f721ddb20c2bf3b0a1fb7ec49f24fa4b501fd6e6381fb2cb2b7631d8298c9477f1bc0c534ddcd415ec930803d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD559498c21892c1ab362114583cd37424d
SHA11115839c0d40e1bf673044612b42f35a1773c9b7
SHA25652fe5ee152f98f4d047169d18b8ebb914215fdec1fe8191857d9114421a833be
SHA51201a8e92fb135dcbe52e7adf466328af7c3d4cc0c69280e75bc2c170f27178ceae3902de866e62af0138f0a8a88924e822534e186cc41bdb284c8218c6aa0704e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD57087b3f10ad2b6f7f315478e4e15710f
SHA154433107b05c0b17e9314f95cc129a2ddea57933
SHA256f245837feb00c89f335a72ffa4ff2ae6d2ad6d4d3cba733eeda6924ef484e39e
SHA512e9e1651e506e9ed5f5ca636e8a3ede37420e2f97008ffe206661438dd32dac53dec04e74f50ba388e10d367ced34a6c20038245a540e999e6727eec8952ce582
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
7KB
MD53bff169a5a09ab3fdc1799f991b8459d
SHA14be8cb5378a0ea58455d7fd19c1c5eb58f82889f
SHA25682f46631d6b4be5b8105cb0f551d2b6c722e6e98dd150c5ef3f8dfa05cec1a12
SHA512b6ce2236be5ccf66e848d38a2474086d02333074116bd2b8641ffb028a3a21bbc4f57000ace5f26986c9749c9d2836922d5e5f30d72db592acc2d992dd53f93a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD562858dd05ff4c44e1f48a1bc6b5a0228
SHA1f90254ecc02b793a5a1f971aa50d671e75bdcc31
SHA256ed9222910744061c0a307ae228eaf822adf178caf2f2d6609b8b03d6fa97fa7d
SHA512ee81b1b8456caaa8e6c50df35eb09c9bbcdf56f0c50c395976f185ebe1369084e90a3779cfcfeeac76e6194ecef12ce76415f03c0944a1abe47f584f1217ab5a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD51edd93150825d23389bf6d7f9c8a9305
SHA12ae2200bf2d36895cc2ed9c2cf2df36a2c792867
SHA2566e4b4e781e86453ec1c6d780b1c7134a49acaef933372b0f2a5fe023f7a6e63c
SHA512e24e0e7fa58f536c313a1894a757ab2f0574f374c84b75a64c7d8adf96d2fde3922dbb7b60a15d243924291f0b2fd9cb694dd50634174c1340d207f3525cb841
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5423bd33956720329156fb818d900c7ba
SHA155c52c555483767bc7efeb5e713655d45f95c3de
SHA2561019e8448d6c7b4a0428368e5fb86904bf22f01f41db2611503ee8d8398401e6
SHA5129f68b7a478d3fd594567cfb1bca07457aa6982ceaecdd02f6aac2c79a8a49d69de2eb9b06682c4f4ef23dbd7497ac56c27360ffa52df518641204dd247ddf58a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5477895462ce1e39a7d9763043a7c48c3
SHA1e43e910823961eefd61cf0f2d2bbbe1eb654f7ac
SHA2563eb40694f00167bad8c99174d6182cb0af588226fbd9f65fbc751e121735d606
SHA5126daa01616b625ccb549c72f19478512c1d3f9819ef928be03c00d4af1c253c571edf277e5210ac26b864ff79a1f2def4e5f1f7ebbb807e11a85545e803851092
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD55ffbc25e3a0ec0c6e598bcc91cb7c6de
SHA1d471881583d5f6c941e4615e0ff97e38a4f657d2
SHA256e64690503b4356ef8198fb7333db6d613ad1925d67d25c33bebf71d6824a12c3
SHA512944ec8f6ebf681a6a0d06339a28c3d9111bd6c0271aaab5dfc9f0c11324d3ffc851c36a4490b14a6b794e78ec150a7c88cfb7e7764a32cbc54569c23dbd4cd7b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD55d06e5c79929b7f0aa645ff6fa61ab5b
SHA177523461e1d4f828afe60702fe92bb7be2e1b26f
SHA2569a86fe10fdd258891146cd97565787a3c7b5b5e9650187a9ad07ef056acf2664
SHA512ca8d6f9610b92ece9f7b328dde89ec164a7432ea94c2b76a6cde7ed9caea461871d1008d266b30fdc74a45576531924ef558b62d68492a8379cbff9dc3adf5b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD58c54e10c1f12b34537a483866d60d335
SHA137ecb3c80645843845fde67c47a30960d6f955d5
SHA256718a3ab14515ab95354f89992d725ed0ff1dc2161709dc38eb65e3e507ec8340
SHA512741f7e755b6a1413a471665bc2b47155568fdef2cfdb0077736d25dd8686174cc46c31124b91eb70e234746ee443d6e306ae806b9f8d120d1fdfdd8f459d8e04
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD589780d99fdb6715c7d19413240b077a4
SHA1e9555e0be42611291d7876b2943d74912dd02e79
SHA256d43eab51546e771f8c079f03fef1410d4bf3797e98651c0b89d817b8c606f2ff
SHA512653832cbefb340b069197dd66a8d1e5a61931db6b75465c26dbb9b5b2dae2a8f9530754ce264ccb96c20ece714d7499791c0e98ac16f51199f2c7ba9119920bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD54315e46548c7c6bc7b9f31bbfff6e969
SHA15d1490ea6ba423ba49e1e2417bf9c75554228553
SHA2560399f83139d463abcb3ba1e2e3e922f54f107dabc3edf091690603048dafb731
SHA5129ac4e744079e67d3169152b7757838835efd1e4b9e36abd1a99ca7525eee5de0bde4cd7b371c549c374d598b642f5c3b9fb5a8572a0edcbab3ab66d64e506043
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD559b6e546dd42de2a5bbed09f8b39c73a
SHA186bc975d05f9b1527df73e6d16a1730d1cbf7f0f
SHA256a170f7a29d090c5094f38b550bcfd1fee81860b33dc5d9ee3845f00ae7a6bf2c
SHA5123f78c094c55fb346b2213fbac6350351a495bad6a93669d11da699d7c3cb968f7cdaa16e8a3bf74a4169390578c7cc2a13e1cf8753158e345eeee486fddfcab3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD51cf76eab2f75b1dcb560f83ef9e9034b
SHA108d0d40ecc57dae9b6091c92c2d18e0b69929bd1
SHA25604dbc0fe2e0f2e351fc900d034f8c0815472148b4e76675c2cd0efabfbf94b3b
SHA512224670b1f45d7e434f968e7fdef8d78b5e9674106ad5880e9ffa19f749ea7d098fd214df846ac4b319b7fc902a866c074999bc19a2df576033dd4007b98133a2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD53de649bccc3d1d891854639c8ec9d39e
SHA1258d4a28287834356deae085a841441ab45a1a07
SHA2566341a425c626a53fd02a485775ed21a67ec13d87c7f646bbb6090c2cd1f14841
SHA512802cb86577ddef2f1e199b824b181ea7095c67b5e7d6229737ad73fa0342d9c1ea01e82f36e479da34619da788a34a06a80331b65e457b95122084c242f0452d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD58eb4c51989a9dfb8ec7366ac9a0885f4
SHA1d2618055be92ec79b03dec53828679cbe7afd322
SHA256258865a34c0faa12013fed660e98e04414e66d8762edb802f7f92050ef443872
SHA5125048012fcedb6ee49f012e8e276a5dc5bc92fa86724c0e570b3591fb8d5a84d541ae7d6db019e93c5d7bba47ca82575555642b3b0df950b6249556ef7f23ed1f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5a1258d925243bf6277b7797e648f539f
SHA17d4b3bd2ca7b447884804960dcd271d1140b70c6
SHA2568a74b59a02718960538e163101a64ede6aed94bd5b1d97ccd91fa8225fc64542
SHA5120148e6fd8b4fab33fc1e66b1e7333e30adcb6b3e20a92b0cb0daa1246088473708f0c26007a027849c1fe6bae64dd9cf4775398a0c1e54b972d840f533fea316
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD5083529a63d4d514f50cec6feafe0d6a4
SHA187a38d7cf6bfbc57a8c61ff92c12ae57199c4d81
SHA256bfbc4a4de6e03a4106d990268fba092843b336c0b1ff1e5ab366cc9b23b7357a
SHA5128706c8c5eff2239c5ef2bf1422de5c7d184a9f5873728f02c70af8a0c6bee38aa1809d159b84fb70f3e2e9b0b22bfcec0b732610bcd2ff4ae03c23556408c500
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD597b9f602725440fb7e8013724a36e089
SHA1ebfe6404d1b7da2f765c1e26685534525ba34b73
SHA256c0312dad8d9cde602dff1a6e24b35a0c15d11cd7ce4322d4e838fff808439068
SHA512da49118cdc9658fb3cd536a32902d8d0bbb6d5a49120c834da1d5bc12595af8db9fc396e731b4b09ef669912406343552c73ba467ad334239150d0ff43a34d20
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD541dc7269e253642b18fdbe202d969a73
SHA11620fa9a7ed318c4d6f3c0455bdcdf7d558eadc2
SHA2568695ac343411aa8fe606440814625752dcd83d8e3fc84564d5996f9f179dc777
SHA5127fbc3e606153596ac9db87b9da6b51f8a71e41707fc3fe22ce9901c14a800f2e3dcf4931dc396a3d7dba013be5036b8c28ccfbca6b9724ca4826276fd7b50473
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD596ca421f71175916f7b884428e92792e
SHA1ca3e7a39d016fb9836c9a5ac96ca84da9c789b9e
SHA256f2caf5a4c3ce4d2b9a00aea9058b8772066c82f5ca16bd0fd29a6529df981e3d
SHA5122d956ded1e4c0ebcb1b8188e567da4f3bcb1495e60b5480d2622ca67b81b3b06fb6f44cf1121ee199ed881571d4ca0bd3ae8073fd547f5a45498d30479ee7f9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD53b7d0ca9c41a6c941cf755787ab95ae7
SHA1b1a240537847b6dc39e4df85832d526f476c64f0
SHA256f73f7a1c675bde5404f9d6427426c058449802bad3144c80c8e675666ee39a52
SHA512355d68e8c579ea59c86bb46bb9436f96ab4fdd5b13158dc3c5e676b0a5fce90aad652c5da60eca129f41a631c3b7b1daf5f33665f618b754de09b6676b3cd752
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5990f5615cf209fe8431b1b06cb80e07c
SHA1cfbab55dc4cab1994619fa23c56429ef38bb2d5d
SHA256ad3cf90ceab38a7b12141acfd36ae271fb442b84b4705c7951fc3acb3b4f6bbf
SHA5126b7f46cb2bcc9d68479e11d57df4e0ee664d511d88ce0bbe3b70bcddf0df91bb231093b6879d810830ac12d0bb41b661a195389a2aecc284702e3c0c904d8337
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5372dbfeab87adb347b060d2324d95fc1
SHA1d37ac72791a7cbecc56f32c54bcd6be14e462d16
SHA256032ffcd16f1f1c4d4feea314560c02de8b4e6c298afa344884efb98045557394
SHA512a240ed7c4acc02a31a28b94d0b0d3d856499ce7d3b56134236984823e070aaf6c8fcd6ef1577d9f74826a9dacd08feeb5de4633b92428a899a85992e7c3caf99
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD5a01b6b30156b5b2580c0b11e8aaf5f5b
SHA1816409f0f347a9dc1f6a02013b137bb7a77a0eb3
SHA25647e41086fbc653e54e4d7337d91f431cc474eeb32996bb1c66434683f126aa97
SHA512e1ebf8ca85108e3fea2e66340b59a19f60c98b2d2a3a7fc03959a8a23ee584b1d3823ccb105e9c47d748f45e612315e6e500f4f91bbfb7e0a1924120242407d5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD569a4c7d2b56837f1ef38f18abbfc9738
SHA15ea75ceae9c1e66003212ed1ce5b375040e20423
SHA2560f9ce0fa33163d600276243358671d6beb32137ea488b2e216ea54532a8dc912
SHA5128aed10abdd8b827c177342de5fa8d0fbf4cbc8afc85309025527e64771471585aaa91b45d8598c23361b1879d4cc03a3f56dc0c919b3ea7cdfe8b84adba36076
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\dd208c9c-ad6f-40c4-88ce-4fceba8aba28.tmpFilesize
4KB
MD5e996aaba03a858ce2ef301e88783284b
SHA18afe59f56df9fca4e4b9feebc95efc8413ae8d9e
SHA2565f823563e4292f97a3fc14a40c63bab916d2f84591047b86da057675decc82bd
SHA5129d0135eb4617092e4de30ef5da8f3a25ffbdc952b0cae2236dabf6906ed757a544b32d36b48e4d062ad8afaa4baae1d7efac9cb20e5aab0ffe2ecec20da899af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD53ba6942dbd7616848646c7da6b73ea55
SHA18eac6765c47330764450a97d96648663340ad0ae
SHA256fa6c287e2419b79f552534ab94a00bbbc6de8920b5603d28144683ba95d65503
SHA512eb9064eb5dc9c72f07bc1f80599fdffd9da81633e6331dd3943bfecc5b69ef84201354f8a0dbafa7d1fdf560b825dd70b4632bb7a0a4d9475ad5ebb3c4f35fb8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD55529c86a4bb2df1120419099b6c15244
SHA1f3bfa6dc4fef6027b55be81dadddbdd26cd19860
SHA256f32c4aa5bf1596607ccdd76f669c91c8a1ecad38af636bb631fd794f737450ec
SHA5122f75ff48ff9dc5060fe076cdcb5d657a6e9fa8fa9811eea03c172d94fe81129aedf335b08e47c7128a345d616001d4568207165d3d09c2b225175a0a55e0a100
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD59e2d79d38e71fe9d6e728ef96bd0965a
SHA1eef10b2e404c6ca471a8eaa366cf63e60df6a6a5
SHA2561f98a3f7c19a2b8f3466c0ac16b579a60ad2b823ee30c65cb6ead1a217c54f48
SHA512678002c46ace847bb7aead7be87121e4d363425cea606373800f6f6569a1c8ce314cd7d1fd120cb9eb018e7bba0fdb2f4cdfac7c9991eff54f76beb71dfa3c0f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5540e2e4d3aba025bb43e4289c4d2dc97
SHA1981eb014aa913cf230e43f67eee6f72450dbfcc8
SHA256bf991da65bfb37ccc4ba2e245e044797ed58604b869498941c815dec34ed15a9
SHA5123ab1c7aae10fabb46c5d9405500d46ced04dc491bd39e2c0cf3fb1188277c569e7463262d162c8729100d84ef178e462bdd244925517906a9cbc616010dffed4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD56938be1c7c573a45f29a67188942f35a
SHA120a64bdfcde7043ecd0944d7acbdfd842d7a4047
SHA2562f63f63b69b112eb6a5b6be1b2463c9badce9fd069b0664b8a7de720306dcbb5
SHA512258e4ac7aee49c6a6f971ff58e1a5e8bb1b6ce7da99e2701d8a73c61585a88ff99af1645d3843ca0c52935608327c0d92909fc0e79e249ed16daec1a764bbe27
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5b001e357ad89bf328a755489254a1912
SHA11f6ed35b488a9b906f1fb55d21a280543a11049b
SHA256d8ce50db02ba117b34a95f85ebc4f505fdd083873b5f67d8f8c1a168b706be9d
SHA512e680f3d275a078f20377feccd514b4219aa660c50b75b19c4173ea4adf6d8392bf7cd4a05eab986c858156b1de321c0a97722bfc8c32aa9343a2fac96c5803b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5800d439194a3df6d46c3cfc4dda0d2fd
SHA1d61bf921f4457ce6ad66975e1be09c9b48870995
SHA256a60d61077613259738b2f2cac5b9cf32aac300605fbaababc5388f5434f77a01
SHA51292dff3f1e38c1ba954c475f6d732db9043e328335ffd4e0b4a8f2bb2c3a61f6e10bebf85e4a7827aacc78d989eba1276d2821e90bcda8f7a2e91454e951327e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD57f52b5de6d72efbf5051cf4d8be4f611
SHA1436c8e3a1fb58795a587f280467e0a75771261a3
SHA256cf00c93839cc0302c4ba4180b1845e4be32d00b58c5096b8a7a13c31d09a9058
SHA5129ac92eed7dc63ee1dec3c38e7fb3c4730c29deebe58b2ffbf23abfca75d468cb35d274da9235a52b6d5c356999bf338c29ace0ed117f93f5a6cca3763bebe845
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5e9a64a4892e985d182f663aaa365d40d
SHA1744a50c88bf7f409a100642d3458ad3765d38c24
SHA256c2624e1defaf5850ea500270e471baefb92b76d19da63589de2b7c6c402198a2
SHA51294337e257494fc5ba921cc012602eba7c3d96edae778e9a3b7b7ea10c1476556805c7b6af36d35c98cee9da50229b224156d6474fa615447f36781b19d077abf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD525c0801d4526e081e916a34c5c839500
SHA1085c0922b6d3cdf24c7572534290ce5559ececa0
SHA25651beb8460eb435d5227d0663c013eabc795aaa65cf722f41d07b012856c664f6
SHA5121a81d7e276588ca6ef5dc58363662aaad1f93d4e6b600a30697a631c03dbcd9f6eaec0b3741ba1f3f5703bc84e0b0097fe8aeb3d57ac4df650673cecb3ba6b8c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD560972ada7958da4e18ed83c543f2d62f
SHA1b52fa32f9360f650b292a9b5aba011bfb4f92e57
SHA25695e495ef5e1dd1b90bc9da969bb4e1c79a8ded2faa4784bd8c0192ac7a03df3e
SHA5128e00e562c80822b6a443b68fbe60af273143d23b77820837a5fea5cf9eded777efdf29490fcc23e47fa782884d48ef6cc325edf784c99027478c6cf0d4eae91f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5651d2bff791aba210fe9f3abdce2c89f
SHA1aee4e21ce9e6db1218c8b89c3461e1db84fdeb6d
SHA256e9a8b81e4589da79d6619c60719a95ea84303e532a6ccb6530cfbdb9085a7909
SHA5125df4a89c12772ef19444a692f4731db445df18209cfb45c700d61cf477d825f74d0f3b6849149b6d33aba843a40da5a532dec8fc261ad0e7bf7eeb03a522e747
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5ebd39af4adf53bb500e889b2c2d89153
SHA160fa5cdeb6d414096165538c5a4b34fc181835a2
SHA2566917ee28a771753eee20dd07c68973655af80e74f01b8fe0ed355814d2863203
SHA512d7c4fd45ec6c92943566320ce882f8416b435640fd1449f1d79954edacb80b6ec7460c8351523b4443c4a2ce8f09da0144e785b93d1207cea8b5c2bb43d01bd1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5b15d9a9f6a2ea70c720488d7ba905ddf
SHA1b2549d2034e39d88394371c757b4febf643b44e5
SHA2562cb50566d2c00d275caaad13cd3a9b7de737273f0ab0aa9eed5c343cef6ff363
SHA5127e2afb66708a13a202bef0d799f18b2ecf3eb10d67a3f25b2cc5ca01d24ee3a1beb0ae39415f199db5e554e83fb080fdee61bce96eec03e4be01c8e9d9c5ea52
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5d63247dcfd4218c33d330a2213a58a00
SHA16db85a5b4f6f12be2fb71598ab889e5731601730
SHA2568c33af43ffca29010ba8f4ea08742428d5e0d6cd749d8cfd61528e1269701e68
SHA51213dd97b3e357429fd616f7f2d78fd29ef5728dfcd0314d8bf3349c0f5565085040ee7939d06939fedf59e7a26babf188333bbdf475154bb742e921f6c252a597
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD52b206a63901a4b51b1494e33722ed115
SHA1f4d1d5932c1d8432085331e4809209e912cc53dd
SHA256ce5e87c0eefa53d0f61ee4d4ef75ecc2cef95a8be679a43a3fd8b652b636e3e3
SHA51292969eb6e5b7226c6bd102c63a778b9aab3276a27bd8f369be0c23ecc57d4f90d54ad6a008158c622c559c88938ac693539e29d2e4b446f6dfa59485e8812cdf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5ae2bab78847f072a6a9fedbb5ae019d1
SHA17385a0d8b7868b4a1e04d6b75684f15cd2ff93a7
SHA256b957e3aa7e3aaba7d19e5d7cf292869c429672462be408f15601a4a95e4e3c96
SHA5124666d64f6ac8f533666d38d137524f9d8582e27be4a2140a766ea7e67b170d71c5a17c7a800abebf26cf3939d8df8678da46b719523c00212bfe497ee5b9dcbb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5be10b90b7ffdf0c32056f43f8db5f745
SHA1af96db0aa6e98bfc2d32b26219f62b2f1e625b51
SHA256e8e9a8c84aa22e8113a46d0927397535d797e9d357df4fb9b2e2edc8ad1d3ad5
SHA5128af94c0cce00127e21d719f9bebbf1a2033a801eba71f8deec0718040c05e5d3f70a0c45b96ecdb3b67c415e7d522a8bb737bacdb8c6781d813e3bd5c557eee7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD58254231074ade6479b5b970ca2e51cfe
SHA1a7b7173937693d7e8f8b9a4be367211135be8009
SHA25611091e0b0ae8d498ef2ae23328236d634d9c6a26165eeb7ebd292476bc4ddc75
SHA512c79db5159355c392dcc2b4ebf1fe91fc9ca2d17dbfe1c7f2d953eafcea1da7d635161602250bf87c76c4f9b7ce857e6e9d58a02cd7eb3d7d0986a401859a97f3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5cfaafb986c37e6488def4ff71b708535
SHA114d79dad63786e59eea432210e2d0b59025e254e
SHA25616d154d4e49e95f7f54d3572341c54ee2849288af3b590aea7112aad829c99a9
SHA512c2a4d0cacbf777c7f2a4999aaa90c534ef9b802942d11c9e0edcc4cbc282e5ee6062e535239ca7d5071bd88b410d7d4e1f762f870f5b1278504e0e7541c5aa67
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5a4ccb5628e03c54b86b43ced1fc5fe0b
SHA104aa7302faa9e84c42f2c801617ba6dc818c4b0b
SHA25664badc7247bae4582d43f446dc33f650c69a0f0da2d83dd59d27b9c59b91d701
SHA5124e03d32ff9040c9d91f5034619f76f07b1d063cab629a069dc9f1b3108d9320df514dc6538d734abb718bb67358816ff952527636c708300ad60d7e8490aa6bb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD520874cfe231cf5b25dbec5b06f186b5d
SHA15e8d0eb410066b7f5c7db3ec56466f85a3e1e82d
SHA256151960f2d7347dbd232ff79f2f384c0fb3fbf0064d392729269f581c78cd92b2
SHA512e7c8467c83604d8e3f91004cfef62c7474aa5d6534433fe224f1a077f558ce47b232dff4442efa3b79aa489c450f88f31cf2ab157ba7e78f479c6ccf62808b89
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD597c2a1c06be26e0fb8be994c13183613
SHA1d420b29a3ceb7311262a8add39d071c7353dcb1a
SHA25650b871d9e5770edd346a3d3386ba4ad3812e3963c7c53dd4edb974a4a2eabe1e
SHA512ec1104e96cccccc91c04221a12729b3ba48d13207f273012fffdf7667785d5891bbc5bbd35f0e0fcf25593d532e142e5501c993dcb45b434272429495404c1a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5d51a130289ab2fc84ce24ac6798a4355
SHA107b4c625b396e6c7ff0e1518c4fd456a7dfcbb37
SHA2560154397b9abdf66e177bf099822d0310f9bc1c2dd41d01947d2a1cd3e209fd97
SHA512f303d687d0036ed4385bcadd08e14ffba3eb56f3e2d72a63b4c8a8b793a901178ab4ef2a7c46fd9c0d483a7e0c16c77eff2ef779395dd5db2a6e185e29b8892a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD56f82ad97b043fbaa5a2f6aba4a8159a2
SHA142856bcb8c3a868fb0b5d3bd4836f4dfec81a36b
SHA256410af727f175d875743fc32cbe0d4e6d3a87b09e0566ab44249970c58ae7a6f0
SHA5128bbd8884fb6dd98efd07a3e42945de6d668d37b3677b57448863518ec91a2b9404637d70457ae51154c86c9ee4b6cf596469b5a1d724fa98969db7a3ca55bcfe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD56f82ad97b043fbaa5a2f6aba4a8159a2
SHA142856bcb8c3a868fb0b5d3bd4836f4dfec81a36b
SHA256410af727f175d875743fc32cbe0d4e6d3a87b09e0566ab44249970c58ae7a6f0
SHA5128bbd8884fb6dd98efd07a3e42945de6d668d37b3677b57448863518ec91a2b9404637d70457ae51154c86c9ee4b6cf596469b5a1d724fa98969db7a3ca55bcfe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
10KB
MD51cd3000e67de56d8aeb4281150749cc1
SHA12cb1e9038336d9c0d5724e79cd95b0adf0ececd5
SHA256211ece81aed385e2b28f8adcf0334ac57efe9e666eb259a39281fd4a92c84b04
SHA512c50037def6ae80b3ba9cfc87c91109575dac5161b3e40409fa4a97976bf7f95d9ae6163fe6f2b5787a33afc61673ab9fc6930e51af3fe30611f500128b92a8fb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e0a803df-fdb1-4c0a-8f5a-b2541e7ecf02\indexFilesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e0a803df-fdb1-4c0a-8f5a-b2541e7ecf02\index-dir\temp-indexFilesize
624B
MD500d6950921be831384703e3c8fcb504e
SHA1d4d0919003b4b3ef728159cda1996aca9fb84eb6
SHA256a0fcb567ac67181cb70a2a51e81c3de2cf103d6f7155afe421cc06eb00b73780
SHA512d8ed885fa5dcef68f684f5d7333450f6ffa7ba97a8034f0257f58cc186d3979b2b657202472972ac881ec118324d3096897930c684a364a11fcfa6f2be2d6a10
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e0a803df-fdb1-4c0a-8f5a-b2541e7ecf02\index-dir\the-real-index~RFe7222c7.TMPFilesize
48B
MD5ea536176acc035fabd435df53173553a
SHA153c771c98aa54762310ba6a0a76a1ff09579dd3f
SHA256ed53b8362485cf6675ff775fa8b2ecd5a28c197f8a7c4185095fbc081d04fe3f
SHA512ec3a2a1250b258f1348d244ea3f0e4c7d89465c797dff110de0a87e48684bdca2100446126c20b8e777c8ccb55f3649552169495c1cc8dbad9b4757247085b07
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e461bf8b-d5b4-4065-afce-dbc827e9bd02\index-dir\the-real-indexFilesize
2KB
MD52b7fb91ca214a801a7964976f8ed2f26
SHA11378583ee3242ac0adcfd66fc21b9d38113d821b
SHA256bef159d45ad3814689c55695bbac6a1d43da0c44f5888ffe532cfd64839c1be8
SHA512551687877e7585828a44dbd6463b33cdc88c8326c2be88f75f91975fda1106af512b94df1527b16bf4039299dd0a4827095c1fa3e0d9d24ccc739fee66f0e2e9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e461bf8b-d5b4-4065-afce-dbc827e9bd02\index-dir\the-real-index~RFe723322.TMPFilesize
48B
MD52b8c31e8050fa0fd2526bfd972438371
SHA109c26e18b5eb5fda55bfead4ebb39997e6a32104
SHA256f2b1c76a879448aa70d40f1836cf2049f6c6599370f088bf7c0abb103294b856
SHA512db85815afd934cbaebc094e0bc3f155970e89de26dc0167279d3a7171a7e5533ed7fe563ab5d72571d00becfa624bb6558b3368efa7f7f21bcc73383baeb5979
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
56B
MD5efdb59c81849aeb613575146ee20c4f4
SHA17a2d45a98d0bb85b7d27b8c6806ae9f773258858
SHA25698c0519a5daa6216041523b4200b22746fb8f03419765f5d8524f8a8afc2fecd
SHA51276541fa984872468db7995e79cff223c3e167a2740390817087cb713f21fe14bf5a7bba3389f3ea4733f8252b46d2565faa05ea89ee82de58e954429f976e08e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
119B
MD591e6d9504424d6895759285fa6a90798
SHA12aa3779c8d3d019cf5969b83945c8bea368c003f
SHA2560ef0ea6637089cb72d4c3d60f2192375310ecb35f779268304529266c00e43e1
SHA51277cd915aeff398fe2aa64cae60bf3c1110d63ff62cc5c3f874e7c6468d67ce3e81dc3aa6afa6adb207de47c575c9635d5cc890f717de9dfbd67f8fe1e525031d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
176B
MD5156f30697fe500f08f1579a25bc32208
SHA180063f39c605d50e52f3e624c60b9c9179de0e4b
SHA256e3cda50ca0314713d05da2a1945e6830557777105ba0100ce9be34667395b0c7
SHA512ded89f53c9311da7e14adcb4ce3c50309044af0edd0668a9eaa175c288e73392c8ae2fdac91b119cb5c3ee12b824c43100bf6008a050e4286a076c83901aa13d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
185B
MD511f91992444b38053be2ede3efd0f943
SHA177453199365b40529fcaabba53c106014b99aad0
SHA25679d207b885625c1e4e48990636c80a39698b088e812b1ae0c3659e32cf444d9a
SHA51200ad6600cbf874ca138e13aa6b7451c4a1b22f2069f44d03d466bfc8aa63f84246eb4a91cdd96465412c5a43a34f21fc8eb1cebb87396b7caf28839ae61f7afd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
112B
MD50711304e69f7b3f6102b04f7bb8190be
SHA1ce18c2885472e4f2b6ae0b00218a94b64b882aec
SHA256fa83307476668a856b4e0a81c7d21da77c1c71a102fb7d34bee2da739447ddaa
SHA5121f51de3f5212ff04d0565db7bc6ac48d3870048c8af213e790870b59ef2e44c3652f78583a2ae1c8f70c19a873584cbed87a70dc28471efaec85369ff3260dfb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe719b38.TMPFilesize
120B
MD5603c8bf8e645818ae0a7985d5d2ba178
SHA10a90efd994cd7048b30a79d0c28df2bcb9526b98
SHA25604cbd033af885081cf3902b2c7ff17560c20d1314fda02cdc1600332d33872c7
SHA512b7672b8d19f9fa70c36f45cfbc1edee0f5f5d883c35d7e2e52460dd01b4eeab133a1719c964602a9b00b2ef52c87c543afe05ced4805e547606571dc0484f516
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
96B
MD5b293eeae9b1ab7b98e6561d9964b26c7
SHA1bbc603947e0e6eb015b541056032cbc8b113da42
SHA2563cfb39da534c542e5ad3792112e29f78bd185fab55bf25f955de1d6eb985eb79
SHA512d033c273305ba3940f2fa958387970f329bd523a04a99558d0396b779d25dad8468187094cc7f74b3f4fc68ed58b29af72d26ff771413c0b0cd17eecf1595281
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe7213a4.TMPFilesize
48B
MD5c302381e476f284c6cdc5af5e139c0ef
SHA1a4b29d071a2dc75464d9fab448c7964ba9dfdfba
SHA256a1bb0e0a247b675dc978a3766e5cd947d9c6876b74bc6185ea81fd50f2730dd9
SHA512372756dcc416f32c27491544589dd0c230f0d48caf85170b56fce924abfb650e9c750854a8be5a6f7d57ffecca14d385672086009a692983342ff0aa2032b7ed
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir3032_139345609\Icons Monochrome\16.pngFilesize
216B
MD5a4fd4f5953721f7f3a5b4bfd58922efe
SHA1f3abed41d764efbd26bacf84c42bd8098a14c5cb
SHA256c659d57841bb33d63f7b1334200548f207340d95e8e2ae25aac7a798a08071a3
SHA5127fcc1ca4d6d97335e76faa65b7cfb381fb722210041bdcd3b31b0f94e15dc226eec4639547af86ae71f311f52a956dc83294c2d23f345e63b5e45e25956b2691
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f0afadc5-0250-4cac-afb1-6be0037e53e3.tmpFilesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1Filesize
264KB
MD590a4ffa351c5ee871b57b46e81d2d2fe
SHA1925bbb3ece0227e0afdf2bc9c76ef1b95538ccdb
SHA25610f3d0e62a7ec836906a55281d081e88f13087c1ba0bc67ce83d7f299ca5fde9
SHA5128dc6e8c05239626a85af53ef41222ca687f514934ef6561e2c462686f61e758a118f48982a648ab7db5234353040d4a05c8f8a1a923acbc497cca5746f329159
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
90KB
MD51f8e5b4dfb28bd945e5a6808ac7778cc
SHA12dc555fac4879d97fb7f0e23275a6b9b7bb8f7ed
SHA256e58756f6a96a33e468cfc5ee7f3df868b8e8553eefeb30dd8458edd21bba520a
SHA512d01f02db8f78d26f845ad4b5f7afb3bef670018559dd1821ce599a82839240c96ce78d363480330446b173036531419e065408231f8f8aa5bd4978762d9eaa2d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
90KB
MD58c4545351bc678be6e42d115fbd45c14
SHA1401e5e4242dca17ed0d1fbbecfbcae4904765b62
SHA256d9a0af496f090e2455c115077cd1155dd67909bb5a7413e794c222a73b181442
SHA5126085f8ceeb994829b92acc5112865975e49853f2fa543247241ad0fa698fd35b362b018c120d961229ddc244dddd616758b41135c5615ec306c5529957d2630b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
91KB
MD58f44605cd2d298494781e02ddf17c2f1
SHA1223bf15185f287d6b6dbc6e0e78f2ee289d10315
SHA256781578d1488860ea6196daddec99243eeed8d91b5915e1b3a032e8df209863ff
SHA512430aaa83ff6ef5c9f61b580d9ee34d8ba58ecd85d9b0221431162618ef197d20cc025d1c5dec31a72375502c6df9c709acd6c84868ff7c89131f49b2fe6bf71b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
91KB
MD59c269b5f811456206469a95ee5468c5b
SHA1e1f6da047a8c9e75c89f76fdf7a5927719095495
SHA256b6e9a223683e18330cc6d27d3390af627c9bd0f1f61384698918b6f09182ad8f
SHA51216962d61a2f066a68d690a3df542b16cd9a17eed30b2560644a0545d79cee9b26fb4fe1df7e84d1d4cbf0a87a0c9269e5e49bc4358a9c7c54c6a852bdd48b3af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
90KB
MD5eca81353233f8efe3eeb8b7671474591
SHA152885c2bc62f512b06c51526851c34dd61908916
SHA25647f4855776e7098cc2b2478e24003e8e1da12d5bce59d8a28ef385a5b301b6a3
SHA5126ba91a27c104ec7e6e12558ca481b59cd7bce2bfbce8aeb48d1c24e80743c5d545c73bd8fa9e77b633e5d62e426291db0434f94fd62d98a3a2efa0faac9a91a7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
91KB
MD5d5d02f459c57f99878b55f670578c7f2
SHA1705917c00ed31ed798c827691eb047b1a031ab15
SHA256976c8190ecfb22c83b81e15ba835aecec6a154c9bdd0da022c06a698288b2c03
SHA512ebff2aa8295c68cb2796ac6cfa3337a03bf6fc1934be85d707201e1de6a750a9f64fe9a381104ab7f40c1185d4eaf34024babf814c6cb7cc6c8c448c12460532
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
91KB
MD58936acc0190d1c65a29bc910491572ec
SHA11065dade6550aa76dfa4a2d491264874e2b73ce6
SHA256947ca67d8d31ddda01b98011f67abc787fe2a59b0c3c19bb13c758862100da8e
SHA512880588c7f5b4872b515a098811eaae04600ba0f1544ddeacb7031da91060a2ea336e37cbe0242f9f376fcfdd74691dc3713741ef5f17bf40322ae4630f5da176
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
91KB
MD57f2eecf46a70d00be78267236f240f70
SHA18cf08453bc2879f77edfb13c1e7ed36c310e4c18
SHA256db2eedfee6da78158a7769f6af139fe8f87a1030a88607b58ba8d3725322456b
SHA51231d15d2be9d24d2bb92d88d48dbb03fb96d9c315376b701d21ec5e988677532cba71598a07e03af874a079b620692930119178bc04446092ee1437868742cbfc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
91KB
MD5e61114b65bb3244b4799089e5275ff55
SHA169203c64cc5aac818a348c064e8e6281ca5eae2f
SHA2562c3ea1d3f1864403421c54b8ef572aea5fe3317f9df37daedda55461263b5ea5
SHA512d2a3b5c109f7cf54e755045b1ec6905e1b61d8eee3243a02543445c0ff36e9d2b93dd6837615d7dfb2cfd5faff119fb2308b7a828be44a33966159298c23adf9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
91KB
MD55050d915769dad8179a76c5c4c4fdb50
SHA1c6fc1e5bd0656cd8b172607fa362e26b782c0e3a
SHA256a013efb5f67063fe63da9b851414b17dbac4d6ad47972499cd62a772ccb5b18d
SHA512799c92e6ed5017e8ff3ef0f5ba682ddd8f8107a0b5ad0d80e73d1b3740048eacfbb1ed23527dff24f620f3cc7a246e3ff033de07cc1015d16f3334464412e55c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
158KB
MD5860a8699aa5538e84361bc4d546ba8a5
SHA192b123df417d25b1ae40ea2abac9d672e8e63be1
SHA2567ed187755bc7c52344a6f2cd55fc68437b4b00b273408516113f4685b8fc6155
SHA512dca10b9a60b21cd523a52877342d3b34a5af59dec7dc9f91e4dfbe2c4b01ca970f32266661a6b2d0ec6fa9ca56c72008225338da770f84d41031542d7bb13164
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
158KB
MD5783efc41f9523b8e7266223b2644afa3
SHA1422ea42c3af68347ad994630c05762571684d949
SHA256cfd6964afd97cd02581c7b136ea3473f9c86374566ecfdd1258d3736f0a8e3fd
SHA5128445cb89fd332e32cf40e9f87967c7994ad10487cbf3f95c189c0728150d8064876337292db43cfe9a8732183926d8e8961bc3f5d8bc073af68044f6c2b81e84
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
158KB
MD5c5fb23cb0b81952989a8941b32c339f3
SHA187fe7674b347365776ab7abc018b83feb3aef023
SHA256849ded214ece46628615bb0ff28dc5645ef847520528542d2afaeaaf9c7ad3b8
SHA512509a152d1b9de72b0cddb064be8deda43b56047482e93b0fd00b324cea75130548bb38435b43896813a349928c100a12bad4e172c7b2b0581882ead449a840b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
113KB
MD5e04bf8e65aa814d0a1af6be5cca2cf32
SHA1c6154299df9187be25596502913214dd2bb499b8
SHA256f61cd88a87201114c8dc88f5e5a71fcd901ab71bc0e1ceadb71a8b8383df8f5a
SHA512a43116bdc992e5fd62095a639439837b9ab3fbb097d05906dbd950c02e205001c43b6814bd352e5cb7b4aaec61cadf7e6eb8d41dd4a4e042f6c39f7d417a82ac
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
149KB
MD55315e8b4ece2fd0786ae49e8b1e87d6d
SHA1ebeffa014fb5f312ae81db1e4d23bd6846823d28
SHA256687ee835e440f4305aee2dba2b5434eafc0b178b2776ed4e29363133f2a2e0e6
SHA512476b19e1d0cb36f5cc83c3eb1776c695181cb18ed6e9b981fff0573d3c868928b6e259bc78bef76abf37d8d9eda583d9244558173fc9fa65f9bf692fa10d2245
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
147KB
MD566d968eec02bae8ec2269cbc22163485
SHA1153a560690bb9a39556de8f4716da83cee9e7404
SHA256d02d3695ae183a8a742bf5d61916b7e759dc1d5041000b8f264b3643304b0277
SHA512ff94b892f494a4cb775ef77e5d8e8847cc72e6d5d00e36503d92f69ef8102640a7a875ee6049874e2a39f406350ece1d9aaeb8feb47cdd5ecceea7dcd4a4626e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
111KB
MD53f53e49d485ab513edaec6524bfabf8e
SHA196b528c8348f6e8dab9a06fa110a77a469eaa554
SHA2561be17c6d04c8ada44573cfd530c02a45cc0a32f406eb46906a26f5191c5d1428
SHA5126ba54114d209af194bf2a0411151cf4939b26cb8b9c9378573bc858d3d4ecdd5697152feb1036570790e533e7b6ebcf691e16279156aecd6e206cca3f1c49c15
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
150KB
MD56be6efb747e533ad7673ead033364cc1
SHA1be7d2d1a24966ae546c618db5728ba0c79acba82
SHA25675220196883ca65816872c328e4c8966ceed8cf996ea44c57b985ee304a0d1c4
SHA51208cedaf2a23e15729a2de11c115a36b7f384a25b1f0615406a710a62ea02335242725c061e8b2c5fcf8f4580e33db636fc448c4dab502cb8827809cfc0f8dfef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
147KB
MD5d6e30c5c0a9b6c5b860b26b91e29c088
SHA1c6c27df4dc2927932880ddc24ca4345802363add
SHA25686f93308873ec599752b394aedf844bc1cada6347186e420d6023c8325aa7032
SHA512e5576bf8974666e9d8725b2644f27a4ebefcad135d0358925533029ad17229352c065b2389cf74e0a8933368ee4fb0c07c8b3d9793739d869a4f4b0eb1e0a793
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
115KB
MD599fadd1a61386a92dd79f711a74c2744
SHA14312033afea8871b6b87215b5658040399ccf72a
SHA2564fc07740df0563882bb231b95a1390b7d45005487021a50c78a689430b4dbc98
SHA512dfe46ff907a4442893e0e0ed2a5d2d928676509f313654e4451a3c7fe4d3a32b5df3f19bdc7b0b8e82d06f2f835a8c14f7a7863a6bed880afe011a435bc4696b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
109KB
MD514493e585e7a924283420d470840190a
SHA12b7c4257597b0c2d32ac45c80893787bbae2167d
SHA256c2d8c2574cc4e92731744b49fd187ea1c0de978d4140252205ea3ca3a8d6ab4b
SHA5128e63eb6f9df45c23f62b8c5d9195800e1e5f77943519998ae7a49b29b93000a73262d499c2fb66ff78f8299b4b93ecc8882d6a5d5337dce748ed33c1d6b7a887
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe58728b.TMPFilesize
102KB
MD5a6fa0623fb3860c06dc9fe76243cb17f
SHA146b16c5eda8be7671f86bd52a552450d392c12d8
SHA2568316b40adc1b36c9061189582bd83359dcdea456279354f0ad4b63dfe1a0d0fa
SHA512853d2f789a43ff851476e154a7ba74df731ab07e7bdc040d3b2303844f8ae2d1441dadd73f2bdd495235798c6c33c52a8c61b9bc0bff04a0c1312802539c9e50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\480JMPRZ\WindowsPlayer[2].jsonFilesize
119B
MD50a084fbe105d388b78dfdcad4c8c7bee
SHA1175a4e7b93c08ae13f6772fa469548e11aa96e12
SHA2568fb40ddd091622d2054716fbf7e34c6f4dda201ce96037cdadff1ca46ebceaf5
SHA51224e139cadfb6fade23af485584054b96efb1bb3f439beed1028bb9b30c9085f1b111c999dece7b9d76eec1583275726df5f75f20497301435df709d5e2b62d4f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6CI3IN3W\BatchIncrement[3].jsonFilesize
163B
MD5bedbf7d7d69748886e9b48f45c75fbbe
SHA1aa0789d89bfbd44ca1bffe83851af95b6afb012c
SHA256b4a55cfd050f4a62b1c4831ca0ab6ffadde1fe1c3f583917eade12f8c6726f61
SHA5127dde268af9a2c678be8ec818ea4f12619ecc010cba39b4998d833602b42de505d36371393f33709c2eca788bc8c93634a4fd6bec29452098dbb2317f4c8847f6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6RO0PN6W\PCClientBootstrapper[1].jsonFilesize
3KB
MD56c09ffcc43f9c725d518e9d128eb6d7e
SHA110df64cccc24aefbf9aa8d024cfa6b19aa132ebf
SHA2567a60e2c48d61d4e7d6d3603858d2b9f396b4593ec8b05da52742eac7e6024a49
SHA5121d6d8a312ac7618b9febf59ba74f988b12e47abbc61fc080a9c6584f99cd7df3c32baedb06903a3d3030f5c158a1a119c058ecf662602a017e669df4d459246e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\1847152663\3867481604.priFilesize
5KB
MD5d5f9d367860230765e5f1e638d040793
SHA169ffd701eb148b387a352e192c76a5559b199420
SHA25626124e56a8527429b0df6702eb9f24aa4237fdc0d4c953100d259ea5ef417cf8
SHA5128d84391ad5cafe9c421fd1165b11fe30239f20de393543cea6aef3e32f40393a222cd19dc615137456a1fa57f5dc5bd3747ec6a1e6c27e28a0655165e1dbc8c7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\510gyhsb.default-release\activity-stream.discovery_stream.json.tmpFilesize
140KB
MD5716af90739a523af934460149824d76a
SHA1384808672a24e86856fdcd1b2a737c8db3b6569b
SHA25666e9fc295abae1b0e0b8954fe4799d09a6940229251f07eabf027d306e970c44
SHA512269c0314159d406582d74013cb89ea677958f41ef7fbc68af322d6c22762321f013391e0ccddbe59253c4ba1a368fae2be15a22b8b15f9ac19baf567d65158d9
-
C:\Users\Admin\AppData\Local\Roblox\LocalStorage\appStorage.jsonFilesize
102B
MD503f6d9d910eb6f9fd0ea74d963786dd7
SHA1e44c44968a3e4296beaabc2b0eae46bec31d3b37
SHA256741e28978d048c18d9a7c738cbdd80262a69f087728a99cdf7a5359190c2e6ce
SHA512e57662a10f45849b65ac6f1591bda9f6844ca59d2b69e8b4ae23907c7b25392a32d9e4469bbf93f5f90326aeafd2e83561792d1599f6f95ee62cebf88d129599
-
C:\Users\Admin\AppData\Local\Temp\7zFB27496C\hypervMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\WinRing0.infFilesize
2KB
MD5f069f20871cb316bfb73c276393d1648
SHA144851e9f466f58dca883931b18687bfc4921551b
SHA25607942017e8caaa1065867aecc561577199e53142545cb6fb41239ae4c607d46b
SHA51272e60561daf384f7ba4003140d72f45ebec82d12c14bd00f4008f92be35a839666f3b24084ff842a0a023d3a595b70dd801f45b8695830bd800cf6862ba05fd1
-
C:\Users\Admin\AppData\Local\Temp\WinRing0.sysFilesize
31KB
MD5a73ee34a7a50be60e77cc277a96d7ba8
SHA1b3a8e39cd99feb817ce799cce193a2fbb12cbec6
SHA2564448beff8366e42e3393e8c7f8261aee0b0340356c31aa3b97de07452ae01888
SHA512668806257d29f73315b26540f0453bd673901c25fb3f16cba942c2dcf2006be8777573efbd831fce2bc7f0111b44b31a06c812ed9b1f59d5be0eb0c3c5c9eff2
-
C:\Users\Admin\AppData\Local\Temp\WinRing0x64.infFilesize
2KB
MD50f6d3047d1b670058d71c411707ef16e
SHA17e51d69b5f109ea6902232212fad28deb46f59ef
SHA2563fded2f4457b0beb415b841b40f6ede5ed527dd537e53e2f70f2fb4a6e24ebfd
SHA5126a749b4921f527c5af51ade76bfcef2446341b3e66de0d93deb95d26d31dfc357d392f6abdf877b756a7c0529112eba343a3c9926eba767b649d654e6d164280
-
C:\Users\Admin\AppData\Local\Temp\WinRing0x64.sysFilesize
32KB
MD51c57d067b9fc5e9ef9aeb14223481243
SHA14ee59164d3259667d3cade58f4c93b4dddf5a92b
SHA256d5bca2ca464a6cc91344bd85e812a7bac6e7c67038c4929a29e0bc60c7eabe4d
SHA512a8de7ab7f67cbe2bf25fd772c24344031322dfab77d07fd835109530450683c158f37955982e875a3acbbfaea2e72c0ba5a52d85f3e1e58984ec63c96f6c0ccd
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vqg5td5m.ykv.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\crashpad_roblox\settings.datFilesize
40B
MD57ca0802d47736412b0c835db36b40210
SHA1ef301b4dd67287bafbd8d482672e80587798b6ae
SHA256d0effaff5d45d0180cd34736f792458b4e0f8490d20fa9637719e6b69e167ad2
SHA512ea98ffb68b9b7122658c4eccd31f2319e1fcd8c59c2bb9a9d087e490e22ed39200ce08f680294ec52431529253f0646d6b6e5b5b88d1956358ca722f57938e25
-
C:\Users\Admin\AppData\Local\Temp\f34b9c57-c92a-4890-b1cb-c18c143f4681.logFilesize
240KB
MD5a20116a9d510f316c2e69ad5c124f5fe
SHA1c946ebf03668f3fa372bd88156a3d48bdbd9a08f
SHA2560f40e71a7eada5fb8be5afb21546c195801ab80a3a9426b054bcb8b8ed63693d
SHA512abb083f048ea6bf8aa2aa44282ee8c67115c40d0482d78be48cdddb95742ed4c9bfb2ce3ab45a3f294c731ee7348719094fe0cafad4578aa563b1ee5594ee225
-
C:\Users\Admin\AppData\Local\Temp\nsgA1C5.tmp\AccessControl.dllFilesize
23KB
MD5bb0f26c7a18434ee1d648c7e6743d1fe
SHA1f7503b348aa7c7691668fbb64ccd541e247f87e5
SHA2561b4d25f2f544f520c20493ee1e9ac7b3043aab88e4ff87953390d357de4c2096
SHA5124311e960a4f8f441b25c5ec9a82d64112016ff9c4510dfb082a0c1bcce2d03cb2871912dcaafc5d00f07ed9ac4d6d7998cdcea2bfc84f7180b2f62a2cf24e08d
-
C:\Users\Admin\AppData\Local\Temp\nsgA1C5.tmp\ExecDos.dllFilesize
14KB
MD5e2716246ee731417abee9ea26cec1d56
SHA16687e5d8b0b705fcdd9a4020215891d5b7723084
SHA256691ffd34264d1813827c35083367a08aec974e9f79fb585b7d2d367c83760fbd
SHA512355bb040570a1ba64a03463a9e6695015c2ffda5f30b7ce801c39ab1a7ba36134bb8fa9b5a1ffd102f6d71091b77133f8d68d305d5c1949ccad2e8eab0258505
-
C:\Users\Admin\AppData\Local\Temp\nsgA1C5.tmp\System.dllFilesize
20KB
MD52d94378eca9bdb76f656721ec677bbe2
SHA12a1c2e5c49aec61bb1eacf167f2b29916bfd6e15
SHA256d148555daabf35cd46c50ab3f515de5fc1e6764258230ab12e41f613f1daee11
SHA51275861b683663e4a641b0feda098cc5c17c8b4642b6c18b0990e5e47b18058860c6a248b0c1d7efe5040971fb43cea935bb5e011ace26c0edb95faacf3920ec65
-
C:\Users\Admin\AppData\Local\Temp\nsgA1C5.tmp\UAC.dllFilesize
22KB
MD5b7e1d609915cf0b3f9dfee488a92fc91
SHA1d9c873b39e3cac648742568378fe788b2cae6e84
SHA256fa3bb333f615689691ff98527dc3341e3b8ffee4bf97c6128820bf0d303930e7
SHA512ae4a00659f522996600bd0754b2f2706e297939ea616ada66e590409c6c2f28ed7ed39b67a078ae72e9b472a97291c7f3da42339051ef1a3d1941b0368b2e775
-
C:\Users\Admin\AppData\Local\Temp\nsgA1C5.tmp\UserInfo.dllFilesize
12KB
MD562bd67f56f04e3c50b3f021da5f29962
SHA13bedfac4d270337d89dcf31e15359942c036e7b2
SHA256191d2212da838af62d11873ca3f68c8489a2af912d7cbce9da8e505db172da6a
SHA51297df6670552e6d7fa3fbaa9ea21e6a33dbbc4382691b44163a646d19c522613d787989a31b60aa0e6b58dfe9a7550e64f099d762976d3d0fc3b3f5d59e3c9d58
-
C:\Users\Admin\AppData\Local\Temp\nsgA1C5.tmp\nsProcess.dllFilesize
12KB
MD5b6cd62358973125f52d756d6d3aee8b2
SHA17c9fcfa85a88c507517a659f778355b56cef921f
SHA25644c14f1edfe7deef518264675e3e4edb6991d5ea0d50f0f6b18a819dc31bbcba
SHA512a5b756e3e1a31ad7ad9026bc492de2ef8983385e7c920a2e3eea363df3c6d112cea2a0373cd9bd8be1fb3536ee9623c6844b3c7a92d8cf6ee050aeec7cee76bb
-
C:\Users\Admin\AppData\Local\Temp\winring0.catFilesize
10KB
MD55691a9b76c5b0bd1dd83687f5f0e87a1
SHA1aa79bf0cc8dcc8c6abc6b85793655060f9cbf223
SHA256784e031565c67f1d29640c62f0cc205d5b56c1f78be894252cce06474b64a618
SHA51209cf42743b5d0304179838eadf195821f2f8183d6b8b175642f0b871386c3e2af0e5e59cfaf3f235c16583689b8ed06fc9703e29a6cf234398aaed04c7a9ff62
-
C:\Users\Admin\AppData\Local\Temp\winring0x64.catFilesize
11KB
MD5e7cee7f541c057f490d486927d659122
SHA1420888e25a44629c0b53450cc3a3ea9398b373c8
SHA256317d01d9956f052d929fdbac258f1a2dc5163d3432fc488023a1f4d332ae3d45
SHA512582cdb32a0e322e945a3ed6a144d21a3606d37e88fac73edc4129e4ee3dea66e5a9ebd8c803e07e59fa00cfc6d6f174a1cc8a947f167a100d4065a10c4615121
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-msFilesize
4KB
MD5a1a8b80fd78a045bbac97e8dc498bcc0
SHA157f9e49e351d47d0039cd7978f53355bf19a7963
SHA25698345635bcf8aae6c4bfea9133508dc901f3b51081444f48888d3e89266032fd
SHA51234d065b36661433f8c6c683f7c682ddabda8e2dbb8ea563b85539bd3e68acff28c6cba995cacb77f4dcc3f6fe4254bca2c4551bf69e2758e96ccb61b48e64207
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\510gyhsb.default-release\prefs.jsFilesize
6KB
MD5c205c8a6591363331cd60c7286ad4ac1
SHA17d4c89374e88116484984f5d0b5df0d59aa63ecf
SHA25681db871d08aa9e5a991e6e04e462d416753cb92830860bca520d0c73d69b07c0
SHA512fd09bd9b7d42c6bfa6e508c071d0a67caba2437ceb56e0088cbf72e85690619ba9e7a81f2bc9956405a93210e2c46b8ec4bbf5aa7341f382457a5926ab9cd7c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\510gyhsb.default-release\sessionCheckpoints.json.tmpFilesize
259B
MD5700fe59d2eb10b8cd28525fcc46bc0cc
SHA1339badf0e1eba5332bff317d7cf8a41d5860390d
SHA2564f5d849bdf4a5eeeb5da8836589e064e31c8e94129d4e55b1c69a6f98fb9f9ea
SHA5123fa1b3fd4277d5900140e013b1035cb4c72065afcc6b6a8595b43101cfe7d09e75554a877e4a01bb80b0d7a58cdcfe553c4a9ef308c5695c5e77cb0ea99bada4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\510gyhsb.default-release\sessionstore.jsonlz4Filesize
884B
MD5a8d5734345da91cbba5cbe9d50abffb5
SHA17c3a402cc104d59c0181051bf9765eddbf602ebe
SHA25606ca3c7782cc67985e234732ba09ee69f09d0880eb1584f37af3be00cb63543b
SHA5120dd9c7738a9e0c422b008779a0be12e6ae06a4d0441073be6f9aeeb983fdee9a19ed8322f19be16add5f6b541a7199f545463328539cf578b24b573fe19a81da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\510gyhsb.default-release\xulstore.json.tmpFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exeFilesize
2.1MB
MD5a37cac76cc02bf62462a514281e29047
SHA15b430683926059ef58df924fd87638abb2d82eab
SHA256af4f0da458195e016f0a5e395df89c36f005bf24ca1ddd68a35373ba8ff66734
SHA512c94ffc5ba4a4abddb437f46115f1eb83e3b6a51224860e337f4286edd0e8442676f3b999a28234c34f61f983cbbc2363fb953306dfe1ef98d710752e0e29ef51
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exeFilesize
2.1MB
MD5a37cac76cc02bf62462a514281e29047
SHA15b430683926059ef58df924fd87638abb2d82eab
SHA256af4f0da458195e016f0a5e395df89c36f005bf24ca1ddd68a35373ba8ff66734
SHA512c94ffc5ba4a4abddb437f46115f1eb83e3b6a51224860e337f4286edd0e8442676f3b999a28234c34f61f983cbbc2363fb953306dfe1ef98d710752e0e29ef51
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exeFilesize
2.1MB
MD5a37cac76cc02bf62462a514281e29047
SHA15b430683926059ef58df924fd87638abb2d82eab
SHA256af4f0da458195e016f0a5e395df89c36f005bf24ca1ddd68a35373ba8ff66734
SHA512c94ffc5ba4a4abddb437f46115f1eb83e3b6a51224860e337f4286edd0e8442676f3b999a28234c34f61f983cbbc2363fb953306dfe1ef98d710752e0e29ef51
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exeFilesize
2.1MB
MD5a37cac76cc02bf62462a514281e29047
SHA15b430683926059ef58df924fd87638abb2d82eab
SHA256af4f0da458195e016f0a5e395df89c36f005bf24ca1ddd68a35373ba8ff66734
SHA512c94ffc5ba4a4abddb437f46115f1eb83e3b6a51224860e337f4286edd0e8442676f3b999a28234c34f61f983cbbc2363fb953306dfe1ef98d710752e0e29ef51
-
C:\Users\Admin\Downloads\Unconfirmed 482966.crdownloadFilesize
5.2MB
MD5d2a7f269b1f1f499fed028781134b353
SHA19206837bcda0ab419a7d9f3dcf8c902ca21c8636
SHA25633d5ac7b692a0b680bd10f5f00ce61ee6c0d60f3c71febf8e1fe9ff97c67adf7
SHA5122e5a50de73019832c6721c2928685a9ce6fbefc7afcd885685f1094d1666c11af04bda2af87e069eba4213015b834fb3be14f74e8eb5ee8efad1226f55b904d4
-
C:\Users\Public\Documents\MuMu Files\nemu-installer-tmp.iniFilesize
6B
MD5bea07e6d2b8dce396fe21baa61b34956
SHA1665332b36fc8fa1ed11210cdee83b639b451e592
SHA2562e08d1f6000aef541797d008c05ac36f4dbebfb36cbac5615788e6fcc5b300a7
SHA5124ad82fbef6d8d3f4d0b90a9399c8b405674bad0c750e385fb034e57895838fd26d7926f6ed0ccab2e2afcaf4a23613ed8f16d909bff870b40187e22e0a6362c1
-
C:\Users\Public\Documents\MuMu Files\nemu-installer-tmp.iniFilesize
88B
MD5f5ce0ca5858ffbbc013501686ee2d734
SHA1b74b14f65d074ac6d36defcb55374df538018735
SHA256101eecb5f6d26e2148951a4a4d18146a458ea3a6ee475b6c13a0c9b7b8f52720
SHA512388b61bdfd8cceba2b0d225edf5f511121ca39b0d4d3fa1d32693dd5e1639c28332d60b5bcb240a6f07b50dcceb4e5a4793d182001fc83af8b034c0e0b4ede36
-
C:\Windows\Logs\DISM\dism.logFilesize
200KB
MD5876df6162e66324950f7a4df69c02c82
SHA12d8afefc53defc0bc12d3233c8235502be25d9cd
SHA25631eb90a9169ceb0844af2a1f46ca1dc456beeb3a8131f29fa659293676425155
SHA512cbdd482badb29c7c93c7c3e6749690e55bdfd34cae1aa0d9e8b3fdfcf3c9082466006051c5334e8baa8f30f334c6c535f083f0adb84a98028b49aa5c5e461167
-
C:\Windows\System32\catroot2\dberr.txtFilesize
181KB
MD5e630717423e877ac425f5d3555a09f77
SHA1d015c46505c8bacc7ccdad34c529d389f1bb182a
SHA256b6c83f6b29623ca85493e4f59a67886e5a59c0ff69f20729206325126eaf5db1
SHA512a506b9a9783a5e4c089f6538774a191258fe2a26fb0867686606dc7b4c74e0774d546b9842d8153870fa41ce2221241a575986f8dc0892786c7d08692c7dc495
-
C:\Windows\Temp\SDIAG_2552f5fb-f56b-45e3-a85d-638603380cb2\DiagPackage.dllFilesize
148KB
MD5ea388bb8c7466e188899489829df912e
SHA10e32319b90371484032021afb90627ebcac0c9f9
SHA25640647c047368e66d9e401ae58ce67cbd7f148cbe7dede544d4cdf3b6a261c0ad
SHA5129f43898ff6c611db3256d88e503f81756cd19da86a4d885ceb7ebe321827d9dbb04f98a614e585e6b28ff6a8a53e0603fd5ca342556c402f7a6130030a444252
-
C:\Windows\Temp\SDIAG_2552f5fb-f56b-45e3-a85d-638603380cb2\en-US\DiagPackage.dll.muiFilesize
8KB
MD56775e2c76031720ebe61af0c5959adf5
SHA1dca6397fe60ba8ce1ba9bfc3cd3e47c2f95db6b3
SHA256d1086fb6d44a87463db22e7afc6a84851f3f24fb39936ea5f48cc59a59dfd4a5
SHA512d60f7c0d61cd61c1f006ade2f6ecd4e30d74e9a06bba9525338e71e8fe20c4cb68320c73d9258e984c7b7d032970f1cb8f3d3e81d8c3547e8a29c9ea037acb9f
-
C:\Windows\Temp\SDIAG_2552f5fb-f56b-45e3-a85d-638603380cb2\result\results.xslFilesize
47KB
MD5310e1da2344ba6ca96666fb639840ea9
SHA1e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA25667401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA51262ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244
-
C:\Windows\Temp\SDIAG_8ca5a427-de81-4b80-a6b1-167df813e744\DiagPackage.dllFilesize
65KB
MD5e99b38cf7f4a92fc8b1075f5d573049d
SHA1406004e7acd41b3a10daae89f886ef8b13b27c32
SHA256812ebb05968818932d82e79422f6fd6c510fd1b14d20634e339c61faeb24b142
SHA5125637e6e949c24dca3b607b4f8b5745e0bb557e746fc17eff1274af36d52d5d7576723f4cd055fcf8fcf9fd267254e6d7fbb53cc173a15d3dfd3cce2015ac757d
-
C:\Windows\Temp\SDIAG_8ca5a427-de81-4b80-a6b1-167df813e744\en-US\DiagPackage.dll.muiFilesize
11KB
MD565e3646b166a1d5ab26f3ac69f3bf020
SHA14ef5e7d7e6b3571fc83622ee44102b2c3da937ff
SHA25696425923a54215ca9cdbe488696be56e67980829913edb8b4c8205db0ba33760
SHA512a3782bfa3baf4c8151883fe49a184f4b2cba77c215921b6ce334048aee721b5949e8832438a7a0d65df6b3cbd6a8232ab17a7ad293c5e48b04c29683b34ecee2
-
C:\Windows\Temp\SDIAG_b7f26589-90bf-4b94-bc6e-7816e49e7343\DiagPackage.dllFilesize
77KB
MD55f8c4ff39f24f1577ed7ce86bc246285
SHA19655f5b0933d4d6fe843479b2ab36ff93922ba13
SHA2561a3279f11bde2357f462d1f1df0e2d1ec4d8017e50a38ff7df188411143c2e9d
SHA51274a01553c4ed509be894113daff7274c3ee6a8638afc6c7a6b81e9b88d3e5dc903f9bc9841e37c065f68301e7099c1979b64da03a34a63aca4299e67e23aea8e
-
C:\Windows\Temp\SDIAG_b7f26589-90bf-4b94-bc6e-7816e49e7343\en-US\DiagPackage.dll.muiFilesize
4KB
MD5cefd90c287f1bb6ea9c727db5f3da74a
SHA199305c682cfb21c6dae0ded91babcf4e955e0dd4
SHA25666a679e81b98d523a3fa5a15d6a5d170b3117064d67c41c8ae4fb417c8311064
SHA51236897eac868b9e14868c8fb2be6f3227a079c326b55644d7b2463c08243a3df4099fd70c2b180246209eea7e3ed7c94593f4b9b54d471d10c17061253a1d09bf
-
\??\pipe\crashpad_5076_XVDHELODWHKQQXJLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1476-6241-0x00000200E1770000-0x00000200E18BE000-memory.dmpFilesize
1.3MB
-
memory/1476-6314-0x00007FF8C9040000-0x00007FF8C9041000-memory.dmpFilesize
4KB
-
memory/1476-6316-0x00007FF8C8E20000-0x00007FF8C8E21000-memory.dmpFilesize
4KB
-
memory/1476-6319-0x00007FF8C8E10000-0x00007FF8C8E11000-memory.dmpFilesize
4KB
-
memory/1476-6420-0x00000200E1770000-0x00000200E18BE000-memory.dmpFilesize
1.3MB
-
memory/1640-4467-0x00007FF8C8E10000-0x00007FF8C8E11000-memory.dmpFilesize
4KB
-
memory/1640-4466-0x00007FF8C8E20000-0x00007FF8C8E21000-memory.dmpFilesize
4KB
-
memory/1640-4465-0x00007FF8C9040000-0x00007FF8C9041000-memory.dmpFilesize
4KB
-
memory/1640-4389-0x00007FF8C8FF0000-0x00007FF8C8FF1000-memory.dmpFilesize
4KB
-
memory/2936-1773-0x00007FF8C91D0000-0x00007FF8C91F0000-memory.dmpFilesize
128KB
-
memory/2936-1800-0x00007FF8C5BA0000-0x00007FF8C5BBB000-memory.dmpFilesize
108KB
-
memory/2936-1768-0x0000021031570000-0x0000021031571000-memory.dmpFilesize
4KB
-
memory/2936-1769-0x00007FF8C9080000-0x00007FF8C9090000-memory.dmpFilesize
64KB
-
memory/2936-1770-0x00007FF8C9080000-0x00007FF8C9090000-memory.dmpFilesize
64KB
-
memory/2936-1772-0x00007FF8C91D0000-0x00007FF8C91F0000-memory.dmpFilesize
128KB
-
memory/2936-1774-0x00007FF8C91D0000-0x00007FF8C91F0000-memory.dmpFilesize
128KB
-
memory/2936-1771-0x00007FF8C91D0000-0x00007FF8C91F0000-memory.dmpFilesize
128KB
-
memory/2936-1775-0x00007FF8C91D0000-0x00007FF8C91F0000-memory.dmpFilesize
128KB
-
memory/2936-1776-0x00007FF8C6AA0000-0x00007FF8C6AB0000-memory.dmpFilesize
64KB
-
memory/2936-1777-0x00007FF8C6AA0000-0x00007FF8C6AB0000-memory.dmpFilesize
64KB
-
memory/2936-1780-0x00007FF8C6B40000-0x00007FF8C6B50000-memory.dmpFilesize
64KB
-
memory/2936-1778-0x00007FF8C6B20000-0x00007FF8C6B30000-memory.dmpFilesize
64KB
-
memory/2936-1779-0x00007FF8C6B20000-0x00007FF8C6B30000-memory.dmpFilesize
64KB
-
memory/2936-1781-0x00007FF8C6B40000-0x00007FF8C6B50000-memory.dmpFilesize
64KB
-
memory/2936-1782-0x00007FF8C6B40000-0x00007FF8C6B50000-memory.dmpFilesize
64KB
-
memory/2936-1792-0x00007FF8C6B40000-0x00007FF8C6B50000-memory.dmpFilesize
64KB
-
memory/2936-1795-0x00007FF8C5990000-0x00007FF8C59A0000-memory.dmpFilesize
64KB
-
memory/2936-1796-0x00007FF8C5990000-0x00007FF8C59A0000-memory.dmpFilesize
64KB
-
memory/2936-1797-0x00007FF8C5A70000-0x00007FF8C5A80000-memory.dmpFilesize
64KB
-
memory/2936-1798-0x00007FF8C5A70000-0x00007FF8C5A80000-memory.dmpFilesize
64KB
-
memory/2936-1799-0x00007FF8C5BA0000-0x00007FF8C5BBB000-memory.dmpFilesize
108KB
-
memory/2936-1802-0x00007FF8C5BA0000-0x00007FF8C5BBB000-memory.dmpFilesize
108KB
-
memory/2936-1801-0x00007FF8C5BA0000-0x00007FF8C5BBB000-memory.dmpFilesize
108KB
-
memory/2936-1803-0x00007FF8C5BA0000-0x00007FF8C5BBB000-memory.dmpFilesize
108KB
-
memory/2936-1804-0x00007FF8C8650000-0x00007FF8C8660000-memory.dmpFilesize
64KB
-
memory/2936-1805-0x00007FF8C8650000-0x00007FF8C8660000-memory.dmpFilesize
64KB
-
memory/2936-1806-0x00007FF8C86C0000-0x00007FF8C86D0000-memory.dmpFilesize
64KB
-
memory/2936-1807-0x00007FF8C86C0000-0x00007FF8C86D0000-memory.dmpFilesize
64KB
-
memory/2936-1978-0x0000021031570000-0x0000021031571000-memory.dmpFilesize
4KB
-
memory/2936-1852-0x00007FF8C91D0000-0x00007FF8C91F0000-memory.dmpFilesize
128KB
-
memory/2936-1851-0x00007FF8C9090000-0x00007FF8C9190000-memory.dmpFilesize
1024KB
-
memory/2936-1849-0x00007FF8C9040000-0x00007FF8C9041000-memory.dmpFilesize
4KB
-
memory/2936-1848-0x00007FF8C9030000-0x00007FF8C9031000-memory.dmpFilesize
4KB
-
memory/2936-1847-0x00007FF8C9020000-0x00007FF8C9021000-memory.dmpFilesize
4KB
-
memory/2936-1846-0x00007FF8C9010000-0x00007FF8C9011000-memory.dmpFilesize
4KB
-
memory/2936-1845-0x00007FF8C9000000-0x00007FF8C9001000-memory.dmpFilesize
4KB
-
memory/2936-1844-0x00007FF8C8FF0000-0x00007FF8C8FF1000-memory.dmpFilesize
4KB
-
memory/2936-1843-0x00007FF8C8FE0000-0x00007FF8C8FE1000-memory.dmpFilesize
4KB
-
memory/2936-1842-0x00007FF8C8FD0000-0x00007FF8C8FD1000-memory.dmpFilesize
4KB
-
memory/2936-1838-0x00007FF8C6470000-0x00007FF8C648D000-memory.dmpFilesize
116KB
-
memory/2936-1831-0x00007FF8C6470000-0x00007FF8C648D000-memory.dmpFilesize
116KB
-
memory/2936-1830-0x00007FF8C6470000-0x00007FF8C648D000-memory.dmpFilesize
116KB
-
memory/2936-1829-0x00007FF8C6470000-0x00007FF8C648D000-memory.dmpFilesize
116KB
-
memory/2936-1828-0x00007FF8C6470000-0x00007FF8C648D000-memory.dmpFilesize
116KB
-
memory/2936-1827-0x00007FF8C58E0000-0x00007FF8C5910000-memory.dmpFilesize
192KB
-
memory/2936-1826-0x00007FF8C58E0000-0x00007FF8C5910000-memory.dmpFilesize
192KB
-
memory/2936-1825-0x00007FF8C58E0000-0x00007FF8C5910000-memory.dmpFilesize
192KB
-
memory/2936-1824-0x00007FF8C58E0000-0x00007FF8C5910000-memory.dmpFilesize
192KB
-
memory/2936-1823-0x00007FF8C58E0000-0x00007FF8C5910000-memory.dmpFilesize
192KB
-
memory/2936-1822-0x00007FF8C58B0000-0x00007FF8C58C0000-memory.dmpFilesize
64KB
-
memory/2936-1821-0x00007FF8C58B0000-0x00007FF8C58C0000-memory.dmpFilesize
64KB
-
memory/2936-1820-0x00007FF8C57C0000-0x00007FF8C57D0000-memory.dmpFilesize
64KB
-
memory/2936-1819-0x00007FF8C57C0000-0x00007FF8C57D0000-memory.dmpFilesize
64KB
-
memory/2936-1817-0x00007FF8C6750000-0x00007FF8C6756000-memory.dmpFilesize
24KB
-
memory/2936-1818-0x00007FF8C6750000-0x00007FF8C6756000-memory.dmpFilesize
24KB
-
memory/2936-1816-0x00007FF8C6750000-0x00007FF8C6756000-memory.dmpFilesize
24KB
-
memory/2936-1815-0x00007FF8C6750000-0x00007FF8C6756000-memory.dmpFilesize
24KB
-
memory/2936-1814-0x00007FF8C6750000-0x00007FF8C6756000-memory.dmpFilesize
24KB
-
memory/2936-1813-0x00007FF8C6730000-0x00007FF8C6740000-memory.dmpFilesize
64KB
-
memory/2936-1812-0x00007FF8C6730000-0x00007FF8C6740000-memory.dmpFilesize
64KB
-
memory/2936-1811-0x00007FF8C6730000-0x00007FF8C6740000-memory.dmpFilesize
64KB
-
memory/2936-1810-0x00007FF8C86F0000-0x00007FF8C86FD000-memory.dmpFilesize
52KB
-
memory/2936-1809-0x00007FF8C86F0000-0x00007FF8C86FD000-memory.dmpFilesize
52KB
-
memory/2936-1808-0x00007FF8C86F0000-0x00007FF8C86FD000-memory.dmpFilesize
52KB
-
memory/2940-2509-0x0000027444BF0000-0x0000027444C00000-memory.dmpFilesize
64KB
-
memory/2940-2512-0x000002742C700000-0x000002742C722000-memory.dmpFilesize
136KB
-
memory/2940-2515-0x0000027444C80000-0x0000027444CF6000-memory.dmpFilesize
472KB
-
memory/2940-2625-0x0000027444BF0000-0x0000027444C00000-memory.dmpFilesize
64KB
-
memory/3032-3348-0x000001C8FC5A0000-0x000001C8FC5B0000-memory.dmpFilesize
64KB
-
memory/3032-3527-0x000001C8FC5A0000-0x000001C8FC5B0000-memory.dmpFilesize
64KB
-
memory/3032-3437-0x00007FF8C8FF0000-0x00007FF8C8FF1000-memory.dmpFilesize
4KB
-
memory/3032-3436-0x00007FF8C9000000-0x00007FF8C9001000-memory.dmpFilesize
4KB
-
memory/3032-3435-0x00007FF8C9040000-0x00007FF8C9041000-memory.dmpFilesize
4KB
-
memory/3156-6035-0x00000178F2800000-0x00000178F2801000-memory.dmpFilesize
4KB
-
memory/3156-5944-0x00007FF8C8E10000-0x00007FF8C8E11000-memory.dmpFilesize
4KB
-
memory/3156-5942-0x00007FF8C9040000-0x00007FF8C9041000-memory.dmpFilesize
4KB
-
memory/3156-5866-0x00000178F2800000-0x00000178F2801000-memory.dmpFilesize
4KB
-
memory/3156-5943-0x00007FF8C8E20000-0x00007FF8C8E21000-memory.dmpFilesize
4KB
-
memory/3328-4589-0x00007FF8C8E20000-0x00007FF8C8E21000-memory.dmpFilesize
4KB
-
memory/3328-4588-0x00007FF8C9040000-0x00007FF8C9041000-memory.dmpFilesize
4KB
-
memory/3328-4512-0x00007FF8C8E10000-0x00007FF8C8E11000-memory.dmpFilesize
4KB
-
memory/3328-4590-0x00007FF8C8E10000-0x00007FF8C8E11000-memory.dmpFilesize
4KB
-
memory/3688-2669-0x000001ACCCE20000-0x000001ACCCE30000-memory.dmpFilesize
64KB
-
memory/3688-2573-0x000001ACCCE20000-0x000001ACCCE30000-memory.dmpFilesize
64KB
-
memory/4840-3116-0x000001C8FC5A0000-0x000001C8FC5B0000-memory.dmpFilesize
64KB
-
memory/4840-3287-0x000001C8FC5A0000-0x000001C8FC5B0000-memory.dmpFilesize
64KB
-
memory/4840-3187-0x000001C8FC5A0000-0x000001C8FC5B0000-memory.dmpFilesize
64KB
-
memory/4840-3176-0x000001C8FCA30000-0x000001C8FCA38000-memory.dmpFilesize
32KB
-
memory/4840-3148-0x000001C8FC5B0000-0x000001C8FC5B8000-memory.dmpFilesize
32KB
-
memory/4840-3139-0x000001C8FC560000-0x000001C8FC568000-memory.dmpFilesize
32KB
-
memory/4976-2080-0x00007FF8C9040000-0x00007FF8C9041000-memory.dmpFilesize
4KB
-
memory/4976-2142-0x00007FF8C9040000-0x00007FF8C9041000-memory.dmpFilesize
4KB