Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
549s -
max time network
580s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 17:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://malware.com
Resource
win10v2004-20230703-en
General
-
Target
http://malware.com
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Executes dropped EXE 38 IoCs
pid Process 1352 RobloxPlayerLauncher.exe 4492 RobloxPlayerLauncher.exe 2740 RobloxPlayerLauncher.exe 2228 RobloxPlayerLauncher.exe 544 MicrosoftEdgeWebview2Setup.exe 3740 MicrosoftEdgeUpdate.exe 1620 MicrosoftEdgeUpdate.exe 5008 MicrosoftEdgeUpdate.exe 236 MicrosoftEdgeUpdateComRegisterShell64.exe 1272 MicrosoftEdgeUpdateComRegisterShell64.exe 1680 MicrosoftEdgeUpdateComRegisterShell64.exe 428 MicrosoftEdgeUpdate.exe 2684 MicrosoftEdgeUpdate.exe 5024 MicrosoftEdgeUpdate.exe 184 MicrosoftEdgeUpdate.exe 4092 MicrosoftEdge_X64_115.0.1901.188.exe 2508 setup.exe 1424 MicrosoftEdgeUpdate.exe 780 RobloxPlayerLauncher.exe 3044 RobloxPlayerLauncher.exe 4064 RobloxPlayerBeta.exe 1528 RobloxPlayerLauncher.exe 5032 RobloxPlayerLauncher.exe 1788 RobloxPlayerBeta.exe 4392 RobloxPlayerLauncher.exe 1352 RobloxPlayerLauncher.exe 2404 RobloxPlayerBeta.exe 1600 MicrosoftEdgeUpdate.exe 1672 MicrosoftEdgeUpdate.exe 1172 MicrosoftEdgeUpdate.exe 404 MicrosoftEdgeUpdateSetup_X86_1.3.177.11.exe 2532 MicrosoftEdgeUpdate.exe 1172 MicrosoftEdgeUpdate.exe 3372 MicrosoftEdgeUpdate.exe 1716 MicrosoftEdgeUpdateComRegisterShell64.exe 4880 MicrosoftEdgeUpdateComRegisterShell64.exe 2884 MicrosoftEdgeUpdateComRegisterShell64.exe 460 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 37 IoCs
pid Process 3740 MicrosoftEdgeUpdate.exe 1620 MicrosoftEdgeUpdate.exe 5008 MicrosoftEdgeUpdate.exe 236 MicrosoftEdgeUpdateComRegisterShell64.exe 5008 MicrosoftEdgeUpdate.exe 1272 MicrosoftEdgeUpdateComRegisterShell64.exe 5008 MicrosoftEdgeUpdate.exe 1680 MicrosoftEdgeUpdateComRegisterShell64.exe 5008 MicrosoftEdgeUpdate.exe 428 MicrosoftEdgeUpdate.exe 2684 MicrosoftEdgeUpdate.exe 5024 MicrosoftEdgeUpdate.exe 5024 MicrosoftEdgeUpdate.exe 2684 MicrosoftEdgeUpdate.exe 184 MicrosoftEdgeUpdate.exe 1424 MicrosoftEdgeUpdate.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 2404 RobloxPlayerBeta.exe 2404 RobloxPlayerBeta.exe 1600 MicrosoftEdgeUpdate.exe 1672 MicrosoftEdgeUpdate.exe 1672 MicrosoftEdgeUpdate.exe 1600 MicrosoftEdgeUpdate.exe 1172 MicrosoftEdgeUpdate.exe 2532 MicrosoftEdgeUpdate.exe 1172 MicrosoftEdgeUpdate.exe 3372 MicrosoftEdgeUpdate.exe 1716 MicrosoftEdgeUpdateComRegisterShell64.exe 3372 MicrosoftEdgeUpdate.exe 4880 MicrosoftEdgeUpdateComRegisterShell64.exe 3372 MicrosoftEdgeUpdate.exe 2884 MicrosoftEdgeUpdateComRegisterShell64.exe 3372 MicrosoftEdgeUpdate.exe 460 MicrosoftEdgeUpdate.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F795C339-932E-4B24-85B3-C7865BE4C1B9}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.177.11\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F795C339-932E-4B24-85B3-C7865BE4C1B9}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.177.11\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.177.11\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F795C339-932E-4B24-85B3-C7865BE4C1B9}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F795C339-932E-4B24-85B3-C7865BE4C1B9}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.177.11\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.177.11\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.177.11\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F795C339-932E-4B24-85B3-C7865BE4C1B9}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F795C339-932E-4B24-85B3-C7865BE4C1B9}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F795C339-932E-4B24-85B3-C7865BE4C1B9}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.177.11\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F795C339-932E-4B24-85B3-C7865BE4C1B9}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F795C339-932E-4B24-85B3-C7865BE4C1B9}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.177.11\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\settings rbxfpsunlocker.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt RobloxPlayerBeta.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt RobloxPlayerBeta.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt RobloxPlayerBeta.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 64 IoCs
pid Process 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\AnimationEditor\icon_pin.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\Debugger\Breakpoints\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaChat\icons\icon-share-game-pressed-24x24.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.188\identity_proxy\resources.pri setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Emotes\TenFoot\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Settings\MenuBarIcons\CaptureTab.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\btn_redGlow.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\scrollbuttonDown_ovr.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Settings\LeaveGame\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Settings\Players\FriendIcon.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\VR\Radial\SliceBackground.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaChat\9-slice\system-message.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\StudioSharedUI\pending-dark.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\LuaPackages\Packages\_Index\UIBlox\UIBlox\AppImageAtlas\img_set_1x_1.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaApp\icons\ic-blue-dot.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\avatar\unification\humanoidClassicAnimateDefaultChildren.rbxm RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.188\Trust Protection Lists\Mu\Analytics setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.188\VisualElements\Logo.png setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\sounds\action_jump.mp3 RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ManageCollaborators\arrowDown_light.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\StudioToolbox\AssetPreview\audioPlay_BG.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\TerrainTools\mtrl_air.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\fonts\Balthazar-Regular.ttf RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\AnimationEditor\button_hierarchy_opened.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Emotes\Large\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\VoiceChat\New\Connecting.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaApp\graphic\Auth\logo_white_1x.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\fonts\Sarpanch-Regular.ttf RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\AnimationEditor\img_eventMarker_border.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\StudioSharedUI\meshes.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\AnimationEditor\button_control_play.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\AnimationEditor\icon_delete_disabled.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\MaterialGenerator\Materials\Glacier.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\icon_admin-16.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\places\VRFTUX.rbxl RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.188\Locales\sr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\115.0.1901.188\Trust Protection Lists\Mu\Fingerprinting setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\AnimationEditor\button_control_start.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaChat\graphic\friendmask.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\AnimationEditor\img_key_indicator_inner.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBED9.tmp\msedgeupdateres_fr.dll MicrosoftEdgeUpdateSetup_X86_1.3.177.11.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7DC1.tmp\msedgeupdateres_iw.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\AnimationEditor\image_keyframe_constant_selected.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\PlayerList\Accept.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\PlatformContent\pc\textures\water\normal_12.dds RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaApp\graphic\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBED9.tmp\msedgeupdateres_sv.dll MicrosoftEdgeUpdateSetup_X86_1.3.177.11.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Controls\return.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaChat\icons\ic-back-android.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.188\Locales\it.pak setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\fonts\NotoSansBengaliUI-Regular.ttf RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\fonts\GothamSSm-Bold.otf RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\fonts\families\RobotoCondensed.json RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Controls\dpadRight.png RobloxPlayerLauncher.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\115.0.1901.188\msvcp140_codecvt_ids.dll setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\9SliceEditor\VerticalDragger.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\content\textures\ui\Settings\Players\[email protected] RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaChat\9-slice\gr-mask-game-icon.png RobloxPlayerLauncher.exe File created C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerLauncher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2884 4940 WerFault.exe 154 1360 4064 WerFault.exe 159 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\RobloxPlayerBeta.exe = "11000" RobloxPlayerBeta.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\RobloxPlayerBeta.exe = "11000" RobloxPlayerBeta.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerLauncher.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerLauncher.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION RobloxPlayerBeta.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerLauncher.exe Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION RobloxPlayerBeta.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerLauncher.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\Elevation MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ = "IAppCommand2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods\ = "11" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3D94CEB-EC11-46BE-8872-7DDCE37FABFA} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32\ = "{F795C339-932E-4B24-85B3-C7865BE4C1B9}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.Update3WebMachine" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32\ = "{F795C339-932E-4B24-85B3-C7865BE4C1B9}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher.1.0\ = "Microsoft Edge Update Process Launcher Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ = "IPolicyStatusValue" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-studio\shell\open RobloxPlayerLauncher.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.Update3COMClassService" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\ServiceParameters = "/comsvc" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods\ = "43" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{F795C339-932E-4B24-85B3-C7865BE4C1B9}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods\ = "6" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{F795C339-932E-4B24-85B3-C7865BE4C1B9}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\CurVer\ = "MicrosoftEdgeUpdate.ProcessLauncher.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32\ = "{F795C339-932E-4B24-85B3-C7865BE4C1B9}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 RobloxPlayerBeta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 RobloxPlayerBeta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 RobloxPlayerBeta.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 713899.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 1552 msedge.exe 1552 msedge.exe 4640 identity_helper.exe 4640 identity_helper.exe 1664 msedge.exe 1664 msedge.exe 1352 RobloxPlayerLauncher.exe 1352 RobloxPlayerLauncher.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 3740 MicrosoftEdgeUpdate.exe 3740 MicrosoftEdgeUpdate.exe 3740 MicrosoftEdgeUpdate.exe 3740 MicrosoftEdgeUpdate.exe 3740 MicrosoftEdgeUpdate.exe 3740 MicrosoftEdgeUpdate.exe 1960 msedge.exe 1960 msedge.exe 468 msedge.exe 468 msedge.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4940 rbxfpsunlocker.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 4064 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 4392 RobloxPlayerLauncher.exe 4392 RobloxPlayerLauncher.exe 2404 RobloxPlayerBeta.exe 2404 RobloxPlayerBeta.exe 2404 RobloxPlayerBeta.exe 2404 RobloxPlayerBeta.exe 1600 MicrosoftEdgeUpdate.exe 1600 MicrosoftEdgeUpdate.exe 1600 MicrosoftEdgeUpdate.exe 1600 MicrosoftEdgeUpdate.exe 1672 MicrosoftEdgeUpdate.exe 1672 MicrosoftEdgeUpdate.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 116 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 28 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3740 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 3740 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1600 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1672 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2532 MicrosoftEdgeUpdate.exe Token: 33 64 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 64 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 4940 rbxfpsunlocker.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 4940 rbxfpsunlocker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 116 OpenWith.exe -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 4064 RobloxPlayerBeta.exe 1788 RobloxPlayerBeta.exe 2404 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 3096 1552 msedge.exe 61 PID 1552 wrote to memory of 3096 1552 msedge.exe 61 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 4524 1552 msedge.exe 84 PID 1552 wrote to memory of 3880 1552 msedge.exe 85 PID 1552 wrote to memory of 3880 1552 msedge.exe 85 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86 PID 1552 wrote to memory of 4432 1552 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://malware.com1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb497f46f8,0x7ffb497f4708,0x7ffb497f47182⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1756 /prefetch:82⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6508 /prefetch:82⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exeC:\Users\Admin\Downloads\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=fde48f439a9af7a7f1b323bea0e4a5d1febc3390 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x6d8,0x6dc,0x6d4,0x6c0,0x7d0,0xba1330,0xba1340,0xba13503⤵
- Executes dropped EXE
PID:4492
-
-
C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:544 -
C:\Program Files (x86)\Microsoft\Temp\EU7DC1.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU7DC1.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1620
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5008 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:236
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1272
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1680
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzAyRURBMDgtM0Y4RC00MzY4LUJBMzItM0Q0MDU4OEM0MTA0fSIgdXNlcmlkPSJ7NTEzNDUwNkUtMTUxRi00Mzg2LTk3Q0YtOTIzMzNFRjg5QzFCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins3NzU5ODlFOC1GMUI1LTQ0N0EtODM0QS1BMzUyRUFGMTlDM0R9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTcxLjM5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2MDQ5NzUyMDE3IiBpbnN0YWxsX3RpbWVfbXM9IjEzMTciLz48L2FwcD48L3JlcXVlc3Q-5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:428
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{C02EDA08-3F8D-4368-BA32-3D40588C4104}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684
-
-
-
-
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"2⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exeC:\Users\Admin\Downloads\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=fde48f439a9af7a7f1b323bea0e4a5d1febc3390 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x564,0x568,0x56c,0x540,0x5a8,0xba1330,0xba1340,0xba13503⤵
- Executes dropped EXE
PID:2228
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1908 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1908 /prefetch:82⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6772 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6676 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7108 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerLauncher.exe" roblox-player:1+launchmode:play+gameinfo:GuKJeSxQqlFDIgllkH8xOEqE-MO0FMVPPxsRFru2kHcFdrCqe8eoPVP-mEmlePgntRayGS5pIFJfk2IUgC6FVHYOUq-4waPmgHybOjaWk8IxQXTodpDVVQdPk9XTv9kKubQ4gMmJ8RVobSRnxqh5-AxG_TOxh0nS-YPrQwWyFBtfEWbmNwR1Syz8SUPzrLUpEq91GjDtwL_Ctz4B78GY5C3MYjOiM5Fd-LD4QpGsktM+launchtime:1691171842416+placelauncherurl:https%3A%2F%2Fassetgame.roblox.com%2Fgame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D183188055840%26placeId%3D8481844229%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3De0877534-589e-4a34-b9e9-77f0e8286003%26joinAttemptOrigin%3DPlayButton+browsertrackerid:183188055840+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
PID:780 -
C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerLauncher.exe" --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=fde48f439a9af7a7f1b323bea0e4a5d1febc3390 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x710,0x714,0x718,0x5e4,0x6dc,0x13d1330,0x13d1340,0x13d13503⤵
- Executes dropped EXE
PID:3044
-
-
C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerBeta.exe" --app -t GuKJeSxQqlFDIgllkH8xOEqE-MO0FMVPPxsRFru2kHcFdrCqe8eoPVP-mEmlePgntRayGS5pIFJfk2IUgC6FVHYOUq-4waPmgHybOjaWk8IxQXTodpDVVQdPk9XTv9kKubQ4gMmJ8RVobSRnxqh5-AxG_TOxh0nS-YPrQwWyFBtfEWbmNwR1Syz8SUPzrLUpEq91GjDtwL_Ctz4B78GY5C3MYjOiM5Fd-LD4QpGsktM -j https://assetgame.roblox.com/game/PlaceLauncher.ashx?request=RequestGame&browserTrackerId=183188055840&placeId=8481844229&isPlayTogetherGame=false&joinAttemptId=e0877534-589e-4a34-b9e9-77f0e8286003&joinAttemptOrigin=PlayButton -b 183188055840 --launchtime=1691171842416 --rloc en_us --gloc en_us roblox-player:1+launchmode:play+gameinfo:GuKJeSxQqlFDIgllkH8xOEqE-MO0FMVPPxsRFru2kHcFdrCqe8eoPVP-mEmlePgntRayGS5pIFJfk2IUgC6FVHYOUq-4waPmgHybOjaWk8IxQXTodpDVVQdPk9XTv9kKubQ4gMmJ8RVobSRnxqh5-AxG_TOxh0nS-YPrQwWyFBtfEWbmNwR1Syz8SUPzrLUpEq91GjDtwL_Ctz4B78GY5C3MYjOiM5Fd-LD4QpGsktM+launchtime:1691171842416+placelauncherurl:https%3A%2F%2Fassetgame.roblox.com%2Fgame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D183188055840%26placeId%3D8481844229%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3De0877534-589e-4a34-b9e9-77f0e8286003%26joinAttemptOrigin%3DPlayButton+browsertrackerid:183188055840+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4064 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4064 -s 21804⤵
- Program crash
PID:1360
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerLauncher.exe" roblox-player:1+launchmode:play+gameinfo:AV-AJ1Kaf-VWB8xbKSR8OHYaWoBsBD3aQCWzRAeT-mVxOfAKWjp8ogzt-0U9k93IDTLJnJfESp3rSII2QwY4n9S-3TGM0VEFoMvQLUOKSAvdXx-ePBSUEaJBghaLoU7ujZOVf6jFiVOBs3798EQLWxL6xRggiiFBZOAuqjhtUJqDFZCLVlLtyNOLw_D1dn3ygwxfLlsl00O7cGWzDWJTeE5BrbwW4b54J7PQfu8ow4w+launchtime:1691171842416+placelauncherurl:https%3A%2F%2Fassetgame.roblox.com%2Fgame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D183188055840%26placeId%3D8481844229%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3De0877534-589e-4a34-b9e9-77f0e8286003%26joinAttemptOrigin%3DPlayButton+browsertrackerid:183188055840+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
PID:1528 -
C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerLauncher.exe"C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerLauncher.exe" --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=fde48f439a9af7a7f1b323bea0e4a5d1febc3390 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x724,0x728,0x72c,0x6f0,0x700,0x13d1330,0x13d1340,0x13d13503⤵
- Executes dropped EXE
PID:5032
-
-
C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerBeta.exe" --app -t AV-AJ1Kaf-VWB8xbKSR8OHYaWoBsBD3aQCWzRAeT-mVxOfAKWjp8ogzt-0U9k93IDTLJnJfESp3rSII2QwY4n9S-3TGM0VEFoMvQLUOKSAvdXx-ePBSUEaJBghaLoU7ujZOVf6jFiVOBs3798EQLWxL6xRggiiFBZOAuqjhtUJqDFZCLVlLtyNOLw_D1dn3ygwxfLlsl00O7cGWzDWJTeE5BrbwW4b54J7PQfu8ow4w -j https://assetgame.roblox.com/game/PlaceLauncher.ashx?request=RequestGame&browserTrackerId=183188055840&placeId=8481844229&isPlayTogetherGame=false&joinAttemptId=e0877534-589e-4a34-b9e9-77f0e8286003&joinAttemptOrigin=PlayButton -b 183188055840 --launchtime=1691171842416 --rloc en_us --gloc en_us roblox-player:1+launchmode:play+gameinfo:AV-AJ1Kaf-VWB8xbKSR8OHYaWoBsBD3aQCWzRAeT-mVxOfAKWjp8ogzt-0U9k93IDTLJnJfESp3rSII2QwY4n9S-3TGM0VEFoMvQLUOKSAvdXx-ePBSUEaJBghaLoU7ujZOVf6jFiVOBs3798EQLWxL6xRggiiFBZOAuqjhtUJqDFZCLVlLtyNOLw_D1dn3ygwxfLlsl00O7cGWzDWJTeE5BrbwW4b54J7PQfu8ow4w+launchtime:1691171842416+placelauncherurl:https%3A%2F%2Fassetgame.roblox.com%2Fgame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D183188055840%26placeId%3D8481844229%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3De0877534-589e-4a34-b9e9-77f0e8286003%26joinAttemptOrigin%3DPlayButton+browsertrackerid:183188055840+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtCreateThreadExHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1788 -
C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\RobloxPlayerBeta.exe" -d4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2404
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6267053839399236271,6262877111061594818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4716
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:5024 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzAyRURBMDgtM0Y4RC00MzY4LUJBMzItM0Q0MDU4OEM0MTA0fSIgdXNlcmlkPSJ7NTEzNDUwNkUtMTUxRi00Mzg2LTk3Q0YtOTIzMzNFRjg5QzFCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntGNUM1MTZGQi1CMjUzLTQxMEUtQTA4Qi00NjY2NzhEQkYyRTR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3FXSlN6V3dQZmRjTFIrWEdJdjZ4clpmaVlPeGhQVTJzMU5XbWpXY2FGUGc9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBuZXh0dmVyc2lvbj0iMTA2LjAuNTI0OS4xMTkiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSI1IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2MDU3NjQyMjUzIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:184
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{ACEC09A7-AE0C-4B62-9A4E-311BBBA43AD4}\MicrosoftEdge_X64_115.0.1901.188.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{ACEC09A7-AE0C-4B62-9A4E-311BBBA43AD4}\MicrosoftEdge_X64_115.0.1901.188.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:4092 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{ACEC09A7-AE0C-4B62-9A4E-311BBBA43AD4}\EDGEMITMP_B626D.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{ACEC09A7-AE0C-4B62-9A4E-311BBBA43AD4}\EDGEMITMP_B626D.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{ACEC09A7-AE0C-4B62-9A4E-311BBBA43AD4}\MicrosoftEdge_X64_115.0.1901.188.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2508
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzAyRURBMDgtM0Y4RC00MzY4LUJBMzItM0Q0MDU4OEM0MTA0fSIgdXNlcmlkPSJ7NTEzNDUwNkUtMTUxRi00Mzg2LTk3Q0YtOTIzMzNFRjg5QzFCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins0MzdGN0FERC04RUQxLTQwRDUtQjE5MC1BMDUzM0IyOTlCMTV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjExNS4wLjE5MDEuMTg4IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2MDcxMjEyNDk4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NjA5IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2Nzk0NzQxNTIwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iNzI2IiBkb3dubG9hZF90aW1lX21zPSIzMDgyMyIgZG93bmxvYWRlZD0iMTUxMDczNzM2IiB0b3RhbD0iMTUxMDczNzM2IiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSIzOTA3NSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1424
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\Temp1_rbxfpsunlocker-x64-hotfix1.zip\rbxfpsunlocker.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_rbxfpsunlocker-x64-hotfix1.zip\rbxfpsunlocker.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4940 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4940 -s 15322⤵
- Program crash
PID:2884
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 4940 -ip 49401⤵PID:4268
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 576 -p 4064 -ip 40641⤵PID:544
-
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"C:\Users\Admin\Downloads\RobloxPlayerLauncher.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4392 -
C:\Users\Admin\Downloads\RobloxPlayerLauncher.exeC:\Users\Admin\Downloads\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=fde48f439a9af7a7f1b323bea0e4a5d1febc3390 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x5d0,0x5d4,0x5d8,0x5a8,0x5e0,0xba1330,0xba1340,0xba13502⤵
- Executes dropped EXE
PID:1352
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:4568
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵PID:3640
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE33F72A-11A1-4982-839B-CE10B66E562C}\MicrosoftEdgeUpdateSetup_X86_1.3.177.11.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE33F72A-11A1-4982-839B-CE10B66E562C}\MicrosoftEdgeUpdateSetup_X86_1.3.177.11.exe" /update /sessionid "{56D4B6DB-6AEB-41B8-83F0-8B3EB655F7DF}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:404 -
C:\Program Files (x86)\Microsoft\Temp\EUBED9.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUBED9.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{56D4B6DB-6AEB-41B8-83F0-8B3EB655F7DF}"3⤵
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2532 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1172
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3372 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1716
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4880
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2884
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzcuMTEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NTZENEI2REItNkFFQi00MUI4LTgzRjAtOEIzRUI2NTVGN0RGfSIgdXNlcmlkPSJ7NTEzNDUwNkUtMTUxRi00Mzg2LTk3Q0YtOTIzMzNFRjg5QzFCfSIgaW5zdGFsbHNvdXJjZT0ic2VsZnVwZGF0ZSIgcmVxdWVzdGlkPSJ7NjM5NDFCREMtRDRGNS00OEU4LTlBQjEtRUQ2N0NEQzg1QUZCfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIG9zX3JlZ2lvbl9uYW1lPSJVUyIgb3NfcmVnaW9uX25hdGlvbj0iMjQ0IiBvc19yZWdpb25fZG1hPSIwIiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSJEQURZIiBwcm9kdWN0X25hbWU9IlN0YW5kYXJkIFBDIChRMzUgKyBJQ0g5LCAyMDA5KSIvPjxleHAgZXRhZz0iJnF1b3Q7cVdKU3pXd1BmZGNMUitYR0l2NnhyWmZpWU94aFBVMnMxTldtaldjYUZQZz0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE3MS4zOSIgbmV4dHZlcnNpb249IjEuMy4xNzcuMTEiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZXRpbWU9IjE2OTExNzE5MDYiPjxldmVudCBldmVudHR5cGU9IjMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9Ijk1MjEzNzIzMjQiLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:460
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NTZENEI2REItNkFFQi00MUI4LTgzRjAtOEIzRUI2NTVGN0RGfSIgdXNlcmlkPSJ7NTEzNDUwNkUtMTUxRi00Mzg2LTk3Q0YtOTIzMzNFRjg5QzFCfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InsyNDMxQ0YwNC1CQ0VCLTREMDEtOURFNC01QjQ2QjMxMjJEREV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3FXSlN6V3dQZmRjTFIrWEdJdjZ4clpmaVlPeGhQVTJzMU5XbWpXY2FGUGc9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTc3LjExIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9IlByb2R1Y3RzVG9SZWdpc3Rlcj0lN0JGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzUlN0QiIGluc3RhbGxhZ2U9IjAiPjx1cGRhdGVjaGVjay8-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-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-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0iezNFNzhGMjYzLTcxM0ItNEQ2RS1CRjZCLTcwMzZEQTMzQjFBM30iLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1172
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x4b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:64
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD544bbfb654b9725d2489094512160bf0c
SHA16f649fedce1b4b75a9013fef7722e2567dda2a1e
SHA256b5eb80c0a1ce27616a2444b0379aab08707067feda7782abf03feaf8be1f6a5a
SHA512b15be6469f94be1c4b7fa5bdece3cc5986f9fb9462a63e8780f104e35af35fa8985ee9db74cc3e6f24f65f73935a49637637e789b22f0316353caa642dfdc611
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\115.0.1901.188\MicrosoftEdge_X64_115.0.1901.188.exe
Filesize144.1MB
MD59322417f73279bf090d5cdea916b9710
SHA1362f6c104ab1eb1895bcc123d5b7536d9277a1c8
SHA256301f175d439cc2b1886a9c8e4c31071ac3fcdfb3f500b1f3fa0be5509910741f
SHA512e5e1bbae4b04f9b0bc7e856401cebeb0f321ccd79973ad39d4e8e98bdb62920436a97a17385755dc9e9f2fb431ee07b71a71671df4827fc770df16c71ecdc9a6
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.177.11\MicrosoftEdgeUpdateSetup_X86_1.3.177.11.exe
Filesize1.5MB
MD571b072f0a3d4b9e580a8bcd523403d43
SHA106bac910ad59cfa7ef323096d2c6728496b5e995
SHA256a86d9f7c545953074b8b9c18474e953db73a9ba8e9ca50cbb3e5d97a7347fe4d
SHA5128e668cb63d2b2092c81c8ef8e5eeacc01a34cc8b1eb7959bdd6104337a9a491650e41412dedbc5dca620320223694902d99d4213c95fed90799b262799a6a554
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
Filesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
Filesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
Filesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
Filesize
24KB
MD5f6c1324070b6c4e2a8f8921652bfbdfa
SHA1988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf
SHA256986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717
SHA51263092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100
-
Filesize
26KB
MD5570efe7aa117a1f98c7a682f8112cb6d
SHA1536e7c49e24e9aa068a021a8f258e3e4e69fa64f
SHA256e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01
SHA5125e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8
-
Filesize
28KB
MD5a8d3210e34bf6f63a35590245c16bc1b
SHA1f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693
SHA2563b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766
SHA5126e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a
-
Filesize
29KB
MD57937c407ebe21170daf0975779f1aa49
SHA14c2a40e76209abd2492dfaaf65ef24de72291346
SHA2565ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9
SHA5128670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7
-
Filesize
29KB
MD58375b1b756b2a74a12def575351e6bbd
SHA1802ec096425dc1cab723d4cf2fd1a868315d3727
SHA256a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105
SHA512aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19
-
Filesize
29KB
MD5a94cf5e8b1708a43393263a33e739edd
SHA11068868bdc271a52aaae6f749028ed3170b09cce
SHA2565b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c
SHA512920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7
-
Filesize
29KB
MD57dc58c4e27eaf84ae9984cff2cc16235
SHA13f53499ddc487658932a8c2bcf562ba32afd3bda
SHA256e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98
SHA512bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc
-
Filesize
28KB
MD5e338dccaa43962697db9f67e0265a3fc
SHA14c6c327efc12d21c4299df7b97bf2c45840e0d83
SHA25699b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04
SHA512e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9
-
Filesize
29KB
MD52929e8d496d95739f207b9f59b13f925
SHA17c1c574194d9e31ca91e2a21a5c671e5e95c734c
SHA2562726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df
SHA512ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957
-
Filesize
30KB
MD539551d8d284c108a17dc5f74a7084bb5
SHA16e43fc5cec4b4b0d44f3b45253c5e0b032e8e884
SHA2568dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07
SHA5126fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2
-
Filesize
28KB
MD516c84ad1222284f40968a851f541d6bb
SHA1bc26d50e15ccaed6a5fbe801943117269b3b8e6b
SHA256e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b
SHA512d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e
-
Filesize
28KB
MD534d991980016595b803d212dc356d765
SHA1e3a35df6488c3463c2a7adf89029e1dd8308f816
SHA256252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e
SHA5128a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed
-
Filesize
28KB
MD5d34380d302b16eab40d5b63cfb4ed0fe
SHA11d3047119e353a55dc215666f2b7b69f0ede775b
SHA256fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f
SHA51245ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538
-
Filesize
30KB
MD5aab01f0d7bdc51b190f27ce58701c1da
SHA11a21aabab0875651efd974100a81cda52c462997
SHA256061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c
SHA5125edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e
-
Filesize
30KB
MD5ac275b6e825c3bd87d96b52eac36c0f6
SHA129e537d81f5d997285b62cd2efea088c3284d18f
SHA256223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0
SHA512bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679
-
Filesize
27KB
MD5d749e093f263244d276b6ffcf4ef4b42
SHA169f024c769632cdbb019943552bac5281d4cbe05
SHA256fd90699e7f29b6028a2e8e6f3ae82d26cdc6942bd39c4f07b221d87c5dbbfe1e
SHA51248d51b006ce0cd903154fa03d17e76591db739c4bfb64243725d21d4aa17db57a852077be00b9a51815d09664d18f9e6ad61d9bc41b3d013ed24aaec8f477ad9
-
Filesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
Filesize
29KB
MD528fefc59008ef0325682a0611f8dba70
SHA1f528803c731c11d8d92c5660cb4125c26bb75265
SHA25655a69ce2d6fc4109d16172ba6d9edb59dbadbc8af6746cc71dc4045aa549022d
SHA5122ec71244303beac7d5ce0905001fe5b0fb996ad1d1c35e63eecd4d9b87751f0633a281554b3f0aa02ee44b8ceaad85a671ef6c34589055797912324e48cc23ed
-
Filesize
28KB
MD59db7f66f9dc417ebba021bc45af5d34b
SHA16815318b05019f521d65f6046cf340ad88e40971
SHA256e652159a75cbab76217ecbb4340020f277175838b316b32cf71e18d83da4a819
SHA512943d8fc0d308c5ccd5ab068fc10e799b92465a22841ce700c636e7ae1c12995d99c0a93ab85c1ae27fefce869eabadbeafee0f2f5f010ad3b35fa4f748b54952
-
Filesize
28KB
MD5b78cba3088ecdc571412955742ea560b
SHA1bc04cf9014cec5b9f240235b5ff0f29dbdb22926
SHA256f0a4cfd96c85f2d98a3c9ecfadd41c0c139fdb20470c8004f4c112dd3d69e085
SHA51204c8ab8e62017df63e411a49fb6218c341672f348cb9950b1f0d2b2a48016036f395b4568da70989f038e8e28efea65ddd284dfd490e93b6731d9e3e0e0813cf
-
Filesize
28KB
MD5a7e1f4f482522a647311735699bec186
SHA13b4b4b6e6a5e0c1981c62b6b33a0ca78f82b7bbd
SHA256e5615c838a71b533b26d308509954907bcc0eb4032cdbaa3db621eede5e6bfa4
SHA51222131600bbac8d9c2dab358e244ec85315a1aaebfc0fb62aaa1493c418c8832c3a6fbf24a6f8cf4704fdc4bc10a66c88839a719116b4a3d85264b7ad93c54d57
-
Filesize
27KB
MD5cbe3454843ce2f36201460e316af1404
SHA10883394c28cb60be8276cb690496318fcabea424
SHA256c66c4024847d353e9985eb9b2f060b2d84f12cc77fb6479df5ffc55dbda97e59
SHA512f39e660f3bfab288871d3ec40135c16d31c6eb1a84136e065b54ff306f6f8016a788c713d4d8e46ad62e459f9073d2307a6ed650919b2dd00577bbfd04e5bd73
-
Filesize
4.6MB
MD5fa23f3a48c2e4ab7502588d590ee04e8
SHA1486b0015d4f75af3f09f9c676b5f62a97a22bd62
SHA256b21083b9c2ca0572bba7368ad178935d0e7e6ea017deb90e94936bf58152f4ef
SHA51268d1e99931823f45aa7491a509cb4d08abe49664b349d612aee12089e9f5660c4fc15ec398065910a8443264a9855056caa8c70d8efe8d63d8aadf457a46cf9f
-
Filesize
4.3MB
MD575c84e84d1b1f88a0b60c24ada7d1a05
SHA15d97eaec7edc121d373be4dcfa93cab8ba2e80ca
SHA256225fc83b3f3674003b232ac1ea32a2e8e7391ab97a9ccf880471098d6c8cad77
SHA51252f49f00f996b7e7bc3bc1bead4680abeec27b96b991c6b05e74be2e62984735ab1625f8e45c9373cafcefc8e0a9f616f8e9acb260c8b5ba583eaefbbc69048e
-
C:\Program Files (x86)\Roblox\Versions\version-6552be68b05d41a5\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
Filesize1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
Filesize
78KB
MD546a1a148d5b9e00279ea28195e392a63
SHA16aad50ee05c9b20a7787af8b5ceed110fc097179
SHA25631323d7b579b56c28433ad3b1e4970668471b68cb2cc229b8c73e5a5c0374d61
SHA512eee316a9ea01e24f586c3204ea3d17e0574277c0f0e26a64739876e48936bd53b68c1f8dab6d52f7117830fd9e26419de18c78f2886b1024795a3404fd8cf0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD54b84991dda98e5a54055a7d6144b4917
SHA1f2b55d3956d9deab4dc8b0d235e6db1dca39f2b1
SHA25637ba2ca12bc053d06f8a5fff53915e9add1e0a32f573a0362d2c044a8a8c9cad
SHA512ed3dea53e40a575ae09b48af4473e0835476905bf30f5c898b2f81d61fd7a11879a3682d8d95329d10738f52902b7c5a2e9f64981c5028c016489c220345fcac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD59f3a0f7e003a23d416469b7399812e4e
SHA153f589eb7d76e2ac9c3a4b9838f0223c64974f24
SHA2564db626441c822df86355df8058983a397a1103808f55bd456937b3c7eaad0f7d
SHA5120a3d14df446d9d83a56a65c30d1c4c85ca49e6a00ea7171d7bbd2ebcc1773d686c881cd6b6b7b978074d4c879b0c5f9045a14d2c7df035e91d1b15847df5e294
-
Filesize
152B
MD5b5f5369274e3bfbc449588bbb57bd383
SHA158bb46d57bd70c1c0bcbad619353cbe185f34c3b
SHA2564190bd2ec2c0c65a2b8b97782cd3ae1d6cead80242f3595f06ebc6648c3e3464
SHA51204a3816af6c5a335cde99d97019a3f68ade65eba70e4667c4d7dd78f78910481549f1dad23a46ccf9efa2e25c6e7a7c78c592b6ace951e1aab106ba06a10fcd6
-
Filesize
97KB
MD595db20c037e916f71c37625fcf6737b9
SHA139fd4f6d6526ab3b7ad2a808b8b91a8531d7916c
SHA256c45bd08a6258ac03d1276ef4c3ae587e530dac737c43ab1bd60b3f920192fab1
SHA512eedc50e5e82f6be83ac9c0e3862f47843e328fddd9c2f2007ec69f0aedf309bb0418883740114917fa770054894ac72bf34bfa4d0888a3cc7fec7af9152f2977
-
Filesize
70KB
MD520fdfae5425e118bf442a2904bacf256
SHA1e3920bd460a04913930ced084fdf69d68d9321bb
SHA2561a03516733fe6d015c3f17045f7aeef43daa7d8e28d559e108240dcbda75c003
SHA512d7a88604d4b422143854bcd57c311b0acb23bb15d47f80f066a992ed0fec85d0ab5d51c205ed971d325c194f2470f010e8d44b2552c7db7ba494758c9bae149c
-
Filesize
51KB
MD5588ee33c26fe83cb97ca65e3c66b2e87
SHA1842429b803132c3e7827af42fe4dc7a66e736b37
SHA256bbc4044fe46acd7ab69d8a4e3db46e7e3ca713b05fa8ecb096ebe9e133bba760
SHA5126f7500b12fc7a9f57c00711af2bc8a7c62973f9a8e37012b88a0726d06063add02077420bc280e7163302d5f3a005ac8796aee97042c40954144d84c26adbd04
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
69KB
MD5a90d7c369b2a589d9034e9a201efe567
SHA17afe40e9e4002a2254885901d66451e2ab0994c0
SHA2567cc054981e642ae7bcbdbc78152eccb11b31a6d922ea1dfe61e749f8985e498d
SHA512befddc83828674c9993b8912ea83486dcb04389e0d7b45a4e6c19b6bb5e6e0ed2b16d9247c2e633870658697131c094864d3cdd9a2a4c0fb17bb503ad2915b21
-
Filesize
17KB
MD5c67d4a3d3138d3caa7d1b4c39bf7bc5c
SHA1c0968a1c8266360ec5e8cfc0cd415739a32f413c
SHA256d1fd9f6089b502cebdd5f8f44cb38becdb045e9f1643352fcb03b02240f1f7bf
SHA51219c5b3ae70b66b574ce42c9b4f2ee490fa44ef7e2ebe59ccabaf5bb28afc4a2b9b5bc6261d047c76b0bac997cf40c6406bd509b03bf9367aa40a5b4b1638c30c
-
Filesize
88KB
MD50243d388e8b9f0f12f7d2b67e719cf73
SHA139bd292a8a602c774ce189103b51cbdbee85c14e
SHA256f7a8bf314a7a54ef1a2ce6d2ed661c6ed9c41dcf756783254739cf72416c0c73
SHA512c5dbfb863e46ecb046727f23444f1748b24085618e423d00a936ce6870a00a670c9fad389d5b95a1527713c987a73432b43973a30439c59b4f137388b544acde
-
Filesize
89KB
MD520b4214373f69aa87de9275e453f6b2d
SHA105d5a9980b96319015843eee1bd58c5e6673e0c2
SHA256aa3989bee002801f726b171dcc39c806371112d0cfd4b4d1d4ae91495a419820
SHA512c1e86e909473386b890d25d934de803f313a8d8572eb54984b97f3f9b2b88cbe2fb43a20f9c3361b53b040b3b61afb154b3ec99a60e35df8cf3563dabf335f54
-
Filesize
1.1MB
MD597940cb4bcfe9d03f8cae21594a10e77
SHA115007c1431a8801020c5d39e424dc45a4b946bd0
SHA25645a9caeb76fe32605ee8867b4481c5cee760f167d7e44e16f5a13ea6b7b24eb5
SHA512bd9b6518f1bb53febfa925ad5ddb15f75062cb0f4b5a6d216656f0d9c9eed365f0bff391bd23fb6e4adf4117e6118938d0ffe779ca565babe8f739fd1a0c53a0
-
Filesize
202KB
MD59901c48297a339c554e405b4fefe7407
SHA15182e80bd6d4bb6bb1b7f0752849fe09e4aa330e
SHA2569a5974509d9692162d491cf45136f072c54ddc650b201336818c76a9f257d4d2
SHA512b68ef68c4dcc31716ce25d486617f6ef929ddbb8f7030dd4838320e2803dd6dd1c83966b3484d2986b19f3bd866484c5a432f4f6533bb3e72f5c7457a9bb9742
-
Filesize
1024KB
MD519d40b230003cdff2e07eae8ff3914cd
SHA121e57e2ab8d24400a977ecc5bc0cf99315a6cd85
SHA2563e2fd611228acca2857dc9243af15f5598ad4051386b022300486ed1b0f018dc
SHA512f1349a0458f52f3f6f27e15e59a90330028f5d7bc52447ff59fc675f88f0160e223e168f1b87beaa5bdcd96ad7277df8fb792dfd82b714541e842d04d5fcbfce
-
Filesize
912KB
MD58be6ffcbb5cdb108232091fe9a734a18
SHA1d535a1eee42b8844d05b3f1a8c7108dfd91341bd
SHA256910cef999a5cea9ef21c8bcebb31d234de9a6a019d557125c8eb49f5d0191b9e
SHA5122550920ac07e79d6ee2cbea643516906c19cee0ccaa3471126b361b1c0fb8934c46129b88ea1d0f661b4357d37429548a39448c037c8b9b4794b05cd4a28313f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD59e0082bbf48597729bbcd9f2c672433b
SHA11d6489e28401cd93adceb567d098f62efb69ecdc
SHA2569767f81c6207c47169497b70b2ff436bc5e8999720110db5526a7951c1afad9b
SHA5123dd1665320f74ba35d6a493f89734527a96c9c203608be323c84f527fc252d1cc0fcc8d0810a9796e2b4eccd86c56e4650c149211c04afc1d1dd765116819414
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD55b9a98d6ac269a7fc66240b2a09c26c6
SHA10e7bbfd54fc9561290f24edb4a20e0868ae36b9f
SHA256d5362e7b0e9302b84123b4b89cf648066a3ef7158abe228825144bb52f28d6d7
SHA51201e07bfb0d80b380466210f890f97ad3a9731a8cf90da1bd5d6735d20db2988bf887d93de6e5a320936b1684b993a67f2b96b67d216dcbd3a42cdcf171b68fb1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5c2d3ad8f581f0a653041de8183a6928b
SHA1ef7ac6d6c7ecb9160da9f69cb7c9195d04d647ee
SHA256b970398e31554d07354b8e9e7729f6df810c2641bd7550ee28ad940ad6d964a5
SHA512062bb178151e67a94e6cc2e8f43077a632c1d1a465e9800faa631ce2aab27c529706a17b7575a004b0046c28119fc99f6ebba86be68ad8947f4464c998d0f71e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD578e531c876fdfd23ffaa5ff877b0c464
SHA1ea9937a7390b195b3c64c306af7170d25d572574
SHA256af9955e9d8cf946cfbd75b2d7feefd53ae6d5a59c404cb79b7b777186817cbbe
SHA5125cf68e97130fd8ffae4b5da9924a78bdda8765dd2906cd32a706f6611e51575ac00b2592a599fdf7ace379634d2d9f03ae051ef57ff2debdd2bd98a3cdb56b90
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD571d63c877ca7321c6b28b37a62f0d97c
SHA1f0c14679eaabea155090031178c233370cc98f66
SHA256fadc3f54f6118033fda084def98955e4523dfccd15bbec63f46a64b2b3e78c40
SHA512fc32ded5bab9d821683e2d51742760d399ae5dbbd1cb7d20de32c868e01077d29b925fa49ad835b872d7be8a8047900d4909d8ef3b8dbdcd3322eea3f9617ffd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD5b85ddfaa84e32a55c246482857a19029
SHA178848e5f34c935a9478bdb7fc18d0cd107134ffd
SHA256e1e243009dc6b5e8bdbb68bec069d2dad11bece394ab0a3156e95ebf00510b5a
SHA51279b150e0f6a63856a3236d617adc0b381c752695e9f6bb7a3ecdaa75b79c3c40f06ab1a1d22f83c41f4b340228aa77ca79696bfd27d4471f3375c4ba58f54cb1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old
Filesize389B
MD5b7a9d90838e43813afe66997dcfcca3d
SHA171272ca57ce00888ae301e1776b644af83358b9d
SHA2560dac7390e97ae71c1e15aedd9feec150f3d84e2a1bdf63643d6a8b267b59eb55
SHA5122846a8b9bc07686045ea270c0c213837372793ca06a4eceda6f03d640d33efb4199626725f1bea8fd8d39d14e00940e3d7f4076d4050628152104e80837e5d3e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old
Filesize386B
MD55549e50975ec42cc4aa5b7926b441d26
SHA17ed970e686039f9264a246a6c042f486d8c4ebdf
SHA25680f5eef60bb82ec241ad7ac8b4ecd346264b617e096d741062fb63ae4ac028e1
SHA51283f5082bbd77d32089b10a66a93ea81a9f01031e8ef4876618076cde6825485a773a5ce0d64953aa6038c3585cd4facd226607bfc030d585e725b096bc9e363c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old~RFe58bfc1.TMP
Filesize349B
MD5be9ffc055ae7d458df7a83f2879f627b
SHA10da5af1d5353c014fef24ee7c4a1eeb1c671d83a
SHA2566f78c711e5bb11918c096694903fa0a9955fdc1a4548b5c5e62864770bf5b444
SHA5120d992ff280dd26140d3a6cd17023f935ac79b459b19e3ef98ad1932dfad50dd55a1b38668ecec4bcc2c9eae90fd28c9b046e521f7a9c5995d3803a986364bb82
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5a626c0d257ecb912fae9095b4b3b6042
SHA191c1cf026ea0f3d1747fcc54de9bbd3dc8ad5dd2
SHA2566c4ef82139111fefd7b95bf439fd9a8944bd9b9d0d99813e8b8b535e1ebc4963
SHA512f8d5442055ebeee125b6bde924be762ddfb9e8be49cdfb5713c1c9a12a503fae48acb0e2566c88b6a852617017565b127f3cb2915006936f5a27bee2207aa3ae
-
Filesize
3KB
MD501709122c9314210b4f81c5a9e611a68
SHA199295b0bd673ac2a6823aee7bbb7f27024cc946d
SHA25629991d5612eb23310a3258efe7b4dafafd979eccf9db4a483c4bafc6b1e2a425
SHA5124e66eb8945c54ce484bf5056d131b4751cfcf85104f0ae6834223317fc7f78c29022cfd6c8cc6f3f6ed9984fcbc87068a5f91eb93245f4d3ab5e733f070001ed
-
Filesize
4KB
MD53969002516cb677e9ba2eb704bd843f8
SHA137302f643563e4e565015dee9afe0eb5424eb64c
SHA256eb7f77523e6adf0e49705e0ef26be04134b45a8427537096e0d36e1e332cdb5c
SHA512ceb480fa72f803b8a2af85d94714c9e9061e4a14d2c70b3c7c91d713e723860b241e0a8905172e54642ee5d02df8c8a2e48480c6c96097559b438b8ead4cdf1d
-
Filesize
3KB
MD5ee2587457add6a437521c51ba1992ae3
SHA1d8af6ec993a8fb9640dad9767a8d39f7ea258ba8
SHA25617367649560b0c2b284e3490337010ff8e05b214537ddd01948b4d4b2ec1d4fd
SHA5129f333c2e3b2ff6a8d60777dfa06e3901edc6fe0f2149af6096962832d54279e339a7e84c367d5c6af73d87dfb082f9ecf6cf7bbc76b90b82f72dd07641e53d27
-
Filesize
7KB
MD54304294ce835427148590a47621c135a
SHA1a4f73295f70398567a71a49fdc400ef2e22659c5
SHA256453a66ff4686dcb03e165ff8592db2db2f0c40079ed43ddf8a4413a0903a712d
SHA5120c54f8b69e814e2db03db2007bf229637bf08a3c34a87461afd7e613c96e79574626bd3668bb67a55489b31231c03cd82fd4ebcbe76c916f8616ab97fb25424a
-
Filesize
5KB
MD5d44ee120f25c1aec746206ed35dab9a9
SHA10bc997cd945ee36a564eda23c1924e8b7122f061
SHA25659fd0c644f7e5ac5f94e5d496b9f46e740e43792dfd53836b531b69129ccb311
SHA5121104b08ea28c60f25cb0e37f89ea91e4963d7a267e0042040a86a9f963edc520fcfb799f148d122644014e7f4a396a10476715f5e84f4039395ec4bc2fd15e1c
-
Filesize
5KB
MD5166c53774a0ae58d0be9c1f4f44a97dd
SHA12b04d258cbe2d221dfcbd8414e309ed5daee05a9
SHA2561ca8cf14809905d1165a58d9ecf5cb9dc1ad45bd4838edc467d2507e3bbaca58
SHA5129b3d68affac4f61a334073e6d2be72698a029403f51876f449383266ee5e911b624b2da51f74145e61e822d1c68cfb000bdd9389a53d1e09562e9c5ee9b6c4fb
-
Filesize
5KB
MD5cfec53fb860932b2a823e042086cb96b
SHA170dc187209a0ee14e3a8f735c6e99b4acd600f61
SHA25635f16e4a8d924e7ac99bcbad700e2f6fcc7fee69a2713add4b5c36afc84d4400
SHA512722dad0a7d8edd930d5a975fa91930d2203f92a18daea73a326c5899d7925879818901d09e1a4c00601535617a5eb893f9a6669af4e639ad44e7767d4b0d92f6
-
Filesize
6KB
MD5865ab60aca68509e10002c359acf4e28
SHA182da83dbe312c5f995658c2e4bc917f6dbf37776
SHA256fe1a06b544cb87c0874a13efc48d23ca9260d4df5a80c021ae8a3c44d27f39cf
SHA5122547078b7ba8a1b3717a67ab9a12540837d76f493f9bb90a986a542c3d082230b1d910f29d0bfd4bab9f26d451b2a75c4c5722d55fa924b58c64a0f9c1862fc7
-
Filesize
6KB
MD503aa2d41ba28ccece91eb7eb90c8ae93
SHA1092284a510e20b1d9531b5c2e3aac26a26028d96
SHA256d83ac83da3505e4878c9cd8330e4eb941695a6c045e5f41f552deddc9a52a9b3
SHA512449e5ec58416573cb819ad8230d87ee5008bce0f6fdda59b035b4b131e771dc6e85498f69ce6614b50f4e1557a2bb939bc908f0d42984bd5349c2e857cc7c086
-
Filesize
6KB
MD52684094a0f449c8a46580457eecd7f69
SHA14ddde73f870040db410e2412c7f0795faddd1443
SHA2562cd81aa4740ebda6b63377cdfe9c41ec408e027df6e62eb5f562a96c3018fcab
SHA512c9dbd9155e67920e3a11e7e3f4a1beb7206eb0c88040ed5313af36eff4e6f5e7248834655ac930de3c7f6b122acd27271eb618f7a0ee286d50741a0290f410b8
-
Filesize
5KB
MD5747157f27967575c8f321aaf79cdc684
SHA1fe92ffa75fe54101eccbbbe51e30df8081d175ff
SHA256488df7ba00fb8bed54b2af9d382f48d3b7ba32dc5bd69caeeae3923ba329a411
SHA512aa88918a0c4e70a59ea16f57b362e0a8e9bc6f23a9b38991d32247a5663512d909f6e0d868cd7cb376fbad281753a501ffd4bf170f0b90fe82918352ec13b80c
-
Filesize
7KB
MD51bf140f025f5fefe4a4385c9189e22d2
SHA12c9f497b56d45e6470b0aa4edca71aa972eb2ef1
SHA25661ab0bb4361a5a5ffdf8e4ead97d48b80118bb056dcb575591eb5b71c5155602
SHA5126940ffd4e3d0e3df2e16d3f6657b9d37854dfc18c99574df22246fe4815c64662cd17963178929938b1758548978406a065c4c82576ba4f4d605411362285bd5
-
Filesize
6KB
MD57dd5b5a5f199a039109a56d93babde86
SHA133ea8781d7877b6ac3a73a930af1036d1a82a19e
SHA25685d230c8600ee34570eb297ec4c059a3bc3e930b1f8a83bc3530c414494dd13d
SHA512390154f8288e71c78b49f19cc7d4e7a1d9fd0d74858ba1d700963b36adc513311df793856379d3bb6fba40c2d5b819a59cd33d04b62141e314d27f8e6c5e0833
-
Filesize
6KB
MD513670b3ae382bd3b97412589083a0fc4
SHA1fe25457d542fbfb2f2ef52b4b283cee50c04a9ad
SHA2567ea848549f9aa0ebcc2ec899048c06d2c989b008b54ead29de0e2613e2257c9c
SHA5127b850ca05a7357ce2e7780d04ff876b44cceece58d56948e76d1ee1f9548340b68fbdc29b600289a63175f5a66cd2086b6b33bb3fb0270e00a651c267c6e454f
-
Filesize
7KB
MD57108e8bb27c4b49fea95f4325eba45df
SHA13cbaa5d6159b4240ddc5037e8983b40d8b4f87b6
SHA25649ac23342c007ea0af8a192ebe9266c80c971f7c6705483e23b9883450caebe7
SHA5120e8a1c0aa8eedcb49a6f6bd09e57aeb99808f62b7e665695c00eb3917a5630648c5714607f5be7beff7931e0f12af6b30b45ef170791a17c8cf7a586f1d857e2
-
Filesize
6KB
MD5319faa67ae9cf8987e1730f022cb0a8c
SHA1b9c656cebcfca80264add95e2e9a85131d87e6af
SHA25699d9ecc79c8a59cac00f3c6c3eb168cb4f5c3e5e99cbac0e03f86289f0a34a2f
SHA512e1da16580b6fd895191eda7dfd91851ab261bf22b2bd602f1f368a133621a52c63d010de0a6a44d12e559f4b0328fd83b59bb71f9fbd369d8e3d8fe80552fb86
-
Filesize
7KB
MD5898b80a9085a43e73cdeac23f7db39d3
SHA1edcc64a2a7ff8f86b8a354587da5448395a2c440
SHA25629ec51f516e66ba699dc83edc0061e2dda739f9381c6a25843f1ce29dc802de2
SHA5126b2fba2155ced04f12d8d0ef1c51e3c0db3b2f1e1be2274b21211b0d7569e540d466710a3990728b043f77cc3c7c615be669873a14caf68bc4e3f4730fa4ca80
-
Filesize
6KB
MD50e3035006f46cbb7af659e5581baf263
SHA1a2c4eb931331651e4e0eb0189e8d2dfcb53f1faf
SHA2568cd19ce9f50da132f696140063daab12694603515e9c3c482047a882db33317e
SHA5126a02d1e8ca8f4348905162724514c80341427d619e067f73e24d91591f926c2deb1b23d6a8f21d5493d837c4ee262523722aeafc70ec108e015f5f33a38ee768
-
Filesize
7KB
MD591fe6969cef94f9bc5d421f2beed89c1
SHA1b520298fb2a2835ff02384356ece980c9afab457
SHA256eb87eaaff016d40d578370a9aa7683692352010892376dce438b4876c36c23a5
SHA512a09791e0739fe7f34d9b496e6b46a40bfb8413e7181331f6ea7da862353c6e927ef4a75b3f28a8fa1db38117d37d225a6042fba390baa92d03fb8f0e49affb09
-
Filesize
24KB
MD529213338df67d29d6454ee5d61ad3970
SHA18c69ca76a2e639060d5ce835a9600e6ea3764a83
SHA256d29fc0d97fa74d382d0f557ecea4e42b7d50dbce43915bfc0c114c16e532aa51
SHA51214db25eba8a863d390b97fce4315402ed7c249598ff6c31d5a191b0f71c274eead42ba0658403e744110de072e6ff1cac3bccee1e48875bde6b1fe39a60d2407
-
Filesize
74KB
MD5a819943f2d0ed144b8db0cbf6989ec75
SHA1a7b86bf1b3ca92617559941c18a709ea0b99d849
SHA2560daf6c5e282c436635fad8455581916eb48a95e2b369e0eda3f6ccf506c37b4b
SHA51239743c1277caa9e0034b6d97ca8f8d00839ca492a8bb33c19eeb552fe2b75f2f67ec9b3c7b8ede55cc567f586adcc096e4b9692a2c34bc7292738ae3c1b8db92
-
Filesize
3KB
MD534d66ca8848ed5beda47d23417c6c1f0
SHA1aa448e565a124d1f6f6a988cb0f44087a50b35e9
SHA256203c5790490eed4b3791709f9d232b174e4132cb836798c6dbfd1603f92010db
SHA512262d2a9930db9b24d6c4e88dda0d92d789f2af9638d20622f2e0229442480c335241432ef69403da2c409013c1ff5e97ee2cba4b21a407d0beee6c2ed60452c4
-
Filesize
4KB
MD518f58236b11e595b5f7f776c343812ee
SHA10d402956b3ea2a9b63428f95f16a060ae1ce853f
SHA256606687b9e28f66c911a2e4e11b7c2773c82573a4e050e03103165f24254fd7b5
SHA51298d995207e30cc117f353ae311f7b3d328a5d5dfcbfacf452697e856e36b9586a6fe26cd4f8c5d427849cc1f2b704e2a981b8d730763a83e10f440e22d63c9b1
-
Filesize
5KB
MD5dbb0d78c7844c1a161c1506c5c7da4af
SHA1df626c5fab300ee59c4df932a9ccc2731fd0d7a5
SHA2564dd91807c0250c4b6ce55471dabcbc5e4313826e97b7b2535aab64cbcf1afe00
SHA51267d6a8a6d5ce91e8a4fc77e4b54cade298bca444ce4c1e7d26810a7aad6ba52850ea93932d03057a37c3a8d79ff97e0abf3eb99c7b09d012abdfc778a93afcad
-
Filesize
1KB
MD5597a510ffa64d68be68ed74678658504
SHA11d1a04f44da67ae6d5703c39ffef3f6b21a2220f
SHA2560bc6567e15a43f63471a20e62cdd34c19dc2ad0a9d755ade224bba812409cd30
SHA512d42fffa616105d9bc2267b81f8888749c487d287e1cf1825d6db1d64ad1797b6ed7c995934485be803fe9f09dbc69aa9f1ec487fbabc61674e0e41790766f87e
-
Filesize
3KB
MD509bf4dda3b5f47dd3e1bab0915962df2
SHA110a557542ec90ae714feb044f52fddd174ab5925
SHA256e00697bd3404c48d771db16fc7a2390b0002b4c571e426b99faf8629e114f021
SHA51214e964225a7551a7a29495920b0a55d7facc099ebfa94d148c31347e7a55db6f30f6a0a2bbbcd764cbbb7f0d29ca6ad70760a274db470cb20c346e1ffa6a147c
-
Filesize
4KB
MD51ff2cfaf3f16db69a7c7d0f80a70c407
SHA1f9773d41af3de34868d66f65f2b997c79d433258
SHA25696e108521559a84b87d1f0e262ab78bfb56b84642d5bf44fd8dfb2a094871eb9
SHA5120559be23d28ca94661f4da57383344c2b937e5c6f8abc3e5384c982a3b597063f56d100e2a12c7e9ea4116c8aa5cd818423d0def07eb614acf9d8e4b93a0d2bf
-
Filesize
4KB
MD5e438a4bcacdb283adaedafe2a7d66a72
SHA1a433b06bfd322d37b60ad138b3b971decd02f6d5
SHA2566976ef5ce2f17424a09e5f85dad1a5bf4cdc23f3908b81ece66c2513de18bc47
SHA512a272ea42210da1d77e5260e634ffecadcfddadaf9e1095e8195e57135dfbe90a77dc9cb3c95d16f3dc8c59f36d48f736d0a3925511404dbf1caa2f1228fb3861
-
Filesize
4KB
MD5bc429f5a33d724d42eceefa8360f4840
SHA171139cbce9b8dde6c1f037a4f1be7c0fb9bc7f3b
SHA256deb9a7bb2fbcbe4111daa7b18650a0e50dc0882f1806d109c677d1d22ecfca8f
SHA5121bbbde869665862388921457c73d6a1ee85bc576f96bc5259acf242ab462ee5e689fc4147acb27f5a10c6be58d36caecc8012b0dff3f4845b95ec3515292ac3e
-
Filesize
4KB
MD53eaef877c39c96431d06ad2376958299
SHA1ce9428d3e80c6aa83241edb0a71a4d885ab31c2d
SHA2566fbaaf3ecc248e9015c53618df6b3508c51036c5c80188c44907e7b0e8fb51bd
SHA51217526dab989400bce89bb2929bfe13b4c9e31968e5092ff598271dee9bd08fe78d285934573fe4693fdaf32717cdd6f146ad111113a2577c54fbc910c2fac0af
-
Filesize
5KB
MD5e04adfbd59c4e886fd5f7680461bac61
SHA16633f4ff90e2176cd1eddf5834f7e06a516f8479
SHA2564dcab7c0cfd894b5ef7082b714e7e79ded84fa2e4d9a74dcbd4411862b74acc5
SHA512faff93ce5f85f6a4da3168e0912ad64189aa65ccd1512672db8bc0b9e17b3da5b5d3d2652162fdcbd5ff432603100b72f8cb570c71a1583f822a00d7fd246b4e
-
Filesize
5KB
MD558fc56278942c955970e18a9cebcdd3d
SHA153c635eb8d4b4545927c3f4ea52bb43d4b30e558
SHA2563c141a3eff2e8fadfc4a0398c15ce5c635fe2b5459a1e57680072c8ed47e3357
SHA512d0fd4d734e14729b5f7db3b387d2c738af0814b73efa5576178f01c9db9aa9ac2cc64bf3183d2fb0e94239a6e8cf13777d7a6dc16793c37bb4f3eb1acdaedac4
-
Filesize
5KB
MD58a4781c8035c6c9b361ebdd521ce88ab
SHA151a4f4ac28df08ae24fb73ab81f37d3fb127949b
SHA256ff3d0a8494298a81680737a2b8969ff01ac0bb8507f765105ab23b393b061bd7
SHA512e7a1ccb51837cb9ab5c3deb00a009120027d96221065ef9b676ba75e9a8a7ff10aad6094efcdac3cccc94dab0bfa798a7b9b95c5447f1ab66821c855dc738096
-
Filesize
5KB
MD50088b4731cb4475c96595af13ea1809f
SHA18bdd9c0c2bcba1d350014313255ba5460ac08d5c
SHA2563fce46ac709fa5079b3fd2597525b80dc6608c32b1dc10b4cbbb1f6deb244d55
SHA5129cc3b7523376d6ac4fa4ba3fb95e7932fbf55d09f8508f16667cf2252e7254adbb261a65be70756d849e0839249d6066a1878a40cde8425829f656be65aab67e
-
Filesize
1KB
MD5061af79be5d98c09230a32942df59a6a
SHA155c4f0904d6bb121da27781b0db32ba1df81a078
SHA256b00d2b93b6f9290d2b9a55a56d905e6564c716987cbb230de92f9b73f1ca442e
SHA512bd0ae428b7766f0da0d6a68bf502a4bb05415e49045e14388fcd64f9ee12bd72c380a78576dd53c7fccbd6398865616d7d428d618da717eedf68136a53e9bfd1
-
Filesize
4KB
MD519b48765c43c4dd5905c79eaa533a77f
SHA1ff1a9fe159b6ec15c5100fa588e5adea6a279da5
SHA256aae6cbb45083eb9c5bd93b6d7dd0bac6bdd67a7f3d1bfe3474f3bc38f7436913
SHA51237bf47bed31e67a5850632499e1e4c5c96f4e37216f12548c79698f16f7b19eab8c5b7d2b6144b038fd400ed6f37d75d90de057319cdf8e5d1e9e21498ba2608
-
Filesize
4KB
MD559dae0123dfed9b2555a4a418e474d7b
SHA1c1df9b1e5646cc6fdbffd3dd618f7ff5dc34e262
SHA25645b65c3ca6c52c0b98ae5cd1063be4d273fa9369cdcc4e487e1df3d86d10b779
SHA512cd009d148e3cd50d607e912934ba1ced49e7f0853d161fc0c3d59812385ce9f5c3671932a2e1df8766820c04e8f2db3f1601402d0cf365e197f027d3e89b81f6
-
Filesize
4KB
MD5d02a085c2418d52acd0f4d3386668865
SHA1fb1d87d57d146f76596f6069cb7ec51195bc22d6
SHA25628010ac50f0658fa95f8c227d616b1c56ce48396e234b7f029e056f3ee430114
SHA512cb7b386c1f0bbcfd68a099859b224b3d7e026a405dc668f5aa397a9d6011721296fa1c5759dd7aa64614b1d8f33389da879a4df52b94a98844771fb5496600b1
-
Filesize
4KB
MD531d2be021afac8ee80071304d44717f6
SHA15b915536ca54d8c725db749e2283a75ff7a18aad
SHA256c11d2ca67fdbb48c397150b0c1a85d1809b273a3ae419c9f735fff7891ad3b8d
SHA5122189efb8c60c19563895ada384eb03bfcdb3d85a4a35428890a67c042ce1b0165ca619c28fe330ae4048a2fecba28f935529733fa9a6dfcbaf136f38f8967489
-
Filesize
5KB
MD506bc1dbb6b66c52516ba0ef4c3a3ed7c
SHA14a50e39480d555a75bd22ff02fee56f33ea2ff2c
SHA2562e717df7e366d0ccc5785269e9565f246214fa9fce94e2943281628920bcfc8c
SHA5127a7a3c272a6b46ae89ef6bf49cd28bcb38c6d5a51d1ba70d2c0b2b0ea44f7c6f413949c6ccc2af5be88400cd0e9a4f9102c29ef65b7460729f8b1a33b795c7df
-
Filesize
5KB
MD5c1c17d82b59d2452d57c67242515dd9b
SHA1a2c9518f49b7f7ae2ce5cf48b7af9f9d04807376
SHA2567649dc0fcadd6d05236ca167048bb10c234bc488bab598eade4be8cb498b7507
SHA5125134969860c18354f9aa2992f518576dd4593df37fa3707a78e4f71603319a1725d6772de448fb5e196942e0a6f22b1e1f1efa08cbeb8cf2a17e7ef3c6b14f2e
-
Filesize
5KB
MD5f82aabe8a30996c73084bf25866de0fa
SHA1657bd94d4b1b5e70e8c2aa2bb3408523a2dc7a20
SHA256b2db20a850926eb2bac4ae8ec38178f594c439214b2cba3afd7aef45062981d1
SHA51221960e3be1b82e5d4f270321fbf1599a3b47eb73b4a427f8783a83f08b62cc5a607532d00fdbe61979d1ad0f364e3fc31cca768c34a26663425d5e6fc6940abc
-
Filesize
5KB
MD535ceaa8e857f55515bac1a15e6284b56
SHA1ab76743fa8e198270a96446162e4dd27674c59f8
SHA25646522a86dafe6d6878bc5e0fd1cf80f451304cf8a126fdf555768d7b2dacb608
SHA5124a549d26a8e89437822c6f5279be68d4c0f2d9f8294bf090723762774eeb1e08c8ceb6817c1fe497d398886e11cea1912df2eae98461d8ca8f4aab1b62706751
-
Filesize
4KB
MD5843be2c1613aa685893aadbb1d1d2a49
SHA161f61f3ad544b02b920d7ede0f595b48875caeef
SHA256fefed3a9a3371b5bde999bd70dc4e070619d18b6a40a8fd2ca765ea1717e601e
SHA51208d1f7d7cdfa06d431021556f16fdb60295dfcea9c42a3bf9210dc2a09d49b1a1bfbb48954b20667cd434852b153c01e75af972e5c5a9a7cb9ddb4416b1ec6c6
-
Filesize
4KB
MD58461f99eba4bb4457fdba4b604287e57
SHA1dfa9c1c3806f3359504bd34b96a5b992b663fbde
SHA2567877393668bafb8c836e50a37b3cc778a6f55779562a557622c85c87723b636a
SHA5127f502621d038f2a22414c7dcba0732e1b82a1b4a324d4048a23ae20c2ba08696ba44d093148fdfc564d1799524fb47ba7fa884fee4e62da881022f2d89ab3845
-
Filesize
4KB
MD589745b949292c98e23f0c1f775b7dfd7
SHA1273597d8c269875bac1728f9f3ccab69f229e6a7
SHA256985095869619c305da4749b94b7a44921bb391d1a4f45106ebc2e31b5fdd17ff
SHA51213df438957bd8701972eed993c78e5f832e144f1846510b39514079412dc1e2b8c928aec4fff5e2704ab427e7b3f708816d345c0072be70813b2f70991f99b72
-
Filesize
5KB
MD59aeb2444ca098b8a48273b472342a3fd
SHA1bda690e78172f45172903ad0b7d8a0aab9855c6c
SHA256d5c32a66af5163de8a81ad148053e88c10943166afc6374a6613e49b105b7cce
SHA5125ae8bcf1c9b511d3512e58719b76ac4f5b83a2111434df34e22bbe67d60c5adb187ed73354c6edf299c1420eec5595ad4d4cd2a2c754fd5126faa192ddfead3a
-
Filesize
4KB
MD58d6e89da0bd5f35afb4e3fb44c9a4c94
SHA1fe232a0fd39353a59ba1ca7ce1db084d42ebc9f0
SHA256bf3a766f9e78ef764569070d2ae9028d64702a66ed8fd4c5a779189f9afa92ee
SHA512e5bceb1cc6e79642ddadc7c3d4f0ce3b31ca0e17225f5935a25e8da0d47a8d32affabff745051e5284851027191d08ce925b7eb9133ce7fb7f304c65afac7319
-
Filesize
5KB
MD59b14774e7517c89756c70d20923901c7
SHA187a85ce7d2b61e65c8bd8cfb8ee664dbf5fc3b76
SHA25633ac1d08e6be0acde64d56a80a6f18e3786ebd1352641810126f807e39cbf041
SHA51211f9c986b9149de26c7ec0d0d5ff25a6a6076d05f2080a372ed8a7b698309d26a445449a7ab29551e17cc02d8bc46a31da2caeab8d85a0f089b53a7bf427bd99
-
Filesize
5KB
MD58976919ac131af5f9f3aa0e7105d4123
SHA1dcd3f0d1b46ada9108d58c1b17441dd08590fcb6
SHA256c55a342c0fafc725c4e20c6039d1b1bf24300f5756f007e34689bc9ab1504943
SHA512cc5fb68c7f68652fe12f40e4c6ea3351b2c4cd2b2e55a5a0b1a15d63d6adc931d22bd30039043a5b5398e26b430c360af68502e808567f8e2a2b973c5a1df4ef
-
Filesize
5KB
MD56c38058d1ab0f02241bfe54e22ca493d
SHA1672656746e579453253b51ac03b48b381788cb1f
SHA256cfaec61ab077f5b04a066c8478a5b323829eca03ee2d1aeaada0e83f55c126ba
SHA512fc66e76ad87d1ebbdbf7cc20f337c49ab6bc1a15b23384e52e46be14a5487ab3d70975a2d40665c37721fcee8416f5bc0755807b57bab95d8c6188eca8b20567
-
Filesize
5KB
MD592d55d3eb59148060738bbe79c1f326a
SHA148adb828f992057bff23adc4ba5ec67730754950
SHA256941e5115a658797ed51e27243f8a592f06bedbd5a4b5a7599e46832b5d53a8e5
SHA512d3c9aa5af583405b3df75627d62bae5d989466c5dd553f9dde693649b349c39fe6870e414e8cb77a77dd317e29748cd90085c6276e92e3b3df207578666ae772
-
Filesize
5KB
MD5646bdde3ead5398e1cf54f8d466b465c
SHA112acdb4e1f469d56aff6c68b1e12136c5e78eb26
SHA256c8fb90a633b568aa00df62908b349cfe1caa979f295f9ae7417d2fbe93012ce9
SHA512873d3edef94957bdafcb2d9b0039263478ab89c4038fe64b09567c427a2e6592a3b52effbd1ec98ec6e096a3a50eea52c530c9bac039cd29e7fc69632759ac6c
-
Filesize
5KB
MD508c0cec1a331b5e3873792efc174c28c
SHA13333b667c43f66ee18419fc7177520fc19e53461
SHA25674b8626870568a0c02966441a12dd5e2d12495b977dfaa4e9b0dbe5075703238
SHA512dc91ec2cda1a46899f3acd7c8a621e5fd6ad90ab2c2a36e57664bfb6887ff4247bc41b95f379b2bd6045f87114e30d15cd99a77eb8f1f8eea5ebadfa5e3e47b1
-
Filesize
5KB
MD50bc9873e013c2d4626e0037a99562c65
SHA18f894dae073910d8836fb365d93c48f9f0ca91e2
SHA256a479757c852cf8c91d3c0c710fb986f20b7f26c3fce944995b08b04ef23549fb
SHA512669a3a4881bb63a5119f764f860b40d09013c2a36fadc96e195b082500d7aa1ebf69f4cc0750d214202478affbc70a39c6f874c50f499bf96702238bda337be0
-
Filesize
4KB
MD569410c6f64a6eea001dc2677268cdf4f
SHA17c9a6244b61692f80f6d618dc65fea69e88e9cc5
SHA256431490ea3b7ef0ae61b14e2ede145db9c9b384a548c48c6eb16d583503f85343
SHA5121c8c322136c1a4112c31a44587afd10bd935de34e20b7c26a279563e42293f243461d962194c9da579aa014a0d5a84c1c2292af9f78e3ada457a3d9e2c0915ce
-
Filesize
5KB
MD56136d9d9f54f50a3565094b408dfdbfa
SHA1fead6daed11160e13c0f0fd03dd6763dc9ba22d8
SHA256793fe5260708ed87820c7c24402f3b3d5128add08192ffc1476e0b632ed05c3c
SHA512221b0473365456ba683e75e4a6ccd3c0ca92127efa2c719776a8d154b58feea1f656a175e9f907103915b6a962cc82a215fd1e9718f12479934e124ea8fdc303
-
Filesize
5KB
MD5b000eb60a2a65d57a04609557e96f052
SHA1b51a50578fe584d9eb9a24127246a3138dd176d9
SHA2567dda9829744288f1958c4f30fa8ee2cea8d5878d8217e6e2a3492ebe724bc57d
SHA5121db3b29973da46cf9a7a07c328e0df1498aa93e740fafef11f9019ccd450e805f8ff42b79c4e741a172baf100021b055259068665b58da33895aa23932d58499
-
Filesize
1KB
MD58cd89f05f1c3a9449a14880839548cb7
SHA16886fcab17bc8cb9ec0b58cc86e64e86410b62b8
SHA2561b65d49ef07fc807d2619d21cf46fae35b8774d80e764460d88dcba330755753
SHA51234d99148e470089f800fcca714ef8002ab7dfdfc7c01bec765858c8bf928a58b79f141909923928d924e5bee14081e22dbdfbf7b7e0d4db650f6cbf773715455
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD58b99cda90f02b7c8e53555a450242836
SHA1eda451a77a85b8d01dfbcdbcfe879d1a6e6de896
SHA256c1cb90cb6f095201e711a692ee17757531cbe37045903214e20097361c6a8eb8
SHA512ccbc729f8b6107bd7904f410a9080ee262a82ed4ebe6597afacf1ecdd7245e494a8b5ecf1b224719e67fb81b109c3051bc80226630adec5e1b28bed587542504
-
Filesize
13KB
MD5a96e82c4d580a204d3eb4e224a4e16ec
SHA1a03695c6e5f6235be60eabc2d03ada0e2167286f
SHA256cee4a6e0a6fa5186645b323494241924401c8cd1780d864af343bc82cd606ddf
SHA512499884b545f5f6d251b0e7acdae6eedd302cbbe7a5f5876142eb104a29df5b1b6d6451a9f34ed1a7b2c1b8a7c1febb96743090684b95ea0572ad7bfaa71dd56a
-
Filesize
13KB
MD5229f4e554e6f4b5363cec2fcb6282fc6
SHA1f28dd9cf06c0051d059a13c6cdcdfcc3d0269d2b
SHA25641189721dbf8dcf9dc7385ed4828603038cd4a6eb340066fa1be638485643690
SHA5129cf1f8196a41e979a9a6eadc64735cd75c345db2b8cb4d6a5994ea3d65fbdeb0fd53422b8b249c5078658be2aecf656115d640c66bdae175ddc116dce0d4daca
-
Filesize
13KB
MD55a00d238fae6527e6cddfa5900127287
SHA13403136a494560adb6a7185195c470d5242b8023
SHA256abec0e5e9f45e8a0b95758f702511a63c55f13fa5efffbc7d71d7f051b0c14db
SHA51200a33a388ba21b63b6529316a30302aebfcf3a92d9c2c89ed9a3f672f21dc76415ecac1f2eda8edd3a3ee9ea4fa7913b181cec5341b5a5d255534cbb775dcc50
-
Filesize
13KB
MD5f7d52451f664c5a265a7971bc9352b78
SHA195c8ea8cb464727fe3856e61f0293ea8047e7133
SHA256438e14589de95e5ae2cb053d11d79a1b367efe5809ee8e58efe93ab75e1e365c
SHA512419409aef0c7d18a45275a9ac29051f8067e903accd48769aa92db19e85764473bd145a2601fc88064168146f2b0c475302efb11e7aecf9060eaf0daa63080be
-
Filesize
13KB
MD50f7689a8daa630e310bb0ec8dc47a020
SHA166d4df3d8724590406ca7007d4a5e999e12657c2
SHA256d2cf3c127c4adf5db14cf2f9bea5cfcb5b12b4e17b61cf8f89620bdb00df7b8e
SHA512d31e63afa5db466361a52b2781ac6fee98ac6fd84bfc2c9fd95af059864ef72298ff5d45a0a656deaedb04bc5795d836c58b0aab017d19e7c5f70554a1d71094
-
Filesize
13KB
MD5fbdbc117a827289780cdb1c6cd9d5157
SHA1b380a0e0216c2f7056f4e7edb86198bdb9b234cd
SHA2566029548cff1992e38397b6fa387756a7c4d1e9188e0d146f5c043fff96dba70a
SHA51263f5f79ef8b51797b6421c7cd38ae8d5879b61c458349d1bd8b610bcb2f57c635f02576b8d82b9b3acc04bf263f72c8d6ce7513c76a6fcf893109af744d6b4a5
-
Filesize
13KB
MD504157f5733d7edf5439b46f46bb873d8
SHA11ccbd5fa015fd04e8da76477bd0c12d8b3702026
SHA25617cc1147ab2a91e34222807e3ae993018a2995ee4c4f45b6e996db27fd863580
SHA51200729f5a600f0d0fb337de639bb23d5196697a8be62c6474d82bd1a7d2705c028393ed1df8e616b0e3304dd9df4c6d0cad7f4fb8ef4776656f727ce9010a21e5
-
Filesize
13KB
MD589d70b93f5e6749511efbaac60852a2b
SHA16d083fcf3c9fdfdc5d63a655f9191dbd6cd83759
SHA2562dbed02a7d026fba981e8891a4624c9967766ed2d3a35b2a22e80a2a4d6448b5
SHA5128c81134153c8f30a1336092dedd90eed84222ec3ccc6942eb2b9f4a2651783b0d75a64e1e225937b34fba4270000daa8c05b63c790ecc1c79787cc470f889aba
-
Filesize
119B
MD5791caef4a1d69a84b98993857849dbef
SHA1889320c579820d94ce38b329b000b563e35f71db
SHA256deb8ca3c18cfb1a6104ca7a06ba0e1ab36df08cb46673d19124c7e0114fa17be
SHA512f994fc640aab02af6d1a04134a57224d75adfd10f04df86e81672ce6d77c254fc49413770623bf9fabf2d4c0fabca6a9fa4d6175a5b3b8bf8454d92497df1418
-
Filesize
4KB
MD551aaf5edb2b6651f9b83f18ea1560ced
SHA1620e9bd7b43eda6f0891227a3472bcaadb7e15c4
SHA25613337e7cb70ce7e3165f18ec4269817ccd2f4a24d9fa38e9df205665b266dc83
SHA51227c7882d33e50d1c42f8e509a5cff85098befca6623801821b9ac7da985b8ca8cc1f04a5e45805af2f2cab42d6ec9e4f95f7083b72acabd84d1a65320ade507e
-
Filesize
119B
MD5791caef4a1d69a84b98993857849dbef
SHA1889320c579820d94ce38b329b000b563e35f71db
SHA256deb8ca3c18cfb1a6104ca7a06ba0e1ab36df08cb46673d19124c7e0114fa17be
SHA512f994fc640aab02af6d1a04134a57224d75adfd10f04df86e81672ce6d77c254fc49413770623bf9fabf2d4c0fabca6a9fa4d6175a5b3b8bf8454d92497df1418
-
Filesize
163B
MD5bedbf7d7d69748886e9b48f45c75fbbe
SHA1aa0789d89bfbd44ca1bffe83851af95b6afb012c
SHA256b4a55cfd050f4a62b1c4831ca0ab6ffadde1fe1c3f583917eade12f8c6726f61
SHA5127dde268af9a2c678be8ec818ea4f12619ecc010cba39b4998d833602b42de505d36371393f33709c2eca788bc8c93634a4fd6bec29452098dbb2317f4c8847f6
-
Filesize
40B
MD57319f10437a4a78bfe41882c89b79c45
SHA11b011b992d3d9544b57ad074dd3e9f054425d358
SHA2564c09ed041ff1a74c4041920327a030238b8905e3cdba4f1b376e230bd527ebec
SHA5124b9c0c7700367071f6d23db094045a35236174f0da15c10c21e4fbb0c10e909ac1e85288c5040cae85119d6d3e37793e15caa686ce588ea1df7355891cb9bc57
-
Filesize
40B
MD57319f10437a4a78bfe41882c89b79c45
SHA11b011b992d3d9544b57ad074dd3e9f054425d358
SHA2564c09ed041ff1a74c4041920327a030238b8905e3cdba4f1b376e230bd527ebec
SHA5124b9c0c7700367071f6d23db094045a35236174f0da15c10c21e4fbb0c10e909ac1e85288c5040cae85119d6d3e37793e15caa686ce588ea1df7355891cb9bc57
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
4.7MB
MD5baf5fc6994390a5a976a9b45ea66344c
SHA1049b15db83a964d3ee531ec21b9dfe722139cc15
SHA256e1752d7e4eafc3170c97548b6d2b6f7362db91e490e6076eae76a303582b452c
SHA512441b03e3fca9518a891fd81c830b9977c2f0e66a07f8df1cf99fa25eafa8cf745b4a856037647c00c7cbfc7744a60bd771b072adbda9ca9f3e3f731e282bfc38
-
Filesize
4.7MB
MD5baf5fc6994390a5a976a9b45ea66344c
SHA1049b15db83a964d3ee531ec21b9dfe722139cc15
SHA256e1752d7e4eafc3170c97548b6d2b6f7362db91e490e6076eae76a303582b452c
SHA512441b03e3fca9518a891fd81c830b9977c2f0e66a07f8df1cf99fa25eafa8cf745b4a856037647c00c7cbfc7744a60bd771b072adbda9ca9f3e3f731e282bfc38
-
Filesize
4.7MB
MD5baf5fc6994390a5a976a9b45ea66344c
SHA1049b15db83a964d3ee531ec21b9dfe722139cc15
SHA256e1752d7e4eafc3170c97548b6d2b6f7362db91e490e6076eae76a303582b452c
SHA512441b03e3fca9518a891fd81c830b9977c2f0e66a07f8df1cf99fa25eafa8cf745b4a856037647c00c7cbfc7744a60bd771b072adbda9ca9f3e3f731e282bfc38
-
Filesize
4.7MB
MD5baf5fc6994390a5a976a9b45ea66344c
SHA1049b15db83a964d3ee531ec21b9dfe722139cc15
SHA256e1752d7e4eafc3170c97548b6d2b6f7362db91e490e6076eae76a303582b452c
SHA512441b03e3fca9518a891fd81c830b9977c2f0e66a07f8df1cf99fa25eafa8cf745b4a856037647c00c7cbfc7744a60bd771b072adbda9ca9f3e3f731e282bfc38
-
Filesize
4.7MB
MD5baf5fc6994390a5a976a9b45ea66344c
SHA1049b15db83a964d3ee531ec21b9dfe722139cc15
SHA256e1752d7e4eafc3170c97548b6d2b6f7362db91e490e6076eae76a303582b452c
SHA512441b03e3fca9518a891fd81c830b9977c2f0e66a07f8df1cf99fa25eafa8cf745b4a856037647c00c7cbfc7744a60bd771b072adbda9ca9f3e3f731e282bfc38
-
Filesize
4.7MB
MD5baf5fc6994390a5a976a9b45ea66344c
SHA1049b15db83a964d3ee531ec21b9dfe722139cc15
SHA256e1752d7e4eafc3170c97548b6d2b6f7362db91e490e6076eae76a303582b452c
SHA512441b03e3fca9518a891fd81c830b9977c2f0e66a07f8df1cf99fa25eafa8cf745b4a856037647c00c7cbfc7744a60bd771b072adbda9ca9f3e3f731e282bfc38
-
Filesize
248KB
MD5c01ddc6071780ef458afdeba257d2e60
SHA13dbd463263aca86b2124a584cd9ae049fb87eb9d
SHA2568d272076d23767fc6d36be4af12ee3c87fe3b9602605f10685cc4d6df643dc25
SHA512c6e19f83f74ff087f8167fab01c68e33f8184c948cc9044de9f114f0698f7c46e5e35e6eca30f7643046d443556ee6743d78c3a9d4da6c2e33f7cfeb64d71b04
-
Filesize
147KB
MD5daff8e97e1645b75f2cffc95563ce498
SHA1b9f83b0deb68ddb3805b1d7f592824df0ac80afc
SHA2569ef2b91f21b026288cf98e75b9175dcd4afb0b884fd1afdb6cdb342c9466a2f7
SHA512f333becd1029ddc6e17ee977f59b9df6ab5b0d4908582936c816a3414f7a303a09c345b1e3a686cd5ef040153d5b9e4c75dc4a4fe37faf48c27eb895caa30614