Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
460s -
max time network
462s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 23:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com/home
Resource
win10v2004-20240221-en
Errors
General
-
Target
https://www.roblox.com/home
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe -
Executes dropped EXE 22 IoCs
pid Process 4440 RobloxPlayerInstaller.exe 1392 MicrosoftEdgeWebview2Setup.exe 1512 MicrosoftEdgeUpdate.exe 1216 MicrosoftEdgeUpdate.exe 4244 MicrosoftEdgeUpdate.exe 1400 MicrosoftEdgeUpdateComRegisterShell64.exe 548 MicrosoftEdgeUpdateComRegisterShell64.exe 384 MicrosoftEdgeUpdateComRegisterShell64.exe 1572 MicrosoftEdgeUpdate.exe 3420 MicrosoftEdgeUpdate.exe 2892 MicrosoftEdgeUpdate.exe 2224 MicrosoftEdgeUpdate.exe 2844 MicrosoftEdge_X64_122.0.2365.52.exe 4364 setup.exe 2348 setup.exe 1408 MicrosoftEdgeUpdate.exe 1544 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1552 MicrosoftEdgeUpdate.exe 1312 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 24 IoCs
pid Process 1512 MicrosoftEdgeUpdate.exe 1216 MicrosoftEdgeUpdate.exe 4244 MicrosoftEdgeUpdate.exe 1400 MicrosoftEdgeUpdateComRegisterShell64.exe 4244 MicrosoftEdgeUpdate.exe 548 MicrosoftEdgeUpdateComRegisterShell64.exe 4244 MicrosoftEdgeUpdate.exe 384 MicrosoftEdgeUpdateComRegisterShell64.exe 4244 MicrosoftEdgeUpdate.exe 1572 MicrosoftEdgeUpdate.exe 3420 MicrosoftEdgeUpdate.exe 2892 MicrosoftEdgeUpdate.exe 2892 MicrosoftEdgeUpdate.exe 3420 MicrosoftEdgeUpdate.exe 2224 MicrosoftEdgeUpdate.exe 1408 MicrosoftEdgeUpdate.exe 1544 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1552 MicrosoftEdgeUpdate.exe 1312 MicrosoftEdgeUpdate.exe 1312 MicrosoftEdgeUpdate.exe 1552 MicrosoftEdgeUpdate.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe -
Checks system information in the registry 2 TTPs 12 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 4 IoCs
pid Process 1544 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\StudioToolbox\ToolboxIcon.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\XboxController\DPadLeft.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\PurchasePrompt\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\VRStatus\error.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\CollisionGroupsEditor\assign.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\NetworkPause\no [email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\particles\fire_sparks_main.dds RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\avatar\compositing\R15CompositTorsoBase.mesh RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\VR\chat.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\configs\DateTimeLocaleConfigs\de-de.json RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\MaterialGenerator\Materials\Marble.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\TagEditor\Tag.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\TerrainTools\radio_button_frame_dark.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\MenuBar\icon_safety_on.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\ExtraContent\textures\ui\InGameMenu\TouchControls\d-pad.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\AvatarCompatibilityPreviewer\publish.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\ExtraContent\textures\ui\ImageSet\InGameMenu\img_set_3x_1.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\AnimationEditor\img_forwardslash.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\TerrainTools\icon_regions_rotate.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\TerrainTools\mt_convert_part.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Emotes\EmotesIcon.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\models\AvatarCompatibilityPreviewer\pedestal.rbxm RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Settings\Help\AButtonLightSmall.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\ExtraContent\textures\ui\LuaChat\icons\icon-share-game-pressed-24x24.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.52\Locales\zh-TW.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\StudioToolbox\AssetPreview\vote_up.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\LegacyRbxGui\popup_warnTriangle.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EU1B7D.tmp\msedgeupdateres_lb.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.52\Locales\cs.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.52\notification_helper.exe setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\AnimationEditor\icon_whitetriangle_down.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\GameSettings\DottedBorder.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Emotes\Large\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\PlayerList\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Settings\Slider\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\ExtraContent\textures\ui\LuaApp\icons\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.52\msedgewebview2.exe.sig setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\Cursors\DragDetector\ActivatedCursor.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\AnimationEditor\RoundedBackground.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\PlayStationController\ButtonR3.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\ExtraContent\LuaPackages\Packages\_Index\UIBlox\UIBlox\AppImageAtlas\img_set_2x_6.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\fonts\NotoSansGeorgian-Regular.ttf RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\Debugger\Resume.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\Debugger\Breakpoints\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\StudioToolbox\ArrowExpanded.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\StudioToolbox\placeholder_video.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\option.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\DesignSystem\Thumbstick2Horizontal.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Controls\PlayStationController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\AnimationEditor\fbximportlogo.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Settings\LeaveGame\artAssets_DownArrow.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\TopBar\HealthBarBase.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.52\Locales\km.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\content\textures\ui\Settings\Help\[email protected] RobloxPlayerInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe -
Modifies data under HKEY_USERS 56 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "231" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ = "IApp2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods\ = "17" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ = "ICredentialDialog" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass\CLSID\ = "{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc\CLSID\ = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ = "ICoCreateAsync" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\ProgID\ = "MicrosoftEdgeUpdate.PolicyStatusMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc.1.0\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods\ = "11" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E3D94CEB-EC11-46BE-8872-7DDCE37FABFA} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ = "IPolicyStatus2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher.1.0\CLSID\ = "{08D832B9-D2FD-481F-98CF-904D00DF63CC}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox\shell RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ServiceParameters = "/comsvc" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc.1.0\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdate.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 532658.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 3308 msedge.exe 3308 msedge.exe 5008 identity_helper.exe 5008 identity_helper.exe 1208 msedge.exe 1988 msedge.exe 1988 msedge.exe 928 msedge.exe 928 msedge.exe 4440 RobloxPlayerInstaller.exe 4440 RobloxPlayerInstaller.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 1512 MicrosoftEdgeUpdate.exe 1512 MicrosoftEdgeUpdate.exe 1512 MicrosoftEdgeUpdate.exe 1512 MicrosoftEdgeUpdate.exe 1512 MicrosoftEdgeUpdate.exe 1512 MicrosoftEdgeUpdate.exe 1544 RobloxPlayerBeta.exe 1544 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe 1552 MicrosoftEdgeUpdate.exe 1552 MicrosoftEdgeUpdate.exe 1552 MicrosoftEdgeUpdate.exe 1552 MicrosoftEdgeUpdate.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1512 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1512 MicrosoftEdgeUpdate.exe Token: SeShutdownPrivilege 2316 shutdown.exe Token: SeRemoteShutdownPrivilege 2316 shutdown.exe Token: SeDebugPrivilege 1552 MicrosoftEdgeUpdate.exe -
Suspicious use of FindShellTrayWindow 62 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5116 LogonUI.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 1544 RobloxPlayerBeta.exe 928 RobloxPlayerBeta.exe 4324 RobloxPlayerBeta.exe 1316 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 4640 3308 msedge.exe 86 PID 3308 wrote to memory of 4640 3308 msedge.exe 86 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3516 3308 msedge.exe 88 PID 3308 wrote to memory of 3688 3308 msedge.exe 87 PID 3308 wrote to memory of 3688 3308 msedge.exe 87 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89 PID 3308 wrote to memory of 4444 3308 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.roblox.com/home1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdff0046f8,0x7ffdff004708,0x7ffdff0047182⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6160 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7040 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4440 -
C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1392 -
C:\Program Files (x86)\Microsoft\Temp\EU1B7D.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU1B7D.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Sets file execution options in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1216
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4244 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1400
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:548
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:384
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTI5MzRGQjMtQUVFQy00NTQ0LUEyMTItRkI5QkMxRDE3MTZBfSIgdXNlcmlkPSJ7RjE1NkUwMkUtQThGNC00NkJELTgzMTgtNzdDMEEwQjNFRjhCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins2NUVEMTg2NS1CRjYxLTRCRTctQkUyMi0yMkIxNkFEREVGRkZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xODMuMjkiIG5leHR2ZXJzaW9uPSIxLjMuMTcxLjM5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NzY4NjAwOTQwIiBpbnN0YWxsX3RpbWVfbXM9IjU0NCIvPjwvYXBwPjwvcmVxdWVzdD45⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:1572
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{12934FB3-AEEC-4544-A212-FB9BC1D1716A}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3420
-
-
-
-
C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\RobloxPlayerBeta.exe" -app3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1544
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6564 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7460 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:uSteRsOW3SO3Oyvs8oJvRnfqmYWbWfkdfuQuOUZHCEfNjZhr7_KTCNL-_dedEIr-hdjbp43rcB3lDElJm_-KS5xE10tJNHqrreCBH1nr_cuon-EYib2aFdRADUwGkcMGaHSL4h-5cOnLsU4msJM78FrnWoLhHLRvSaCVkDR8qvYns7V3JBjiEqP5LiAiaBOkjGtD3cegUqSsB7dK3MoD9SIicmAyVUNXik1LL03l8WM+launchtime:1708819306722+placelauncherurl:https%3A%2F%2Fassetgame.roblox.com%2Fgame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D219131021664%26placeId%3D6516141723%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D5e981423-e9d2-45f0-81cb-261d1f031887%26joinAttemptOrigin%3DPlayButton+browsertrackerid:219131021664+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6652 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7692 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5254365539777986913,14232190400699159097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7832 /prefetch:12⤵PID:3520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4844
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5060
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
PID:2892 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTI5MzRGQjMtQUVFQy00NTQ0LUEyMTItRkI5QkMxRDE3MTZBfSIgdXNlcmlkPSJ7RjE1NkUwMkUtQThGNC00NkJELTgzMTgtNzdDMEEwQjNFRjhCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntGQjgzRjdFMC04N0MxLTQyMTgtQjU2NS1CMTE1NDBBRDk1NTR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBuZXh0dmVyc2lvbj0iMTA2LjAuNTI0OS4xMTkiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSI1IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Nzc0MjUxMDY0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:2224
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5887753E-153D-481E-919E-283683830F58}\MicrosoftEdge_X64_122.0.2365.52.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5887753E-153D-481E-919E-283683830F58}\MicrosoftEdge_X64_122.0.2365.52.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:2844 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5887753E-153D-481E-919E-283683830F58}\EDGEMITMP_44924.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5887753E-153D-481E-919E-283683830F58}\EDGEMITMP_44924.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5887753E-153D-481E-919E-283683830F58}\MicrosoftEdge_X64_122.0.2365.52.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4364 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5887753E-153D-481E-919E-283683830F58}\EDGEMITMP_44924.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5887753E-153D-481E-919E-283683830F58}\EDGEMITMP_44924.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{5887753E-153D-481E-919E-283683830F58}\EDGEMITMP_44924.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff6279d99a8,0x7ff6279d99b4,0x7ff6279d99c04⤵
- Executes dropped EXE
PID:2348
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTI5MzRGQjMtQUVFQy00NTQ0LUEyMTItRkI5QkMxRDE3MTZBfSIgdXNlcmlkPSJ7RjE1NkUwMkUtQThGNC00NkJELTgzMTgtNzdDMEEwQjNFRjhCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins1QkYzNjMxRi00NTQxLTRGRUEtQUUxQy01NUY5MzAyMjUzRUJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-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-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-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:1408
-
-
C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4324
-
C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1316
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:2696
-
C:\Windows\system32\shutdown.exeshutdown -t2⤵PID:2244
-
-
C:\Windows\system32\shutdown.exeshutdown /s2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:1312
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa392e055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD511b57c1c1273af6096ab9a10fddb763d
SHA191c22d603f7caacb2f821fd828ce78579ff3f0ac
SHA256a3f61bf9ad99f6ed55906ed9ef95aa1b7817d5e9a9e7cfb40c7750787240a73b
SHA512fdeecff7379fa8192e4bab261ba9a97edb28479515dae9be7517fe515cad71f465d70e87591c5803458acd776c9ab8d739f4aa5d26750a1b70ae9b2774c13b9c
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\122.0.2365.52\MicrosoftEdge_X64_122.0.2365.52.exe
Filesize47.0MB
MD5cfe9c1d1455d74fa9c28d8793bd82694
SHA1dd0cebb5276989c6b739787746f0833d5955ae93
SHA256678c9ca51c7c6676dc73eb563b68714bfe81bbc88bd927b54138eea6b31c0874
SHA512e62e5d736bfa744711d4640368d35317d98b9b2ca1a35c96ebb57313b42da4e027a3e37d23677e3f6717a9157229b567c98722114c6a9f93bb45727661259cbe
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
Filesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
Filesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
Filesize
24KB
MD5f6c1324070b6c4e2a8f8921652bfbdfa
SHA1988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf
SHA256986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717
SHA51263092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100
-
Filesize
26KB
MD5570efe7aa117a1f98c7a682f8112cb6d
SHA1536e7c49e24e9aa068a021a8f258e3e4e69fa64f
SHA256e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01
SHA5125e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8
-
Filesize
28KB
MD5a8d3210e34bf6f63a35590245c16bc1b
SHA1f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693
SHA2563b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766
SHA5126e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a
-
Filesize
29KB
MD57937c407ebe21170daf0975779f1aa49
SHA14c2a40e76209abd2492dfaaf65ef24de72291346
SHA2565ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9
SHA5128670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7
-
Filesize
29KB
MD58375b1b756b2a74a12def575351e6bbd
SHA1802ec096425dc1cab723d4cf2fd1a868315d3727
SHA256a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105
SHA512aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19
-
Filesize
29KB
MD5a94cf5e8b1708a43393263a33e739edd
SHA11068868bdc271a52aaae6f749028ed3170b09cce
SHA2565b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c
SHA512920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7
-
Filesize
29KB
MD57dc58c4e27eaf84ae9984cff2cc16235
SHA13f53499ddc487658932a8c2bcf562ba32afd3bda
SHA256e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98
SHA512bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc
-
Filesize
28KB
MD5e338dccaa43962697db9f67e0265a3fc
SHA14c6c327efc12d21c4299df7b97bf2c45840e0d83
SHA25699b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04
SHA512e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9
-
Filesize
29KB
MD52929e8d496d95739f207b9f59b13f925
SHA17c1c574194d9e31ca91e2a21a5c671e5e95c734c
SHA2562726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df
SHA512ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957
-
Filesize
30KB
MD539551d8d284c108a17dc5f74a7084bb5
SHA16e43fc5cec4b4b0d44f3b45253c5e0b032e8e884
SHA2568dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07
SHA5126fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2
-
Filesize
28KB
MD516c84ad1222284f40968a851f541d6bb
SHA1bc26d50e15ccaed6a5fbe801943117269b3b8e6b
SHA256e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b
SHA512d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e
-
Filesize
28KB
MD534d991980016595b803d212dc356d765
SHA1e3a35df6488c3463c2a7adf89029e1dd8308f816
SHA256252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e
SHA5128a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed
-
Filesize
28KB
MD5d34380d302b16eab40d5b63cfb4ed0fe
SHA11d3047119e353a55dc215666f2b7b69f0ede775b
SHA256fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f
SHA51245ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538
-
Filesize
30KB
MD5aab01f0d7bdc51b190f27ce58701c1da
SHA11a21aabab0875651efd974100a81cda52c462997
SHA256061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c
SHA5125edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e
-
Filesize
30KB
MD5ac275b6e825c3bd87d96b52eac36c0f6
SHA129e537d81f5d997285b62cd2efea088c3284d18f
SHA256223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0
SHA512bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679
-
Filesize
27KB
MD5d749e093f263244d276b6ffcf4ef4b42
SHA169f024c769632cdbb019943552bac5281d4cbe05
SHA256fd90699e7f29b6028a2e8e6f3ae82d26cdc6942bd39c4f07b221d87c5dbbfe1e
SHA51248d51b006ce0cd903154fa03d17e76591db739c4bfb64243725d21d4aa17db57a852077be00b9a51815d09664d18f9e6ad61d9bc41b3d013ed24aaec8f477ad9
-
Filesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
Filesize
29KB
MD528fefc59008ef0325682a0611f8dba70
SHA1f528803c731c11d8d92c5660cb4125c26bb75265
SHA25655a69ce2d6fc4109d16172ba6d9edb59dbadbc8af6746cc71dc4045aa549022d
SHA5122ec71244303beac7d5ce0905001fe5b0fb996ad1d1c35e63eecd4d9b87751f0633a281554b3f0aa02ee44b8ceaad85a671ef6c34589055797912324e48cc23ed
-
Filesize
28KB
MD59db7f66f9dc417ebba021bc45af5d34b
SHA16815318b05019f521d65f6046cf340ad88e40971
SHA256e652159a75cbab76217ecbb4340020f277175838b316b32cf71e18d83da4a819
SHA512943d8fc0d308c5ccd5ab068fc10e799b92465a22841ce700c636e7ae1c12995d99c0a93ab85c1ae27fefce869eabadbeafee0f2f5f010ad3b35fa4f748b54952
-
Filesize
28KB
MD5b78cba3088ecdc571412955742ea560b
SHA1bc04cf9014cec5b9f240235b5ff0f29dbdb22926
SHA256f0a4cfd96c85f2d98a3c9ecfadd41c0c139fdb20470c8004f4c112dd3d69e085
SHA51204c8ab8e62017df63e411a49fb6218c341672f348cb9950b1f0d2b2a48016036f395b4568da70989f038e8e28efea65ddd284dfd490e93b6731d9e3e0e0813cf
-
Filesize
28KB
MD5a7e1f4f482522a647311735699bec186
SHA13b4b4b6e6a5e0c1981c62b6b33a0ca78f82b7bbd
SHA256e5615c838a71b533b26d308509954907bcc0eb4032cdbaa3db621eede5e6bfa4
SHA51222131600bbac8d9c2dab358e244ec85315a1aaebfc0fb62aaa1493c418c8832c3a6fbf24a6f8cf4704fdc4bc10a66c88839a719116b4a3d85264b7ad93c54d57
-
Filesize
27KB
MD5cbe3454843ce2f36201460e316af1404
SHA10883394c28cb60be8276cb690496318fcabea424
SHA256c66c4024847d353e9985eb9b2f060b2d84f12cc77fb6479df5ffc55dbda97e59
SHA512f39e660f3bfab288871d3ec40135c16d31c6eb1a84136e065b54ff306f6f8016a788c713d4d8e46ad62e459f9073d2307a6ed650919b2dd00577bbfd04e5bd73
-
Filesize
28KB
MD5d45f2d476ed78fa3e30f16e11c1c61ea
SHA18c8c5d5f77cd8764c4ca0c389daee89e658dfd5e
SHA256acf42b90190110ccf30bcfb2626dd999a14e42a72a3983928cba98d44f0a72e2
SHA5122a876e0313a03e75b837d43e9c5bb10fcec385fbb0638faa984ee4bb68b485b04d14c59cd4ed561aaa7f746975e459954e276e73fc3f5f4605ae7f333ce85f1b
-
Filesize
29KB
MD57c66526dc65de144f3444556c3dba7b8
SHA16721a1f45ac779e82eecc9a584bcf4bcee365940
SHA256e622823096fc656f63d5a7bbdf3744745ef389c92ec1b804d3b874578e18c89d
SHA512dbc803c593ae0b18fd989fdc5e9e6aee8f16b893ae8d17e9d88436e2cd8cae23d06e32e4c8a8bf67fc5311b6f2a184c4e6795fed6d15b3d766ef5affc8923e2f
-
Filesize
30KB
MD5b534e068001e8729faf212ad3c0da16c
SHA1999fa33c5ea856d305cc359c18ea8e994a83f7a9
SHA256445051ef15c6c872bed6d904169793837e41029a8578eaf81d78a4641ef53511
SHA512e937d2e0f43ade3f4a5e9cdeb6dd8c8ad8b5b50a7b6b779bda727a4fe1ced93abd06720395cc69a274ce3b0f7c6b65e1eba1ecf069db64edb80d007fbb4eedbb
-
Filesize
30KB
MD564c47a66830992f0bdfd05036a290498
SHA188b1b8faa511ee9f4a0e944a0289db48a8680640
SHA256a9b72fcb3bdb5e021b8d23b2de0caeca80ddc50420088b988a5b7503f2d7c961
SHA512426546310c12aeb80d56e6b40973a5f4dffef72e14d1ac79e3f267e4df2a0022b89e08bba8ab2ffa24f90b0c035a009bed3066201e30fe961d84ed854e48f9c5
-
Filesize
28KB
MD53b8a5301c4cf21b439953c97bd3c441c
SHA18a7b48bb3d75279de5f5eb88b5a83437c9a2014a
SHA256abc9822ee193c9a98a21202648a48ecd69b0cb19ff31c9bbf0c79dab5f9609b0
SHA512068166cfdf879caf4e54fe43c5265a692fcaf6a9dcbf151335fd054bbec06260bc5ed489de6d46ca3fc0044bc61fa1468fea85373c6c66349620618ee869383a
-
Filesize
30KB
MD5c90f33303c5bd706776e90c12aefabee
SHA11965550fe34b68ea37a24c8708eef1a0d561fb11
SHA256e3acc61d06942408369c85365ac0d731c5f3c9bc26e3f1e3bb24226d0879ad9c
SHA512b0c1a9d7df57d68e5daf527703f0b6154a2ef72af1a3933bda2804408f6684b5b09b822522193243fd0756f80f13d3ab0647c90d2bed1a57b4a9fea933b0aa9a
-
Filesize
4.5MB
MD599a7511e154cbce73843fad1b433d28e
SHA16be733a679796d39b6ca56d90ccd1fd43af1ca71
SHA256b80a2aecaf37ada0b7e10886203208cb88e429f727d00a227867d48c8daddc1a
SHA5124015f4615c8eca3128ea2de127625a64f436826eb85ca5eba4daaaa330fca9647cde26b6435f53f8108698ed8b68a2185a61fd7a3bf975e5380b2811f3ae8fb3
-
Filesize
5.0MB
MD5e5d3b8a1a30406c5f0899e94020cc821
SHA137351bacdd4f8edee07dfecd1ed14fcfee18eb18
SHA2562a5b535ccd9620aff782560722a034f5a2556a11df84e9bfe62c0b84fc86228d
SHA5128003f619e281870ef33dfd775191dfd697deb7d2f0a4e0b4ce68a0b80514aa9ee6bdbae6eaaa1289030c31b2460d62b6091fb8f2cda18f41ffac6b7443d32955
-
C:\Program Files (x86)\Roblox\Versions\version-70a2467227df4077\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
Filesize1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
Filesize
280B
MD5789f17608452150a73c2ab979fc7e049
SHA12aa26a094e51e1b76eb7a68de8fc1ff9e723c1ee
SHA256cbd78b3ba69fb8028580d4ea26e1b22a900602c091b01f5ec5d5755c33913d6b
SHA512d5d5b8b883585fe5947645d7fb54e76f5127e12493f63546f01d136d49e8ea94dae77be3b9104e23f8a96f0cb26664920cad5bbf02bc1b7275f2ec4a89d5f132
-
Filesize
64KB
MD5e02a6adb347ee65a1c14107f21fd6554
SHA10c48d5b300492e459f96048c2d1331c0ce20e194
SHA2565f2323bfc585e29f119e65addf4fddf90cc9cbbce994787f41f71319a04fe01c
SHA51216d2412b25661dbd72ea2f0c63e2a05fe58b8763245e2320280139327d700ba65dd565c96a2e5ab363adee9899133188c99d1d96055b1fa9a02f4faeba0d95d9
-
Filesize
152B
MD5a65ab4f620efd5ba6c5e3cba8713e711
SHA1f79ff4397a980106300bb447ab9cd764af47db08
SHA2563964e81a3b4b582e570836837b90a0539e820886a35281b416e428e9bf25fd76
SHA51290330661b0f38ca44d6bd13a7ea2ab08a4065ec4801695e5e7e0dea154b13ac8d9b2737e36ebe9a314d2501b5ef498d03c5617c87e36986e294c701182db41b9
-
Filesize
152B
MD5854f73d7b3f85bf181d2f2002afd17db
SHA153e5e04c78d1b81b5e6c400ce226e6be25e0dea8
SHA25654c176976e1c56f13af90be9b8b678f17f36a943210a30274be6a777cf9a8dc4
SHA512de14899cfaad4c312804a7fe4dcb3e9221f430088cb8bf5a9b941ac392a0bbad4e6ca974e258e34617bbffff3bf6490fa90d8c6921616f44186e267ddaa02971
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\02832221-61f0-49bb-adc0-340fb7c6606b.tmp
Filesize2KB
MD5d1e3e64f7dea8b99602570b0a233f576
SHA173375b01de3d022bd487c4fd2437f0f3e09fed1a
SHA2560f14825425635debe63b61ff08cae72f6ff03fc8f9f5f815184eefbf56b73174
SHA5129fa68d068d3e9bb33ddf19710d429e192c9623a577648bf3a78b88452f452cbc81f535d65295d7cb473c667b66572499b7022f67f8e4805d08224802722a0121
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0680541e-940b-4052-a729-459a32beb557.tmp
Filesize3KB
MD5ffb6233fd9c116027d0046c2b7ca97b0
SHA10af9d02138cebd936669246ebc00017876cfbe8e
SHA256341f9de7bd58ec5992e25b20a4992725f72048f6bb44758c93ee6137db53a88b
SHA512c3ba313e58659522692b897f671d55479646773243da903b6623c825b807c852272cc079a8bc8843cb9eb2c3e0aa82975871d2f91891fccd608e5a718ff8c9e6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\58a40b9b-c037-4f21-8b55-3532be8032fb.tmp
Filesize1KB
MD5b32cb1a1c55e4ca3b5693f1bbb201853
SHA15e51416b07e42cb6571708dc15dbf5c07360da2a
SHA2565273715794091c23af35e6781051f5f32569358043bd56421ab2a1747d435230
SHA5124dd0f60816611f8c1e00a0f88206e38eb2caac8531ce3d00f97839218d69553a92a5e7806bbceac76214a1100c5c9f52a17a57988aa0afc9a196fa3ff6b46f9d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5a06b9c5-6f13-4410-857f-8236e80c8a21.tmp
Filesize5KB
MD57ca00075a56a4879aebec87da64af0e7
SHA1850b7dbb3b7f29f417009c2296be45fab1574355
SHA256898d2ef364cee72fcd6c0e7c8ab3d5bf7e7c638a66eefae80d12722150413fcb
SHA5124f84a3dcb65eb269d9d7e5edd95ded1df1a96f083182c9188cc2340dc9675a9c21770490c6b00a66efa20529c296e291b1028d5a6f34fa5d6a393aecb1dd2066
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\64fef310-d353-40d3-bb31-e92e536d09ff.tmp
Filesize6KB
MD57e55024fb02e63a6f3f118235893bac1
SHA194aeb5589667bd41228869798b7736f1f928a8e8
SHA25671539235194b3fd23b1254501574251cc6e084fc374352064f5e34adcef38386
SHA51207ae4b7641a01cdf38f140380857f7ad6a4b237ea06c2de2a4c082aa3bcd5cc510621a408aa82e59c890dc199c1d4f7ac7cc8144fcf82dacfd4aea5909061aa8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\984f8d64-903f-4297-b7b5-f8fc43460af6.tmp
Filesize4KB
MD5978c2f3b705fd73c6323ead60b0eaa03
SHA10cb5c40f560bd16f791a9494876400e9e0fac859
SHA2563a653f09dcc9e2b78d04a87b0de03ab6b79d4335ed11cc0d501025bf0ef77e47
SHA5124fbc33fdb31c218877ac648a5972bf2fd0bd31bb568b2c941426288a36912f0f3f89b8bec9938f95952ae407cf2247e792c7d35ce627c777c80cdcd9865c2edf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9e6d1709-9b75-40bd-82b6-fd0cb86260b1.tmp
Filesize4KB
MD58eace99bbd94689b6091e4b910533b91
SHA1b537bfc485a28e2a3b60ccdb55958f35cae9bfac
SHA25632bc9ac0527695fe6a5b058d70f7e654a6b9b1c0e7d2b49634abcac74f57ac5d
SHA5124f4c7a6c1a92730d689030b4e177f95743d7bcc41d9ec9ada2f29abcfa0b3d3b28bf33821c74a7c1a770c2a8007f5684021e0bcf1ef207b1339f6c9ba0ada0d7
-
Filesize
97KB
MD5d347e96ce4517124b58ded44d539c691
SHA1cdf955ccc2a9edbde36fd89c385d86189e44a1eb
SHA256fa785a5e3361dd9bdb4b0b2154d071e690d668364931b24f706ce639f517a11c
SHA512cfcaf432f2440f8fd43d68ca2f1f0265c44c0356d90555e0266b38239afd89ba625eda927a34a9431bc1319440d1d2ebbeb0b027b46bb127fbf803672d50ce5c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD54c4e3de43f2fac163b812ddae73109f3
SHA1d8a7fa3ee3c2b9021c9b6f229efd337c0b6a18f4
SHA256ece3f6f5b6254700f5a11b1d5d787294930582effda9d1df90f5324c3a1adc7c
SHA512158d3bdbecbbd6f7a45b8621b54c929645773321702f70db2754028bd94d06e682e93208b574a8ef9f78e805feb876d3eb86247f532f064447c128f96fd57b2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD57bbf7992067e11a1831950f951686246
SHA1350aadde635515ff4b24cf74b679219676700dbe
SHA2567bde09ac536a8083bffdfe37e7502e1c3f1cade028b660d815281d0a06d51923
SHA5120353a96d7fe3c69dbbe5ee1f3089c26663bad7851c659420f6a327a7dc97e3c70bacb29d23d111284fbccb557e6b75ce8aedebc7ca5b661421ebc8a590dd9501
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5ed08dcdb210a7c7a627984e0377d8b86
SHA14b5cbe42bd983bd28744cf0b1b5b037716b1573b
SHA256e201dff8375870d1486cb303bad3a2a6accea0cdf50560d2895df43972087fe6
SHA512c110cb88c8c750587b870053f145d548b819bcc145b349dd5a87455839dae2fd343b7a5e61dbdabe753331723de2a379cbfa1be77048a8eed96dc46c7fc78983
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
2KB
MD509d86cd9eb293a8599fe51b4fc655fad
SHA1a6e007ffe658d8a0458045dd0156514b9c044b28
SHA256a5659de0f22e4b272807ea8887fb36112b2afb31aeb59d814d56a41ba5b486ae
SHA512982259f8598eeb5a5816667f95447c4f3d53ebb258f1e3b07cf512f70c71a630b300360fa3820328fb72160b46108b60d39f6153b75673a9e92317a5be9e6c34
-
Filesize
2KB
MD584bbc33c963c0a52079f7c9cca86facc
SHA11143f85b3c3be0a52ea7c9e42563c5f9e1e10159
SHA256dcfeff4e4125be1c18a52f5b56d046ccc57f21042543b312b0bdd40b76794a8a
SHA512ef8164ac18dc4b1b447b95da9831d6f5bf346d488b9c00e98f5de6f59b10de4a1678347956d8fded32e2092cb620f423693df112e5c060214d7c2cb4f7862dde
-
Filesize
3KB
MD518c28ba1390b4a38a487cb832e8c8cab
SHA1d348051ad2761dc0ae43833d148ebafb83d9f1f2
SHA2565055a56cbfc906bdcd9608ee7a93e2c19c8bb9d5146c3a0800c40b83273e0f86
SHA512995d4d64e01228748918161382bb63544bdabdade96c50b831d7784ece5b20264f100f3edf6e55dd6344093e24a728a74f6fe9b2c79fa4472f148bb9061c6b1a
-
Filesize
6KB
MD571ccd82a18ec1674f2afe840bd2882d0
SHA111d32299bf1528a46c25a2a7e68184c9fa46af03
SHA2569a80fbe3395bc7b3d50c2fac8223aa2c9991ca8867a3069db47257114af13516
SHA5128800288504728029295734bc25bea62b8b54cca7a3bcbc1bec76e78cd3bd3519b328ac3d920a9ff08f355c8b1645bdd5ac4082e0cc277ce54435ccfda8afd804
-
Filesize
6KB
MD5137156c29ecb14edb6548462fb2d36a1
SHA1d0415300259538e92015edabb2d91ac3aa220fc0
SHA256aa4477982eac4172e0830bfd81f456c57d90df5a5d3ff16aea91f1386106cc86
SHA51218eb265f7fe3597b9a4e4ddd8eea482fc0cee6dca59d7ccf15eae8bb4828153f46748e7da3ee88c5d894492db9933a5881eaf562ff2ddeecd73d8ad8873136b0
-
Filesize
6KB
MD520962f7b6d3357157bc93892a896b119
SHA103479faefcffb12f9efd02719dbe9a903795a33c
SHA25635e4a930ac31b1e26afa3176ef663d64db783a745128a3d6beb80dc83f243dfb
SHA512eb0234eabbc31515df8148fc8c0a44439ea6c22e1f1fac33f997b515438119f5df5296274522c36ede263f48b3f1bca3a4ffd06e3ed339fb68f9124a8fb62d47
-
Filesize
6KB
MD56b6a98c394dc5c600970c15a2ca7a8ef
SHA19f7385305cff9bc1c5b582acca1d6c774f4ac521
SHA2561a47b073b8cdf4f3105c3928e385134f3d13c2fd35b34950942217c7d96b1b89
SHA51202ace174abc72fccec192a52893fd9cd20ff193821263b05e18f95d897d178a0bd77b0d94d12f42dffc40b4013600835f63bae6a3b87cec486112b8e3abd2b52
-
Filesize
6KB
MD532f55df874783539a93102f31bbbaf18
SHA116f6c08b24d82a44bb3f06cbc7da75d506d17d4c
SHA25606b0e470de4081aff42b0c8d6f370d64055388e6eef907ad5b121bb3ee5fee63
SHA5127352252e68b4c12bf48b2796ff2c3d1a3e28c8cb97407afac3aeb26359973661681c8ce94e6f994411ec93bfe17ca4cd143b916d81c104c2e6a22dae359430ed
-
Filesize
6KB
MD5b9c0dac2d71aa7a606df31286dac8ec7
SHA135abb2ce94f810e3a280af7cba1868ebce7aa17f
SHA2567efdb98da91d7ed644d67a2756afd8f2b104c344401f62a29e614cd7ad6b7721
SHA51229b5633fb0606c02eb9fde517ceb3d219a72cd33dc743e10e0920d1c3faa496fd4229bdacbf1188bdac15c3bb87ea0880e1605093ba7b5f96f73a29357494fb2
-
Filesize
6KB
MD5e2579856f22c5431273a6f62f553c386
SHA15102675fda4efe34b61781bac67e6381f2bf3d77
SHA2567263f78a422b834377b5f20628bdc55ff11188d0d2b41b17c84211a648e56f28
SHA5123fadbe7f35b3593c68214c6ae0e7e1fab097721efb72eb1ad948f0b5aa8ae505787e48dfa2f030ce3c84aa16345d7a9cfb2c531f130732694bdaf909c96be220
-
Filesize
7KB
MD5671362bcc9f8454980096fc7d2fd9e64
SHA165cf5d0ce00fb6be1442e0840b916feca81d3172
SHA256d7fe0e79764c8a199d16e4483b4b7167bc3f332025f54582465198559c40eb70
SHA51218b5642f04263cbec4a9e0b1baef12368855839d44628a13c4f35fc8f8bd40a4e6b75c049c2dab3859b231018b40b33ece3871369ad6c9dc825a1d831f80c489
-
Filesize
7KB
MD54e4e2f948f9f12f17628e656723ff890
SHA1423bdb4723bfcc953cc449296a3acdbcdf99b7b0
SHA256bb93a5dc8463710ebdb6d1d4986133ae5891d9c16eaaae638c48b133890967a4
SHA5127fb45ee6003c8fb329c7c5e6baea232581e2a9296080fa654b18acd34f6734d0d1d0f87031f6e574a2e98dd85debdbf2ccb9a9ca24e00a0adc19fa334a70b1c5
-
Filesize
7KB
MD565730a554be13a9193cc3f35395a1247
SHA1b210682f0a6ab268fc15f6ed7697ff9b6d4b1239
SHA2564b9c6f14a206fe83da4522ba9e0d0ef99498eec2fff5f68b3a8c413b4ba15846
SHA512d1dc9ac709e3ab8a8bc7658fec6d5c61954081019eb60858968f9759f15187d3034f7183e55e54bc1527beedd30e544910249454c4df79c64486af0d676ca093
-
Filesize
5KB
MD54276fe5e663341dedc31065927995159
SHA1d6c520044ef571783c38ebb05b3519b13a178843
SHA2562be72051e85c4637099ba874f34df529ef8b457e3638806b9af5d62a49ba85bb
SHA512d058d6fd47f171be4819625444366d976baa87ac90cf915eab4757c661f533dfb6cab577ee0e75290a5454bd4babcab16d8e305ca7567c493425d87c21f7ba64
-
Filesize
5KB
MD5f26357ab202eb58e404df7fcf34d413e
SHA168f3d0bae1da05ff98a104af09f44a17a45856c9
SHA2560ce13d14401724d231e454fe49e7a0316e3dd939e0feaeb244be88ff27eeebda
SHA512cd8f6660c2e45abab32661db33aae7d8012d9155ff31186c6d32a755ddb4c101b0fd2cc16bfb21cbccc429e78640c2297fc4b47a0cfd9d3d1bc442359a238825
-
Filesize
1KB
MD5f38b54fee7369387baa8a46da5db88a6
SHA16011d64c5a360ccb1b808cff5d18e948f79f9877
SHA256ce71b4ce50a09d64161897aeb79838bf75c1060128a6337accaa052ab2a1034e
SHA512d40339b5eccf5e1f47e99bd30342ec3966f067f422cb13a17c57d07e0ee83ca473e524c03f8add5aa0b940633924ba8651e94bbe2336cd57edd3212c5c7b12cd
-
Filesize
4KB
MD53474a7481b196fd80df55f5e0c718d47
SHA1208b6e52a3b60ad11f9002b9a61d73b2da856f5b
SHA25662873466e1a3fe3d4ce9a92d3d3d1c6f9c24bae5281fe02419eef7eca1dd3b83
SHA512ffc4faf0c6ed8e366327b2d104b9c345e929a9d1fe3c60ff8ad0157eb823815c313f87247b79d7434d1fc2b068dc2de9b444a6aa9356baca4583d71c4a06a717
-
Filesize
4KB
MD5bcdbc6e163f1019217187c83eee88fcd
SHA1692127b3b1a307d3adac0b4e13a5f5aa834ebd3b
SHA256ea6b82052e787df66993bdc65177f2b0d41555c8a8a600c37f21805278eece0e
SHA512f4616f4d4dc4a34fcd8cf76f89de82b0906ea89137cc7f7485019651dca615e0641e9f18c22d1b379de7fa2ec60ad4e4112cfb2c4b01f4639a90e720cf0ef8bf
-
Filesize
4KB
MD528a623922041278cd9a3806b651ba9b0
SHA1af9a7e727d998d3117b9584c2bf9d655b9c19156
SHA256c75a49bb299f94e3b5bac86c1b0f0f3471a2bf6ff28c46a3c2c2f47cf5b7966e
SHA512a05281d786981d3879d474d7d96c2f9054142977aefd4c345d8355e96caa6b20558d8b1492ae36fc855dfed98a689d7e3119a70681f0b91908c86573b165a5bf
-
Filesize
4KB
MD531e5fa9f0dc4b367a2c0913b74cccd5a
SHA117bfa8ca3d2b4c943553830dfb1365550c6114c6
SHA256676cb42935d4f085c73645786b7aeabee06ef1fea14663d63a89685762cfc809
SHA512296dff77c71650fd9d4dc7c16a1383f545d11f58e0bd3157b3c9296bd496c70992617b2de063d0b8d648e949a0eeeae3635a5589c3f29dcfe26692e05964fbe1
-
Filesize
5KB
MD5986732e8c5cfca3138bca0537a3abc77
SHA1975d958092a33e998f09251159bac0f8af29a997
SHA256130edf88ca94d6ceb2f5dced53d7b36bf5da9ce039b0f4389830b31f4debfed7
SHA512db59e96f626d3289aa70c225469dac2dd41b41a3bb045ac8258a1d84ae4ab9d98983451820bfe9d827ae7af7d621253a30ffc3932d978259755bd61b47d01528
-
Filesize
5KB
MD5f1fa7501889fccf567dd375e4f9efb63
SHA19f347accaa54d51d726583983a676682183056aa
SHA25648c89c382d6db1b704c5ad63952468fdec0445133e4c6e0ed9341d1f7a3bcdd1
SHA512ac7f02d2f450b49b7923e19bdd13f4c642beae31a35da8d61bf4f5f41da276a41aced4b330b025fb5afd1b79745d6584b05bd0bbc7d2ac9e2f26299fa35441d4
-
Filesize
5KB
MD5903f3ad3341ddf455e86a78e723875ba
SHA14ab85c9ebab76241712d52532b75728fdb3ec2da
SHA2565d4e45e443f512dd58e9a75668ecb8bb8c76c6a71999031b7e240fd779db6153
SHA51233db8e74cbabc13892263f887604be6364055494ba4f5e121bf9e7b990ec57bf41e3d1f3e019c3fc3e47af5592589075ca09e6008cb1fa06b5d8d8e0a651bbae
-
Filesize
4KB
MD59addc9f2f566420f5adb5ecba13b3461
SHA12991ed9b93f2b3ccd5d4f4f2cb75d3b809b12a2a
SHA256d3cbe24e59f802bec583b8fc8a0cea04a65a8c1c624f13f2341520224985c16b
SHA512d7a46cd8e747c8715d94dad7b8d780115911fcc57235c8f23a2507af7d064087d3a492235d4f54981290c49f55a72c1906f6e6a91182e73822e71502ab1c3200
-
Filesize
4KB
MD52e893e0f9a635cc4b92912f4e26ba1a1
SHA17979210c8a6e7984303ca3a23b45147e63cd572f
SHA2568153ea9ed23734b48bd31beaee880296498d9b9bd7aea2b605a81a952c400854
SHA512a0bf1503103b8b8acd1ad720589a86ae7efc624a087add7bad6c553180af7e0f76ff87492ddf35debd50855372fc4e8f75fba8bb7110ebfeead5651b3e446578
-
Filesize
4KB
MD57b66b67cb91cd8a054912b9b53192b4d
SHA1cdb188b3d3ce5c2bbb13aafe4e23f53e968b26c5
SHA2569f8f5f1dde0daab254a8e3214dcf7153abc3540f7c9e55b489b3116d6d1ec3a0
SHA512d16910d6a008dc7aeeba0bfbb2cb287752959f1eac08e33119b45ef44f546bcbae256f152ee8ff28936c012d29ceae3b32914788bec52cbe79467a8737c22afc
-
Filesize
4KB
MD58c73a77ac15285d4374569a7006eadbd
SHA1efa3d63933b3ae5046c87047ac0974f4eba7d2c6
SHA2565f94583c814a66ac8bb108ed1e395cfdc1dcff335eb4de8910c338e392d108cf
SHA512de26c2683659db6f85a29059725f2843c0862d41ee8d9e73c12990ee15b4bb91790006afb17e4e77a4d99bbc47b25bd7db32a6e7f2cf1d2706b87598fa40a9d8
-
Filesize
5KB
MD5c374012d10f352764fbcb37f0c719b81
SHA12ba9ae3484aad69b2a18d45fe78d447ec929c66b
SHA256ec73029006b31aecc6822e67e126969791c73618a824c1bea95203512726a6b0
SHA5121e29cb303a6880f18fe465d64331e4e36725270766fefe3952b052d3bcc516473a798af851d2a762ad717dc39b512a403dbcb77b28905cc7546f5ff89b31c161
-
Filesize
5KB
MD5bc1df224f66ea51a790e04b7ce702f90
SHA1aa24b65762edf8aa8b3ba1876602170e47f3c82c
SHA256a8707d1ff0d398f955e987f32d10625c0c9492e5f26881e1aae7f575b9b335e5
SHA512f85f18fb7a72519cf6fe359535fee55b305c809d78c43da4061583eede6a9efc8dc594e2f399130cad406228be27f155f98b5d3b8adb45307b9c8c4e47c980bb
-
Filesize
4KB
MD547db09dc5098b1ee7ac613b9ea413714
SHA1c5ee42761be94ca929f270eed71a16944141fb7a
SHA25627b052f0c88e206077c9ec96b350fefb10284fe2a28d312ee847dfd7fb15d342
SHA5126b11177a7afcc52697bc9b82d3caf0feadf62504bc1ffc247335f1265200e2fa2c6dbfd2eb988d90824f11031b4ec7b54e33a40fb3fa40c5b4df8c6f91eb3dec
-
Filesize
5KB
MD58accfa8e2dd76db93b15ba348c6825fa
SHA1d748bc109f195ad54a2c3f050f6f85883ca4c0e2
SHA2561d4db73b868fb5f407b429c7cf0c6b6e65809a546d5e17825ebe519a3066a7db
SHA512d70ffe1bfe1217409b198ec09686d8c7b5c74a8a05da505fe616a61a15437079c2931301e3b1d6ff8c9d47ad23d022b8da72b729d9a99594981a2dc232e6e5c8
-
Filesize
5KB
MD5cb382f9191d391e90c1806eb578e60de
SHA1c7d25f04d9e683df469e7ce56eb5b23bf87beac7
SHA256b92e600aaa8eda32e03abf0333c1c05e500dd72248ecfad35702c3626b2f4da2
SHA5124bc6aadf5cfc775546a101a98e15b0fb9e1473d7462482146dad3ea9da43f63c184e32ba6bec0ca3a90479276cee0f812f030cf14856dfb51b061e4d97e7601e
-
Filesize
4KB
MD59cdfb023fe0479f2295a654e8fbdad42
SHA1021f3ec98b952365ae6aa41220202d524efa9b73
SHA25691dd7677b79aedbcec8021a78b5004a02e02f2ef602f0dc2f3f91e06a6438c38
SHA5129ab01792aec937bcdeaa12abfeb4b9ecd3454f700f7d6be0f97f2b0d47defedfedbf9d35f5c8f02e84eb29118e346e3004064633723d0c872ca6fba25295b7eb
-
Filesize
4KB
MD5ccfa07b618c415561c7585eaee2f47cf
SHA196176cab626e78e9f15fc01bba6f45cc08951ea5
SHA2563c8b6b4383c4820721dc395e4ae71b71fe25c6b6885ac83378604f8a3a8a7b92
SHA51226de9c2bfbf4234236f04f3259bd57f23ec2fbc08f7db9d0dc0d43fb6f17b33448251306a7b1382fe8e77fe4052df47ae383dac7b81088b7458eae6a7f8580dc
-
Filesize
5KB
MD5c2b2b67dbe04d6cdcce0a127b6992219
SHA10e2527b5d8aeaa340486f4fbea5f7a5169c66c33
SHA256c25c47662a41b7ea4420e0bfbbef922d30f36e0145f4577ae46d0b3747e254d6
SHA512d7ee15a42e3b101073eddec2715b289cdac9502d50154bde0b62e1f3aedf735140da4e67fb428d238fc9ccf714e69594c77f037218424d44b656d5ab8244ff5f
-
Filesize
5KB
MD55f82fd5cfd16a7420aaf6d11d1ca4b88
SHA17ef687ea6ff4152f59671c32ff159fe20f5f63d1
SHA2560068b1668972b56aa734f3fa3b39c19e5f96e0d175ae019d39cbefadd74aa517
SHA512526dc99dc4ad609919791069da5361d4c9718fe33cc1a809d4444564d731f4cb61fddb46a121824217557e78e63f5524ea1842c376d2a2bba12ff240f60e9398
-
Filesize
5KB
MD5793384cdb56e83ee7bedebee1137a21a
SHA1d76627368e6d59898016d04f5fb5ad8461677729
SHA256f21de75efcfd914625b427eb5d387cef72d87cf42747477563b5edf01d2d0a55
SHA512606c52d0f1aea3b41107ece9b2c43eab80f3d444a97c8a0991dc5d816ec305b0994ac107c44e6d9e2ed3c260d4b662a66ac32c60676f0b520f156fee03df4967
-
Filesize
5KB
MD5f16255d25216584de51ad3c3062cea85
SHA18a19d6ac89fc85825f394b783cdc42946a6c555e
SHA256f73bcd1322703b389067cf5f7e101919872d5f3edb03453d36ec812f7a715154
SHA51236cd9030cab14b89ba7d796545040c58186047f8925680da321e455dc91ed554be5cef745dd2a1fd18211aaa2366b5e8ca555666a378e0435cc892e3784224a4
-
Filesize
4KB
MD5a6999e6cd401298732cf27bcfb4239c2
SHA1869db45525ff98b4c24753087880210ddb82570e
SHA256ad795f553d6c0e8fe4c15b08c81d8ad520940715f7fe2230e1a3498c5b6b8a80
SHA512de0893085058d16bf46d2d1a619cdd2ecb5dfe872d6e43b60c3da1bf894c2e792648f5f87cc5359c5497e30c485d25239458aaa3c8101e0adcf90d48a7385c44
-
Filesize
4KB
MD537f13fbb9214219f983df9d06a1ea002
SHA148d3c4653abe774ebd194420ce76dc006dcd8b0c
SHA2564778d456a15eeb02d5d50d591e79c9dc8e719152264b1b58b9b5080552ebda68
SHA512775912d5a7ac2ac7ad20a524ed8626161ef56a227f8527f9edab415ecab7c110bd6934ba32fd782d4cc0d491cc93cb27de96668e70b306d06419180bd1d1414a
-
Filesize
4KB
MD55c170fe02ca4728ccb05ac8f87f5a42b
SHA1d4e402eb4c8eda9f95563fe4310520eef6726288
SHA25618791efebb48eb7b0fd0555691110518da1c1377404cd4d544b6f95711247be2
SHA512176f009b3ff3b9889a2110e90de67d27835b6740346725545c9d8893d7565fc7db1af02a2ea42e1620cd6bf5635362de7614b83c5f2e92b82600344141bb7c09
-
Filesize
4KB
MD518be20328d3a74b2610ea0e8e1937614
SHA14871636db9fe36e4d592d227a34b1803e8caebc5
SHA2568d309172d8fe43d0ac522f604c845faabd85f33e06778e80362e8fe7bd406189
SHA512de20c991469caad0e1dd076ff80f426f6340d1a0d5b6faca63c6e99fa3aee5d30b2c09a19e8e618e503d0c809ef1b8ce130fefe7341e5e16249f117f17d6bc8e
-
Filesize
4KB
MD5afe591d86364e8ceef053ee7b8d54b94
SHA1e9071f29fe7f63c54e590bdfe62d3e9e486b7446
SHA2562e1a45e60bc95d968ac7ccb6584bd98b4f5247fc30457aad50ae719bcd47b3cf
SHA512b6252e285493573558abf22c29dec9eba92c4ad14f625c8fc9f9bc80eb6e8b4023783c3dfcb51bcd3aebde8dbfda9bb4926ff1d3f415063fbee8f23b5fc027c6
-
Filesize
1KB
MD5c23e1c87bbef3b5551651dfde15fa89a
SHA1f104081fb074bdee0c292ffe5436f67d8cd5aec1
SHA256bd5f9ceef9ade7279c0dc4bffb05f8d17314da0be540278bca9b40248e9c7114
SHA5126d3272bf00034b5bc3fdf6ca3e91fc88824b37d32359e8b82614a64dc6cd725f46769516bef674cc474e45a0410f31dfe42cd94f344d4cd68ff16c671977e8e0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD507b9288f51860646b5cd5d586619d991
SHA1a0afec8a0a9dd119d558d588d1854b8dc1948314
SHA256ece758fec311c002996e53ae9eb8f31f7876f3965fb6063c31d0fc030b3fa9b9
SHA512fe2240e55a019fc376e13733dde3066e4291e8e384b97bccb8af464dd84a7a9b51348c84a7c9c7073c2f2aeadec998ce9cfbe171d7bcc4d74222aea87ac43c9f
-
Filesize
12KB
MD581048a168473db64611adc79140ef2ef
SHA128769dcd2c22ac148bd975364f7115612df99c6c
SHA256e8a9c15a53619fe630a7dcc50dc9acf974c011622ee03d23376c4cb4b9e1db70
SHA5124631503a8a832b30d1f4993ca9ef20848d60c6a1d2db335334b9721185d80fbd80accf3f81de05cf06dcfa55f91ebf1bb309c815b0e78ba385338d74d8e790e0
-
Filesize
12KB
MD51052a71670866a1039b734c3f5f9abfc
SHA1bb6c915aa45a661bdb6709841667b457630e5f88
SHA2562d564b693361b61eb1c52c54c42d8d5bf86a7842879c734b633d575af2fd23ed
SHA512a7467d7dee8e97c8ddaf86bdc37c02f63db6065d9c6628e928e29453d90ba9d16b1876db0e1d8437ca383c5b5ecbd007d90fc5fe0a2f46d9b61d46f146cd7f90
-
Filesize
12KB
MD5c547f1d23614952f508752d4a5e8861d
SHA1cc0144c21367d8dfe9e6f647241d5cdc39d05ad3
SHA25673b4470f61db30a35aebe01d8d6f7163fd4adc4a4a59615d7ead6ab0896c79fa
SHA51223ae8a0b0c7f815e94985efb5ccabc0e77327dd20f15f202d86f589353ab10b4bb77ab2dd84249dcbde06a7d797a78da2fa3a360a55476e7d5aa37da7fcd32ef
-
Filesize
12KB
MD5df5e41c4ae97302d78d5de7b9e9f2f98
SHA1c02b0abb34d446b9438562a594d6b44c891b2c11
SHA256438b6c2a5c73fb5bfdabccd41c012d335e9eae2f06f0ac6f2d394529e76589a8
SHA51244f8b6c342f40cbcc879de1dc7dde50977ba5a14e1db14a12db110e5a62f481515b0b696ba6e9adb62e4a2b76a049d98547bfbb83c88ed8b5d0cfaf88f86365c
-
Filesize
12KB
MD5a38fd096d5b08cdbe9deca34eab0b53b
SHA17d1d0c6bd93f5fcfc409c5e00461b9154a8093af
SHA256b7d28567ca272e9819a20a3a533a869af6485bac53aa1c63c6b8f5123c760079
SHA5125b9af04310a2f128406a848aa8fc7b3a24d683503d715b3d8689d349795264f65b2ffa29875aecbad248e682564413f17a6f316daf8242cafa252f0d47559552
-
Filesize
4.6MB
MD5884f182558478768a43de12bbb5bd168
SHA1831ce37ca2289cf123733306077b936c9407319d
SHA256bb4fa744d72612edd395213bba74efe233464cc8707ec55aa85052b6211757b4
SHA512665e957a508547a673ec354ef8008e16058e7aa50f1520e0539940c99beb35b9375c9546efa3dab58ced01a80c95a68ed17c76350efde3472da625ea877043ff