Analysis
-
max time kernel
1200s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 15:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/RAT
Resource
win10v2004-20240226-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/RAT
Malware Config
Extracted
metasploit
windows/download_exec
http://149.129.72.37:23456/SNpK
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; NP09; NP09; MAAU)
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4996 3164 rundll32.exe WINWORD.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 73 4996 rundll32.exe -
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MicrosoftEdgeUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe -
Drops startup file 2 IoCs
Processes:
explorer.exeexplorer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4581ce5.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4581ce5.exe explorer.exe -
Executes dropped EXE 44 IoCs
Processes:
CryptoLocker.exe{34184A33-0407-212E-3320-09040709E2C2}.exe{34184A33-0407-212E-3320-09040709E2C2}.exeCryptoWall.exeCryptoWall.exeCryptoWall.exeCryptoWall.exeCryptoWall.exe{34184A33-0407-212E-3320-09040709E2C2}.exeRobloxPlayerInstaller.exeMicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_123.0.2420.65.exesetup.exesetup.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateSetup_X86_1.3.185.27.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exepid process 3316 CryptoLocker.exe 4716 {34184A33-0407-212E-3320-09040709E2C2}.exe 2408 {34184A33-0407-212E-3320-09040709E2C2}.exe 4388 CryptoWall.exe 3144 CryptoWall.exe 2124 CryptoWall.exe 4976 CryptoWall.exe 1944 CryptoWall.exe 3552 {34184A33-0407-212E-3320-09040709E2C2}.exe 3504 RobloxPlayerInstaller.exe 3688 MicrosoftEdgeWebview2Setup.exe 1836 MicrosoftEdgeUpdate.exe 4952 MicrosoftEdgeUpdate.exe 4416 MicrosoftEdgeUpdate.exe 4812 MicrosoftEdgeUpdateComRegisterShell64.exe 4848 MicrosoftEdgeUpdateComRegisterShell64.exe 4904 MicrosoftEdgeUpdateComRegisterShell64.exe 1848 MicrosoftEdgeUpdate.exe 1020 MicrosoftEdgeUpdate.exe 3668 MicrosoftEdgeUpdate.exe 1236 MicrosoftEdgeUpdate.exe 3044 MicrosoftEdge_X64_123.0.2420.65.exe 1616 setup.exe 3216 setup.exe 1452 MicrosoftEdgeUpdate.exe 1140 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3292 RobloxPlayerBeta.exe 2340 RobloxPlayerBeta.exe 2432 RobloxPlayerBeta.exe 2120 RobloxPlayerBeta.exe 4124 MicrosoftEdgeUpdate.exe 4212 MicrosoftEdgeUpdate.exe 1912 MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe 1944 MicrosoftEdgeUpdate.exe 644 MicrosoftEdgeUpdate.exe 1004 MicrosoftEdgeUpdate.exe 1144 MicrosoftEdgeUpdate.exe 756 MicrosoftEdgeUpdateComRegisterShell64.exe 3972 MicrosoftEdgeUpdateComRegisterShell64.exe 1848 MicrosoftEdgeUpdateComRegisterShell64.exe 3416 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 39 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exepid process 1836 MicrosoftEdgeUpdate.exe 4952 MicrosoftEdgeUpdate.exe 4416 MicrosoftEdgeUpdate.exe 4812 MicrosoftEdgeUpdateComRegisterShell64.exe 4416 MicrosoftEdgeUpdate.exe 4848 MicrosoftEdgeUpdateComRegisterShell64.exe 4416 MicrosoftEdgeUpdate.exe 4904 MicrosoftEdgeUpdateComRegisterShell64.exe 4416 MicrosoftEdgeUpdate.exe 1848 MicrosoftEdgeUpdate.exe 1020 MicrosoftEdgeUpdate.exe 3668 MicrosoftEdgeUpdate.exe 3668 MicrosoftEdgeUpdate.exe 1020 MicrosoftEdgeUpdate.exe 1236 MicrosoftEdgeUpdate.exe 1452 MicrosoftEdgeUpdate.exe 1140 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3292 RobloxPlayerBeta.exe 2340 RobloxPlayerBeta.exe 2432 RobloxPlayerBeta.exe 2120 RobloxPlayerBeta.exe 4124 MicrosoftEdgeUpdate.exe 4212 MicrosoftEdgeUpdate.exe 4212 MicrosoftEdgeUpdate.exe 4124 MicrosoftEdgeUpdate.exe 1944 MicrosoftEdgeUpdate.exe 644 MicrosoftEdgeUpdate.exe 1004 MicrosoftEdgeUpdate.exe 1144 MicrosoftEdgeUpdate.exe 756 MicrosoftEdgeUpdateComRegisterShell64.exe 1144 MicrosoftEdgeUpdate.exe 3972 MicrosoftEdgeUpdateComRegisterShell64.exe 1144 MicrosoftEdgeUpdate.exe 1848 MicrosoftEdgeUpdateComRegisterShell64.exe 1144 MicrosoftEdgeUpdate.exe 3416 MicrosoftEdgeUpdate.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
{34184A33-0407-212E-3320-09040709E2C2}.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a4581ce = "C:\\a4581ce5\\a4581ce5.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a4581ce5 = "C:\\Users\\Admin\\AppData\\Roaming\\a4581ce5.exe" explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
RobloxPlayerInstaller.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 66 raw.githubusercontent.com 67 raw.githubusercontent.com 112 raw.githubusercontent.com 133 raw.githubusercontent.com 154 raw.githubusercontent.com -
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 360 ip-addr.es 724 ip-addr.es 949 ip-addr.es 161 ip-addr.es 253 ip-addr.es 517 ip-addr.es 619 ip-addr.es 842 ip-addr.es 158 ip-addr.es -
Checks system information in the registry 2 TTPs 20 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 6 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 1140 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3292 RobloxPlayerBeta.exe 2340 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1140 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
Processes:
RobloxPlayerInstaller.exeMicrosoftEdgeWebview2Setup.exesetup.exeMicrosoftEdgeUpdateSetup_X86_1.3.185.27.exedescription ioc process File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\DeveloperFramework\Favorites\star_stroke.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Input\TouchControlsSheetV2.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Lobby\Buttons\glow_nine_slice.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\ExtraContent\textures\ui\InGameMenu\TouchControls\touch_action_zoom.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\transformOneDegree.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\StudioSharedUI\statusWarning.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\SearchIcon.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Controls\xboxX.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE9B8.tmp\msedgeupdateres_da.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Settings\Players\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\TopBar\HealthBarBaseTV.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\ExtraContent\textures\ui\InGameMenu\TouchControls\touch_action_jump.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\ExtraContent\textures\ui\LuaApp\icons\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.65\Trust Protection Lists\Mu\Other setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\RoactStudioWidgets\button_checkbox_square.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Controls\XboxController\DPadUp.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\InGameMenu\ScrollTop.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\VirtualCursor\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\RoduxDevtools\Redo.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Settings\Radial\EmptyBottomRight.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\ExtraContent\LuaPackages\Packages\_Index\UIBlox\UIBlox\AppImageAtlas\img_set_3x_4.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE9B8.tmp\msedgeupdateres_nn.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.65\Locales\tr.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\Debugger\Breakpoints\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\SingleButtonDown.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\PlatformContent\pc\textures\plastic\diffuse.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\VirtualCursor\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\AnimationEditor\icon_whitetriangle_up.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\AnimationEditor\Pin.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\AvatarImporter\img_dark_custom.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Settings\Players\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\noise.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\StudioToolbox\AssetConfig\offsale.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Emotes\Editor\Small\Wheel.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\MenuBar\arrow_up.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\ExtraContent\textures\ui\LuaApp\9-slice\gr-btn-blue-3px.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\AnimationEditor\img_eventMarker_border_selected.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Controls\return.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Emotes\Editor\Large\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\ExtraContent\textures\ui\LuaApp\ExternalSite\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.65\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\sky\noisefb.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Controls\XboxController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\ExtraContent\textures\ui\LuaDiscussions\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\TerrainTools\mtrl_water_2022.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Scroll\scroll-bottom.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\ExtraContent\textures\ui\LuaApp\ExternalSite\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.65\Trust Protection Lists\Mu\Social setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\transformFiveDegrees.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\ExtraContent\LuaPackages\Packages\_Index\UIBlox\UIBlox\AppImageAtlas\img_set_3x_7.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.65\vcruntime140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\123.0.2420.65\Locales\lb.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\TerrainTools\mt_flatten.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\VoiceChat\SpeakerDark\Unmuted60.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\DeveloperFramework\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\Settings\MenuBarAssets\MenuButton.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\TopBar\HealthBar.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\content\textures\ui\VoiceChat\SpeakerLight\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EUE9B8.tmp\msedgeupdateres_de.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source1616_1522099782\MSEDGE.7z setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU2CC4.tmp\msedgeupdateres_mt.dll MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 15 IoCs
Processes:
msedge.exemsedge.exeWINWORD.EXEmsedge.exemsedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
IEXPLORE.EXEiexplore.exeRobloxPlayerInstaller.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31097331" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000805151ee19e06f4a9c31cfe2ca71daec0000000002000000000010660000000100002000000077f2aa21a0a5c20966ac1efa3254d0399ebe5c564fa5896e4127970a3bddf7ad000000000e80000000020000200000009d65453308dd5d411c1640ed4199364d0f51967e7883b2110e204b678413c4cc200000000537a73b67b83c257188c8df38b34e16cb3ea37fa8872b7dc57bab907121939c40000000ca0660c6c13aa9fc2a9e33dde7c3af5ea365d7aeb9456371c169d61e574c7bd39a7ee1b0952b0863b0e91edaac3bccb15451437567030eeefdcf740ca3aafc1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "768982674" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2055242ef381da01 iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "766951357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31097331" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418493384" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "766951357" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31097331" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31097331" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30291d2ef381da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000805151ee19e06f4a9c31cfe2ca71daec000000000200000000001066000000010000200000005c40a348837db937b7729abb9d9a5058281e8a3b74bd951aeea80a8213e79c61000000000e80000000020000200000004f47fd8011801fa9168469695a0384d5d4f86261e06971716819d9cba51a656320000000ac60b00e28d37f458a7692ae1b4a1bb1899bde0869777bd3b372eb92e6740c1140000000295fdc0d4d38349f6f552b5f049fb8e44b09bf7cc19bf1d912227b7bb847e3b8f263856dfcf641b077ed33cfd18ffb09fa0bfbbe47ed5678e453a64cafb283e8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{595025D2-EDE6-11EE-AE4D-D6C6679D10A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "768982674" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeRobloxPlayerInstaller.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods\ = "6" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ = "IPolicyStatus2" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EBA46DC7-84D0-4C3B-BE4A-308C78349304} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebSvc.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods\ = "17" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\shell\open\command RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\ProgID\ = "MicrosoftEdgeUpdate.CoreClass.1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\ELEVATION MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F} MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\shell\open\command\version = "version-f573c8cc796e4c97" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine\CLSID\ = "{5F6A18BB-6231-424B-8242-19E5BB94F8ED}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\NumMethods\ = "26" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine\CurVer\ = "MicrosoftEdgeUpdate.CredentialDialogMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ = "IAppCommand" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E3D94CEB-EC11-46BE-8872-7DDCE37FABFA}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.CredentialDialogMachine" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBA46DC7-84D0-4C3B-BE4A-308C78349304} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\CLSID\ = "{08D832B9-D2FD-481F-98CF-904D00DF63CC}" MicrosoftEdgeUpdate.exe -
NTFS ADS 7 IoCs
Processes:
msedge.exemsedge.exeCryptoLocker.exemsedge.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 560846.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 995707.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe\:SmartScreen:$DATA CryptoLocker.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 483440.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 606515.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 944532.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 764152.crdownload:SmartScreen msedge.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3164 WINWORD.EXE 3164 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exesvchost.exemsedge.exemsedge.exetaskmgr.exepid process 1964 msedge.exe 1964 msedge.exe 4064 msedge.exe 4064 msedge.exe 4808 identity_helper.exe 4808 identity_helper.exe 2336 msedge.exe 2336 msedge.exe 952 msedge.exe 952 msedge.exe 752 msedge.exe 752 msedge.exe 3184 identity_helper.exe 3184 identity_helper.exe 3492 msedge.exe 3492 msedge.exe 1988 msedge.exe 1988 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 4996 identity_helper.exe 4996 identity_helper.exe 1828 msedge.exe 1828 msedge.exe 4264 msedge.exe 4264 msedge.exe 3272 msedge.exe 3272 msedge.exe 1836 identity_helper.exe 1836 identity_helper.exe 4512 msedge.exe 4512 msedge.exe 1944 msedge.exe 1944 msedge.exe 4712 svchost.exe 4712 svchost.exe 4712 svchost.exe 4712 svchost.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 2948 msedge.exe 2948 msedge.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe 5008 taskmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
CryptoWall.exeCryptoWall.exeexplorer.exeexplorer.exepid process 4388 CryptoWall.exe 3144 CryptoWall.exe 2152 explorer.exe 5052 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 42 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exepid process 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskmgr.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription pid process Token: SeDebugPrivilege 5008 taskmgr.exe Token: SeSystemProfilePrivilege 5008 taskmgr.exe Token: SeCreateGlobalPrivilege 5008 taskmgr.exe Token: SeSecurityPrivilege 5008 taskmgr.exe Token: SeTakeOwnershipPrivilege 5008 taskmgr.exe Token: 33 5008 taskmgr.exe Token: SeIncBasePriorityPrivilege 5008 taskmgr.exe Token: SeDebugPrivilege 1836 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1836 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4124 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4212 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 644 MicrosoftEdgeUpdate.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exemsedge.exepid process 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
WINWORD.EXEOpenWith.exeiexplore.exeIEXPLORE.EXEpid process 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3164 WINWORD.EXE 3856 OpenWith.exe 4736 iexplore.exe 4736 iexplore.exe 3680 IEXPLORE.EXE 3680 IEXPLORE.EXE 3680 IEXPLORE.EXE 3680 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 7 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 1140 RobloxPlayerBeta.exe 1580 RobloxPlayerBeta.exe 1428 RobloxPlayerBeta.exe 3204 RobloxPlayerBeta.exe 3292 RobloxPlayerBeta.exe 2340 RobloxPlayerBeta.exe 2432 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4064 wrote to memory of 2624 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 2624 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1400 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1964 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1964 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe PID 4064 wrote to memory of 1912 4064 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/RAT1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb32c46f8,0x7fffb32c4708,0x7fffb32c47182⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2244,14905530734539617573,13328117680028153097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4980
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\CobaltStrike.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3164 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffb32c46f8,0x7fffb32c4708,0x7fffb32c47182⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 /prefetch:82⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4224 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2192 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,2309098346114263334,17323062279036942285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb32c46f8,0x7fffb32c4708,0x7fffb32c47182⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:82⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2340 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,5520211662799138282,624675794837775293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb32c46f8,0x7fffb32c4708,0x7fffb32c47182⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2012 /prefetch:82⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6060 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3524 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Users\Admin\Downloads\CryptoWall.exe"C:\Users\Admin\Downloads\CryptoWall.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:4388 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"3⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
PID:2152 -
C:\Windows\SysWOW64\svchost.exe-k netsvcs4⤵PID:3192
-
-
-
-
C:\Users\Admin\Downloads\CryptoWall.exe"C:\Users\Admin\Downloads\CryptoWall.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:3144 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"3⤵
- Drops startup file
- Suspicious behavior: MapViewOfSection
PID:5052 -
C:\Windows\SysWOW64\svchost.exe-k netsvcs4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1324 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3568 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,16605534468361117515,10560172665691075445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:2860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"1⤵
- Executes dropped EXE
- NTFS ADS
PID:3316 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4716 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C3⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C4⤵
- Executes dropped EXE
PID:3552
-
-
-
-
C:\Users\Admin\Downloads\CryptoWall.exe"C:\Users\Admin\Downloads\CryptoWall.exe"1⤵
- Executes dropped EXE
PID:2124
-
C:\Users\Admin\Downloads\CryptoWall.exe"C:\Users\Admin\Downloads\CryptoWall.exe"1⤵
- Executes dropped EXE
PID:4976
-
C:\Users\Admin\Downloads\CryptoWall.exe"C:\Users\Admin\Downloads\CryptoWall.exe"1⤵
- Executes dropped EXE
PID:1944
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3856
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:3504 -
C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3688 -
C:\Program Files (x86)\Microsoft\Temp\EUE9B8.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUE9B8.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Sets file execution options in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4952
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4416 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4812
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4848
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4904
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QUExMDcxMDAtMzlDQS00MUMyLUJDOTQtNTY0NjYzNkEwMkJFfSIgdXNlcmlkPSJ7N0I5MjYwMTMtN0Q2QS00NzI0LTgxMjEtRDVDOTMxRTI4NThGfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InswMjM4QUY5RC0xQUU2LTRCMjktQUNCMC03QkNBODQ4QUQ3QTZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xODUuMTciIG5leHR2ZXJzaW9uPSIxLjMuMTcxLjM5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDg4NTA3OTY0MiIgaW5zdGFsbF90aW1lX21zPSI0NDYiLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:1848
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{AA107100-39CA-41C2-BC94-5646636A02BE}" /silent4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1020
-
-
-
-
C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe" -app -isInstallerLaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:1140
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
PID:3668 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QUExMDcxMDAtMzlDQS00MUMyLUJDOTQtNTY0NjYzNkEwMkJFfSIgdXNlcmlkPSJ7N0I5MjYwMTMtN0Q2QS00NzI0LTgxMjEtRDVDOTMxRTI4NThGfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InszMjcwRjQzNi04OUI0LTQ5OEUtOTk5Qy0yQUZGQzk5RDc5N0J9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEwNi4wLjUyNDkuMTE5IiBuZXh0dmVyc2lvbj0iMTA2LjAuNTI0OS4xMTkiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSI1IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDg5MDcxOTUxMCIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:1236
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{10F964A0-3CA8-4600-A413-E940489CADC3}\MicrosoftEdge_X64_123.0.2420.65.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{10F964A0-3CA8-4600-A413-E940489CADC3}\MicrosoftEdge_X64_123.0.2420.65.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:3044 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{10F964A0-3CA8-4600-A413-E940489CADC3}\EDGEMITMP_B991F.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{10F964A0-3CA8-4600-A413-E940489CADC3}\EDGEMITMP_B991F.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{10F964A0-3CA8-4600-A413-E940489CADC3}\MicrosoftEdge_X64_123.0.2420.65.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1616 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{10F964A0-3CA8-4600-A413-E940489CADC3}\EDGEMITMP_B991F.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{10F964A0-3CA8-4600-A413-E940489CADC3}\EDGEMITMP_B991F.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=123.0.6312.87 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{10F964A0-3CA8-4600-A413-E940489CADC3}\EDGEMITMP_B991F.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=123.0.2420.65 --initial-client-data=0x22c,0x230,0x234,0x20c,0x238,0x7ff65808baf8,0x7ff65808bb04,0x7ff65808bb104⤵
- Executes dropped EXE
PID:3216
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QUExMDcxMDAtMzlDQS00MUMyLUJDOTQtNTY0NjYzNkEwMkJFfSIgdXNlcmlkPSJ7N0I5MjYwMTMtN0Q2QS00NzI0LTgxMjEtRDVDOTMxRTI4NThGfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5MTJBQkU1Ny04RTEwLTRERDItQUQyMy1GRDEyOUIwOTJEMjl9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEyMy4wLjI0MjAuNjUiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJjb25zZW50PWZhbHNlIiBpbnN0YWxsYWdlPSItMSIgaW5zdGFsbGRhdGU9Ii0xIj48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjkiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEwOTEyNTg5NzYyIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTA5MTI2OTkzOTQiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMTA5OTQ4OTQzMCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0id2luaHR0cCIgdXJsPSJodHRwOi8vbXNlZGdlLmYudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvNjZlMGI5M2QtYjQ2OS00ZmI1LTgyMGItMjcwNGE4ZDdhOWU0P1AxPTE3MTIzMzI4OTQmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9bUxoRmZaTUF0MiUyYktpeGZoRHVUQnVzWFhJV0lKQmxwJTJiTFdZc0ducGoybEl0b2dEUWltJTJiJTJid3VHN1R3R0hsRUZ1T2hWbUpGWmRiJTJid2VETHUzNXdvVDlRJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iODguMjIxLjEzNS43MyIgY2RuX2NpZD0iMiIgY2RuX2NjYz0iR0IiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIxNzIwNTc1NjAiIHRvdGFsPSIxNzIwNTc1NjAiIGRvd25sb2FkX3RpbWVfbXM9IjE2NTcxIi8-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:1452
-
-
C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:1580
-
C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:1428
-
C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:3204
-
C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of UnmapMainImage
PID:3292
-
C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of UnmapMainImage
PID:2340
-
C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of UnmapMainImage
PID:2432
-
C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-f573c8cc796e4c97\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\InvokeLock.xht1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4736 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4212 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E15D1E6D-ED4C-4728-A591-FB6D3ED10578}\MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E15D1E6D-ED4C-4728-A591-FB6D3ED10578}\MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe" /update /sessionid "{F3AA38C6-20CF-4E8E-B16B-B66EFED3A2D1}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1912 -
C:\Program Files (x86)\Microsoft\Temp\EU2CC4.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU2CC4.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{F3AA38C6-20CF-4E8E-B16B-B66EFED3A2D1}"3⤵
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious use of AdjustPrivilegeToken
PID:644 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1004
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1144 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:756
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3972
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
PID:1848
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjciIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjNBQTM4QzYtMjBDRi00RThFLUIxNkItQjY2RUZFRDNBMkQxfSIgdXNlcmlkPSJ7N0I5MjYwMTMtN0Q2QS00NzI0LTgxMjEtRDVDOTMxRTI4NThGfSIgaW5zdGFsbHNvdXJjZT0ic2VsZnVwZGF0ZSIgcmVxdWVzdGlkPSJ7QjJFODQzNEItOUE0My00NjNCLUFCMDctNzM5ODUxOTg5OUZBfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTcxLjM5IiBuZXh0dmVyc2lvbj0iMS4zLjE4NS4yNyIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjMyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MDg5NjA0MTUiPjxldmVudCBldmVudHR5cGU9IjMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0MzMyMzcxMTM1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:3416
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjNBQTM4QzYtMjBDRi00RThFLUIxNkItQjY2RUZFRDNBMkQxfSIgdXNlcmlkPSJ7N0I5MjYwMTMtN0Q2QS00NzI0LTgxMjEtRDVDOTMxRTI4NThGfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntFMUQwRUM1Ri01RTYwLTRENTctOTNBRS0yRTkxQTc0MUZFQjV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTg1LjI3IiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMzIiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0MzEzMTUyMDc3IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0MzEzMzA4MzcwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0MzE3OTk1OTA5IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJ3aW5odHRwIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy9hYjczMGUyYS04ZDVlLTRmMDEtOGY4YS03MWQ3N2I5YmI3ODU_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-PC9hcHA-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjkyLjAuOTAyLjY3IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9IjMyIiBsYXN0X2xhdW5jaF90aW1lPSIxMzM1NjIwMTMxMTUxNDA2MTAiPjx1cGRhdGVjaGVjay8-PHBpbmcgYWN0aXZlPSIxIiBhPSIzMiIgcj0iMzIiIGFkPSI2MjY1IiByZD0iNjI2NSIgcGluZ19mcmVzaG5lc3M9InswOEFCN0JFRS1BRjhBLTQ5MzItQkNFMi0wREU1MzY5NTJGQUF9Ii8-PC9hcHA-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IjEyMy4wLjI0MjAuNjUiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZT0iNjI5MyI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0ie0MyN0NEQUE0LTVENTktNERDOS1CN0MwLUQ5NDFENkUzN0Q3Rn0iLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD5fba106e91d23b64b0ac0f61426f57c51
SHA13f062c1dcaa7bc48fac217a5c3a9b7de254263d2
SHA256f8d42e7cbc02e6e1969a25d7f75f45d1c676ee3799ef2a2604025bf9e712b0a0
SHA512c9d4505456b7f2aa5c11cdd784b88f2eb8ec53d1369eab4dbaa691a4e86fa98746997bdd2eb782ac9214873771ac6097bb693009c584584cd89d52ea0e9e1c6d
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
4.6MB
MD5a6b477fd2a8f8a2f773524399dbcfefe
SHA17d80eb58dfd74d2d6b808663044e4ad35085f99b
SHA2567de163bfcdac41638190fc00a32f1937c38c35a18aae4e0945adc28ebd223ac3
SHA512f8c96581475df161bf53261492abe09504d3e4c7206874c7d8d90bc76305f02f06005fec35cffaec517de0bb36b62e62a85e22607fe669c2c3bdf008c56bb957
-
Filesize
280B
MD535453f1011395246679910f77d9fd1c5
SHA1f76f6863902823c7727ffa613b7016a8964a1d84
SHA2567b31a376850b1c62281ab5277b5f8686b04583c3c1c73a23cf53665af3305382
SHA5121ea135ec06cf30a96f9a10c7aa3950a367c10aca1214971cacbcd816b0689b6492d7745089bb24e7ce4489a75901452f32af553603debf3f12eb81636d8bd175
-
Filesize
101KB
MD5d98450b76632f0cd3c159b5bc59aea2a
SHA1244daa7e8703ecc2e3f45d229b15122428795d84
SHA256128865ff5c88ea756ac323f0cffb0543307580b897cf1418e1930fe89d4d8a52
SHA5123cddbe9c7b83eebf6c8930fd3764543c0274763cbfc0e8109f32cacf7d03cd6a04d35a142c25339c1fa87eeefcc03b0dcb7ec4530bfbd7fc52b07d6d2be2b70f
-
Filesize
152B
MD5d7b7ffe6eae00ddeed07dd42b9fa86a0
SHA1205b62ea764cc752f944d2ced51983871afa2f46
SHA256fbe1e90ab13fbe86b2d6c74ccb4a19be3594718c2e7ad776f7ea8afce3c633b8
SHA51201d5a7cc3c9f9df39146959a451c2298a42eeac51a9d0b2fdf1e7df813d75d6dba987a670d9c897936d0bf19b8388524f48d50e565598b6a6963eba9bc089124
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD56f0158b17b8d4b5db2705d8a8687fb32
SHA132443181cac9187a62b25c2c90b8c42679d015c9
SHA256c9b67e636507cd84066ede4df195829ef5774e2ed77899f98d79ee0588234b01
SHA51250b39247bd15f6f02c993025f7297d329e2e5a549a9f0fc9927c44c3e122ca6712a126bf673522f73b6663c3a54269e0ccbd04a7c2f183c30e7cc9f3198f784d
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
152B
MD5e3333b49ce5d262097febc9a64161283
SHA19c87e6bb2980328e002489c5982f2b12dcecbd13
SHA2567ec9670e026d149b4e593d70cab3e02298dd96b395542e414601303cb35d4afd
SHA512ebface20535fe235819259af012b9c9fca1144a61a762d01b1f6924e46f39a8e58e248a4aec812b9161c1efba59299de6ecad972d184c5676cc42f0f4c9da6e6
-
Filesize
152B
MD501393ee2529b90ce5c78b9d5579e283a
SHA1bd505556bf23ae90ac87426383e031a0793b247c
SHA2563a1d909d42cbe208b9d6eb8f3e4df6be9db28ababb95ace85549c1f540e51f23
SHA5121543df6ba1e7eab0ba4371929a1295b6d27133c30f5dc7083368fd637085454569a136b69f6486a20f70c892a69a5b23f17e8bf4ca9b47042fc077577bf6fad0
-
Filesize
44KB
MD59994ccb8f491f2d3b873a7175393af32
SHA174662baf9c8014d54af0713a3222e1839d7b18c7
SHA256118b2c4fd8548a1c248f860d2ee5d40d17c5ebd02674440eee2a77f90ffc36ea
SHA512db2e4b45c2e9dcc928afb3a1fff8a26abbcee28dcbda6ccace67091ab9d3035e669117ef2c97eeae7c5b1635dc4f57c3c355b8c7d0c8cd360af8b58458a3c226
-
Filesize
264KB
MD5a6c8180e4aa211e50a341e9930494615
SHA1afd551e9dccf752d9dab12b9a6f48b1b5f83a2a6
SHA2562895b07a57bd79414f24d63802cf2fb501f4a03705675f1d7bc7e58e6f8dc89a
SHA512dd22e856c12000e94d5a7573d5fa4dbb664650d02a249a8d0907da132e47d1c0d2feac4f8f7d7fc28076d12776a07cffd43786adda3f4c0ec341de2660545d7f
-
Filesize
1.0MB
MD5dc0d41ae6a2b502ad4e7258eaf16a9e3
SHA19ffc5e95414682a14cba89ae2b19af6971af5fcc
SHA2568b638db635914aa4d54bfc79c66c6fe36b2dba1262754eeb94b9bb81b00ebd22
SHA512b48472f9f8c555fb04b651d0057da604ae952c4fb3ee3f5b91817500ee376a68bec37d36e23a8019064a839e21e7b073039b09d77471e85ed629af307096458e
-
Filesize
4.0MB
MD51ef28074087486d5c5511ea4b1e78da9
SHA109b40940b90cee1580ac6a02490ee0cfbe7cc389
SHA2568ca0e04d82d99282d2979db1d3da2471418f494df9c9c9687f805e15d2117741
SHA512a1e18fb2b6086921e47913f8be71c6212109bfb642e7f080cb5c77ab042a2e6ffd5ddb209f366f249d948a16f07a67d3f1e47836c887fe94f6ae7f9bd1511856
-
Filesize
32KB
MD54ceed90e9d6e343bb35fa291da820421
SHA11e835a1ebc7e5a889f2a58d027b7bcdec721c419
SHA256b686b5f7ce3edc5b0fa41e93c3704af4646220b158d514d7524298b46318b089
SHA512930b1eea7997467502416076bdbc55c5cb7f449c2cbbae52ce194f6dc298b4ea2ddc5e6f467e51332ae6c4d62740adafa381a51357d27bc5e9b2aa545d66db1c
-
Filesize
312B
MD56bcee312a66eae369440c6a1d4c18ba5
SHA1440f3966961013b9ab9a0be1a46bf6705a5ba27d
SHA256e9ff2943ad77ea12e0bdbc9f6d0d188c49fd56d4e9bb1753e6118fee8f8b8831
SHA512a5f39a16e5b35e2dda78a2c2fbce251460394ce94a0db5adef51d5484913fc8588228b29251e54357a428a61ea504dec73b089265a25d0151f4e7846e000be9a
-
Filesize
223B
MD59ff710f10f2646cc94d58689cef25d06
SHA11ee9a3c7d8a44736fa9ea11392d06ceeb361f1c0
SHA2560aa22c7c0d255509920e5c2d7715614135f12058d3f90f7046fdc94ad9f210b6
SHA51230cc7148ce97be3d82715d3d362d2a5f611e0890a894e7a08b3a8da4e1105f30c5cd1b206e04a1fb192f176f98171908d86255eb83743a46371a1f74200d23ba
-
Filesize
257B
MD5e40b6ca947658e063ddfbb2b2d75c70a
SHA11f9eaf209529093e6faed4a407a86d9fd42eb7a5
SHA2560d864db1bab14ee63718548909149bd46f1845500b4b8bf51e4a5359f90b9442
SHA512f6742e7c568ee12ef70a48cfa0bec88bbaead46fd74f604bebf3c64a58307e5bad487f2085aa0b67cfc669554abcd3e1ea8c313a71b5402024b4f97297ec8f48
-
Filesize
242B
MD5b92b22aa1b392566131b565c8ab1cf91
SHA19bcb565bc64c1df9c3410b830fede4dd7fa876c9
SHA256ac471c28c1bc7f54fc806869bb2d7f4b560329363f62c2500b469a840d128870
SHA51238e1e4db8ddf27676f7dbe933789f16cf51bdd7a8f2b7584cbfa0c980d0535af49ca23c166ed0f4bdc8cc1afa81a578028ea025eb9429913a8c98a8a68e92b6e
-
Filesize
222B
MD5732ac2045ff1712deb4a8c95e700b325
SHA119594418b9e7f75297d4b49852f128bfdd630334
SHA25626cc454d4a43d09ff0abcf2a0ba448ed5b107b9b286a93ba16866eb6823e2478
SHA5122f122c6b8fb1a6445c81a32fa4e53abc65797789e45f3005e825cbd7f7f80a7f1885edbf7c6ff70372bb22ff4cfe93b5958d313c76e486f85da33fc20868ef6b
-
Filesize
273B
MD5f7914755c6f17f278f874bb13a2cdfb7
SHA188c596b23c2c69cda32d8d5d7a2e2faf637f5065
SHA2565bc2f0b8d962f6ffdb41cf21b818b1fdee9dfb68ee70b168889d78d22001a6ed
SHA512ee6cb2ebc0700f45227def352fb53d841de398ad9fc77d9e7a3f540470e2624d18c8f63a8576bec949c5f7e5ae2e49f6500a77ed9b33fbb480e498b9c8b8e511
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5012eb9d155c3be9c726acf17a905169c
SHA13dc0308a003facb0594946b460c589e950d9d3d5
SHA2568f2a45e089da6e9ddbc397a4df6d5faa8820ec64f23851440013273074505ed2
SHA51230a6cfb4ff4166ed9417e964201be41834cf7f024f882be5255fc5e707640b932f70e38335aba4a54091e65ff88113accb4bacf9ef0418626ade9f2e00c6ba15
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD544b38e7ba30c848b3f46e41eec982fe2
SHA133546b82352dd22dbac8000aece5ef9ea8d3972f
SHA256cd7ad09d37c5c8b067d564f75d15bda491ec2ec75fa4106f8f32eb7b250e5ace
SHA512b1239f50da3010f90bc3cea57192c3332a07045f7749092f2658be74c4cc9a1faac47303afddf5b46883b8f0eaf44062846e2e2c95244daddfccceb1410a790d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5821418827e1ef25301ee4913873f2c7e
SHA11b5b86fe62e2263fa532d7144aab03b90c7f39cd
SHA2569f8d625c9808adf3aa2074be009270d32e6366d0a5164c5bf521d9c3a423eff3
SHA512438b98e921592dc561eaf4a0812f73b373ed9617027bcf14064961fa1e24675fb8a259418886bbf8c7a2e86c2648fa731b554efe07ffb33cdcc5b7149e20d8f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5c1a65339e36ac291f0413a9bea4e23f4
SHA16440485f9124d24179cf2148ce83ce6a4e9016aa
SHA256ecb792b604aed1f6187c554e5134e528be74f606f057b9a977794260237b8ca6
SHA5122927ff5215e6f86ed5c6c982ece520dbcd9322652453a3c1b547e61ba9c87838bbe77c66c63cfa74691926d4eeedcff6b8a958ed6725784363cf111dca735839
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5b075a98ef1c0a9ca3e18e07be4a75e25
SHA142d149e35ad25b593c93b77aa82a2b8ca38c6094
SHA2565a97616a6f433edd70761a38539e43a50e2ddf37c805aab6355313874653795b
SHA512dc2dc6b84cb80b80dd50cac16394d03ee100295f59e92dcef2e286ece26a1eb0313fa9ac0f45ccbd533c78bf22fd886a508d3ddc2223c810ad8f8f8e7ab5cbb3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5867a8a37c1843ee0c3ebb3b77369f407
SHA1e4f4b8aa2e374cb433ce039a1c5c1d0cf0b5d8e4
SHA2562b7dedf39ac2f4536f5aaacc4cdb8f03b520b4c6560a17d226216e8222d5bbc4
SHA512876f94a7da6a3bff9e6538112a1112b40bcc55d1c295f78f11c7d244328c37b8ca990fb93bea96d4c988bf26735bb9a57d8705c40d911498524acf3c1eee5024
-
Filesize
20KB
MD585317125aa522350b057f03bf84fd574
SHA1c30a201ec0bf068d51c02ca8b3800b8b0675424f
SHA256562dd94a90c3d45081337971f97e02f8fa4df7d76f04a7a16504d578b5027bd3
SHA5126b259ee5fad42fdfe65b1813ce9c7044dafd33854980d8763b717c01c73aba218d2758d402f7f96f4b60e8d99b79b096fadcbe581157fa62c82789d8663e2978
-
Filesize
319B
MD54a9aa44ad5a91966ac386edcb99ccc24
SHA180b6a405dcc14427e2c8a3398509477603523845
SHA2560bba930431dd70d39736423be4154a093681ba2037ade148332384b4d3379ccf
SHA512ac286ad20b97c08fc88022c650df314a230fdf4edeca79dc3665e05108c9dc20f987a73cb4d9261b2ea102efa3602fbb70aa71070eccefcaea4db2e7d9571d48
-
Filesize
20KB
MD55cd31009722c116d3b6070f26fc30851
SHA10fdca94568608c9153da749f0c5c437ba2ed0d52
SHA256e831e46462371cecfa679127dd9283914dde005d25e8ae47d807b1aec8957dc7
SHA512cfbf78b64c3d8391527a956cae905b7a13ae902cc7a1397ecf9dcbd505b62dc8a327e21297e144a2575447367538709bf07fd99cc33ce6f8ec41d3804fc364b2
-
Filesize
264KB
MD5e2e1112dfc7e9a9eb4e0e67e8bf4a919
SHA1f7dc6a77aee3cc358cd9b11c5c58bdd7a28328d2
SHA256432b164b5a57594e8865fb03b3731394b58f27965b9c8217fcb89aac3dd7c309
SHA51200ec0e6af396628c8761cf0e937e5a9e3dae34a19e036e3790575d589ab5a1c90c43bb373a6cf3f39d495bb80e209e329a6adcb7311bdf963be4f35a168016b4
-
Filesize
124KB
MD584c6685534114e1f48c9fce61635c73d
SHA112f7c25031cc80184d3cd19cbd87f84addcbd598
SHA2562ba7373d48f25067d7c79cb3f4046fdf1755f08fe5b101f4630503f819913fd2
SHA51262221dc40ed7fd7f4627a2b4239596974376dae73c220fcb06183e45b37563c677cf0eb3fb6bfe32357f321066f2494da6c8c792c473cf577965159a4e936e9f
-
Filesize
1KB
MD581edba91b4504a6cd41971aec0db15c2
SHA13bc8887529ea5799e58a4a372f2b72da2a078957
SHA256d27b06f1e11bca6099894e96026dd5a7da871e7a6f3d6ea4279bd4306d083e77
SHA51297661f8f51e7a3ece6370fb57b36c1be810f915ee6b605152d7aea90f7cc615d8a7baebe2a52fbf3d6ed04bc1cacd0fb8fc6f73c8836f36be28e94f4667c0d70
-
Filesize
44KB
MD511dfe39e6e1f115241daa3a4af7ba74a
SHA1c732234cc6a0c9d57bb268f4d9a19d6305acd7eb
SHA256c2372ea0ef58c1233a042ec0b21b647215265b38d835efad896f9207f6b44b6d
SHA5121b266ebf04949e55c14bf32539a1aba5496f5a56ef919e850273fa529de30673353904071f012d7ddfb35db984b995a5fe729e589786b44cf700462f55553b77
-
Filesize
14KB
MD5b4b06f3bf47bec10332dab35a339de5b
SHA16fa0f38d4db3419dde1bd69921dcdf39d026980e
SHA2561b98d3e5e0e0fed48a266624637622462c3691b34311b7c7dee91173afe9a89a
SHA512d6096f5bf2324777cd70ffd25487a403caa1bd292896cb9ade845ae05ea246688ef17f0441b81620c73b07d70980b9cad41f18c9baff72a55be5c89463272d08
-
Filesize
331B
MD5277ae8d1e62fbcdf977dd37c0caa7f13
SHA1be494c7999a2e9b521982ff312b1050754a8c7df
SHA256fff72f82c99591e261e1f0719bd81088e8532f6da8619ddebc7859b77e7955c6
SHA5120bf8f90ef66216ead6c12e401f9ce15bb79a00a634db9f44a002db9a2adbc92a678dbc105770ab30d4595ec437df141d156c46088b0812f126aacde00db409c0
-
Filesize
857B
MD5ac8252c17d4dbd0c1706cf081f023723
SHA1b0f20ece036f4afcf7b6d9ac99642ada0fc806a6
SHA256f5e00e25c4f2f139e3f178bef36e8d54d4ada472026617dda83b6f25f11e28ec
SHA512e178034877dc25e9f6ab541c78fbd6f14a9c2df5ee533b612c40cd7816ad4a3fb90c57e660e9f52a898f9aa3cd5fa9d13c7a98e8ccd81ab0c4bb38d24789dad4
-
Filesize
857B
MD5aa025268f70c8c95600570fa80d8d311
SHA15a9000ecd8e0d549e3570eff113b7676730dd9db
SHA256e9a4bc7c6ec5651f3c0f1be0ad53546c4bcd2ecf0fc2c28080ba263c5d9c5d10
SHA512ea0e7829426e84fc07af12a6dde7deb60e5ca6a559c3df41b647d0306e1780ae38ca950b445ba5af385c12dc47b069f14cfe6b5fc26e3dbba35a64a9a0de636e
-
Filesize
1KB
MD5fdffe4b522ce8d382b9e5601f3ca64d7
SHA1ad75299bc318aaf01f8f9ffbc45513ea72465086
SHA2562e6152e577544461177a193c9121c9d39cb360f16f2928912e22d94632bc791f
SHA512d28b965403f12da0794e6a63a4f7102f14fd812e31454863c973ddc87ce9c91ba7f30d0b95b6d6e8af0896769baf33a32f8536828d24386af475e415e368c4a3
-
Filesize
857B
MD57b4ab2253b275c60d029786ec564d805
SHA195e81f1c002338e2407c7a6356c7b2218e581a32
SHA2564b5b3957d714eed5230609a68f21f8d66f306a081a1a0b1280a26c15f2d2df90
SHA51277c1f565fcaecc3c0d0ede018ab109dc80fc4904d9c0c20c3193ff165c3cee9160a2486f8c77b0a919dbfff928422a57abe3770399b0a1cd42221aebc89d1cf2
-
Filesize
579B
MD5d01be2bc277307bf760669a4f350a984
SHA164859376f5718ae3b4e6979a9f029ceaebf91fe4
SHA256de4ea8f1d2393892282b2e5ed049c0817630e9350e541f75ac9e9dc832967d41
SHA512a901a5b217e43b9553b2dd6edcafea6a97ad56ea0e94726e578e167409fb8218d7cd5b029788186a5ceacc2ea706f37a6d498ed6915d40e25e662501d02df94f
-
Filesize
857B
MD5848744332109528eb00f2e09666406cf
SHA1c2b2101c094278c9222dcd6ff85a018f93f4cb90
SHA2565fe85db5c51d7f678d8370768130459057736912dd1de28977c090dc8c8d22ed
SHA5122745607781095258d76a824ed9e716024ac45b7c09c9df9f55727de57fe053ef2dfe6efc1bc57fa866d52692d216872b0108ff3426df3c54bcc834454b24b011
-
Filesize
6KB
MD545610c0097f24f4e3f861b0e8cff103d
SHA1d147da45f6e504136f911e678f68a481bc93e9c0
SHA256bb7d2186541acb32f1b810e71c9ebe876f0f9ea0ca604f67f443383656a427bc
SHA512c431136580fa967c4defd1dee921fcef865698ce8553f6f7b804054b746dde352d61e05ad1e9e2ffacab83cdd4b4bc40686609c83826d4f0e99103df09d5b0ab
-
Filesize
6KB
MD56eab82a165dfa74952642e832ae4240e
SHA1c1b50a004df9875241c5c17b4d06c0fe4aed711b
SHA25631c80421b5b95d15dc05df66c43ae951e156def3b7a7228d598369500dabf714
SHA512aac8e7c046c183d3a260e5423467d9717446e0dde2e6361ebdc6c81bc1cd2657937e83bf4774dac1de387cf6659c9505bd50bc31feedc9f68a3a770bc215a0b6
-
Filesize
7KB
MD5c173d2bd9ec7a707636fa0926543423c
SHA141b4ba2efaf016d6e7c2b856032222f04bf6607f
SHA256c2a2f2f29ac51d0fab92549a969b819ba00aa52b71fc9626b040782ca5911444
SHA5125520ba95a947648e58c18ed9325da437dbb9259cdd6defbee00fa48205ca7e58885cbf8332f4a8a5a69b44fa68420ee2d4b8ac98dd0cad36625351355f6d1266
-
Filesize
6KB
MD5c9df57965c6e43ffbcd19b171bcc94c8
SHA1619ca6034c0377d34547f7b6a113470f27950e16
SHA25659289a2fa740e25b2c459dffa9b2f93b4cac73a1385c2573455c0afd32c00403
SHA512831ef9a8e0901423a3cf7908b18ab03548783b128c1726a8afb0839c0b0edbcf3ab99db5293ced3f16ffbebce2cfe100b6b0b12575cfa6b044bca3e813b5a92b
-
Filesize
7KB
MD58d63b206f105c6f8c6a82fd8c7f4c5a5
SHA102a0921d82963fb3e54cba84b91d0c80acfb8af5
SHA25669f0b6de3551fae9258948e77e4fae5fdc1ebcaa912783f5ac575ad339f436a5
SHA512b5df6c339555cba6131ec822a87eb1c9f569b83bf253528171a735f54abb8fe8e61eae44018eac369b414af4f26679657845640e6e363ed816aaa5c3a25e4c1a
-
Filesize
7KB
MD5fcf3512edb2fd399b1b3e96e8af1bab0
SHA13ff8992b11180b22b504346032588206c87c8012
SHA25614e39d2094c71c06f0f82a2d7fe7c401752277f01606bc41dd9a9acaf4bfbf03
SHA512a69e6e77ce4b5762acac12c618c97c32798955f3d6a23b6428aaeb3b76fc98413a8b7dc5686d8730246887a34a3df50958965acadb710829db78e66c9103b032
-
Filesize
6KB
MD59790e1ac972e6f99770251c116f8e5b7
SHA12b86cad72701763aa9fbb49b9ceb4d3bc10d5533
SHA256947fd98b6083adfa97f1564cb6f33c0f6ee990684428f4912f386c742178162f
SHA512f13e39b7d2d4bbd8322e641be917ab37cbd60a25fc300d579bae145d12bbab43c67dd1c32727d6e0bccdae8552a2d8858ad1f4bbbad1a4f8199bb014b69b6975
-
Filesize
7KB
MD516559cae7e944538d8ca394398b6879a
SHA1b653724a229bc321a9636d3110930ee7ab00aa31
SHA256ad2d9c0438181edfc45346bab91fa6dbd51cc04ae49f41e0b4e7c78a84757023
SHA512faaec571a222ee406db0fa8f9971b2c565106d817cda59bc2cd4ac4b1481a4d450a6003f2afb1821269ff511987ef52dd70bff0f91eab42e69941ce89616a6df
-
Filesize
7KB
MD5fc756007bc1c94a15595b5f82ead2009
SHA11b9ddaac570c0b1c1aa22a2cbb961fd3f55ee53e
SHA256ecffe686951f2027089f21a80a2081286485b1fe1f8c62ee46230c617a6cd82b
SHA512a44c3297a9dc93334391cc2a902b47eea115ad61f86b96d3434ed0b90dfe8aec168f7f8273f26e19e40516f289ed765beabaf66ebec5e939fa8fbfe6818ebe10
-
Filesize
7KB
MD5ef9029116fd32ba3e35c219b0216fab8
SHA10f1a7cae6c6a0ca595fd27b4c589f7b4bdec29b0
SHA256d5e67fdf09dfef03df248a44880ccc7078c050c42b73e7594e39ebb746c008aa
SHA5129f8b9f76826eaa0ad92593a00d8807e594366d4fc7c5f5e84ad4fa6c0ceafd719c18e3756a138c9e2c6789c6a6765965a9e0b0f34327bf6fff16e1f6dcd3fec3
-
Filesize
7KB
MD5c474f9f69db890f912180993b5e8e121
SHA1e56ead6e70541c4d2f957f37ce7440b7c08a7e7e
SHA25645d0e3c5f698ed035e978e6e6b50f2c64a057a3984878a336a2a25c24b47fdde
SHA512bd76bf07b0b8aeef5095f5e5ce5e36f921fdd93b1a345c0b08ba70725bdbcb0dc1d44a70277964ae6cdb3b23405fded1f7ee07c0ef2121ba8ad67a3527708cdf
-
Filesize
7KB
MD5a38323c98836c5ab6148d765493be547
SHA1b04769c297246e4b50472aa79433a86dc0083f54
SHA25692bde92451bd52cb09c12ebd26c93679d33bb6f5b12412453f9422952137cc1a
SHA51254810feec913ca3b1ff881dc5e13844ee386c7ab40cd07440400bfd7c094631d8a76ab45a4d7ad1f53bb17c606f71e030c031ca38eb93ed88e0d9d2df2de9bb5
-
Filesize
7KB
MD53c29841919c8c452388ce0bbfc6785df
SHA1ccdb02718c4dd01405e2d7e77a2c9b736b416fc9
SHA25666e4e31313c4336f50e504ce952eaafc48f5c7f16a66c766afa3f89774a02c8f
SHA5127cc0082c4299d61c721edc0de7f492216d323ee6de5c902e101193f7322569c8b93add2197c17604b800e7673b87cb86ecc882bbc8a705504953938188cb5c42
-
Filesize
7KB
MD5c15132c77b020f4d8d97f62144e731be
SHA1ce7a4894b6094a97b1fc86d11d2351c68a355837
SHA256643d923f6760dfb7dbc24bf935de65b49e441fd417a44baaa718e674607ccf8b
SHA51246943f04cf8661b28298b99eeb8571d7f6f8468f7877da10fd4e2a9f8f3310e24a71e736ef485830cadff93c70302ccccf7e8817c402e0b6877e4079cf8c52ea
-
Filesize
7KB
MD506634d9b66de08549451c758b29ebff0
SHA1ebd0cbc5c979b0dbb7bbe3749e752d06e0aa366c
SHA2568032ab7a361fcbd85ac7abb2529869c44f64d7ac55739fd11df99797707c6d39
SHA5122b1335531bf6a2320926d7adb75a819ed25b17acd482bdfc6991b6d5342787331afa6c519c6c09e6b22be8315418c549b07cbcf6b5d574989182df2a79b56667
-
Filesize
7KB
MD5e6d7795b1e1ba216fbceba91dfb8aba7
SHA133a904e9d6820b74dfb992a5adb3d6007da84f3b
SHA256dc0160f17bf34781f53971e8dab2898ab8d22f9d3b0dc06de89c6b55d247ff0f
SHA51200d4e27b9802718d8a788585a5f8e35fa529649dbc7e7283f7234ab577d3e10765d8fe3624c2261a7da48bec75ab812da24d4e2d2953a127c4d295dca2084aa1
-
Filesize
874B
MD506b5b0c38d14efdb996ba12c7a9b09aa
SHA11067f8ee0c40920bb8efcb993fdcd7976067bc4a
SHA256f3d2105abcbb8c48485e8a764e4e6de7607216fc835263dfc09105e854d14f0d
SHA512194d533337cced6dbad4eff0de30d4a23f7a44989052f96d44e2e3751abb2c7f9965972dd8d052e57c46bb16895d4c68c66316ba51be25508965ed97912aa9d7
-
Filesize
319B
MD5f799fa02737fcc2b76117a5a319cedbd
SHA1aafaabc0b3066dbd97822b20ccaf9466fad959b6
SHA2560948693db1d785dc2572d0126d0dcae021b52236fd6e2efb2287c9825ff2b9d3
SHA5123734580f1782a9c926cb88749761ccfccebe6634b53d43da3ee5b3a0aa8b550ce48577b39bfd8a0c8c7a7d47744bb636ef74bd45e9f1621f43a8d17faac6a03e
-
Filesize
6KB
MD5276a8303865c9fd6c37a5d1318aae9b0
SHA12782e922e2e38fc96736a9cb646a072b4ead8ff9
SHA2564123cb2fc1e4ae05fd5b5441f592c9f096dc11b46489231b51076a0644a3b1ce
SHA51293bff84bfc47b0325b148dd13fb5fc888dd6b984eac4799ab91e6100c6e817c507de5631c8f47d8fcdf13773cf5af4a7e285604a443040ab8946308047e30340
-
Filesize
5KB
MD596eef9445e3e7458ef784b53faf6d17e
SHA1c27216578689698cddfc4d58e970dacd9de23afe
SHA256ea1cb6d75157033cf2a23ca963ec21f1c111ceac8b3bfa09f5a8e6cd1b3579f3
SHA51215e4a79d624d977de88b654e762503055d072e967800beb93ae5a5ce6078a5e4de3961700261ac631e81ce7e09a5a682ebf076a5d1d2f061eac8b4186fe39b1d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize112B
MD525eb972b77dcb9ed032279a82616be84
SHA19c61d8c17b6a42fa1ac540b13b7c71ee2e36438f
SHA256a50f74ffaabc760a3f6d8c90ba145fad01397cc93aeb75dbb488beccf2bd8ecf
SHA512cd11832c4941cccd01431dd4b5dc3a9b341b25a1edbdc47475f89d680f2697518523fec737cd7366e5e097a45841d57e1ea95902aa4fca11e2823fb3c2481b55
-
Filesize
347B
MD5c1b4ff2371d6f57ec38a35f208403782
SHA18ec155f2ce5e18c9c023e6ae8a5800de50825f27
SHA256795b2344af6a6e6be27105cf34e0ad59e43fc675665df240816df36fefb71b48
SHA5126e94b56f9a252a46b3c6f9a1f2af82246e8406df33651eefa8f9bf6e335a1e00965c5c4ebcf7a726c05f92452415ea4a32c0c979bbcd19ed0bc2404c933213da
-
Filesize
323B
MD54308d09241bb1b5c49e2ba56e3b07018
SHA1fe6f237020a147d2297282144338678c448dd190
SHA256e19fe88e1bdc441381876aeaac71703fe1ebff9338e5bc66aee4941e87d99410
SHA512e1c5759c48c4fad6f78c89fe629b579e5b91e6ad825519d932de322ac9be7e8059d1ffb3ec51b714f7a315ba69bb371b6f15a468e6a38b5111875899fea7c4cd
-
Filesize
2KB
MD5eaa23c2f5bdf6ddc9ee39a25b38a1537
SHA15bf59e398b220e9d8a93e439664ec10afc65d51a
SHA256aeb2ecebb1c509d7fb05b47e8f49fd584fe19b0ff3c8992e72c0b7fdcef611a3
SHA512c832b3b475a550f40ddea97e62179acf7c3c5d7b87ae5bfaef61e8392e79c75e62dd08893627dab7f01d7e1bc9541c1909170e9ec05b910791bb6b343148d523
-
Filesize
1KB
MD5efce141c338d48311a87bf231613f1e3
SHA1f438f0cc41d6f0b7c13952651b05edc0ceb73a81
SHA256865c9661de633d2dfb109b9abc7f159906465e77789e3c905c3f16aab97eb794
SHA51216ac5218d16a1e8f17931ee380fe3860af4fd126003fe249b2366333ab710cf9f709e882e39bfcc870fcc9f02f9506e0b63f232b852b582a1f94dbf060b89c82
-
Filesize
1KB
MD5cc5590dc7d55105b4d2323fc39cfde7b
SHA1e0c539f4917b13f44d9cedbef3cb61d8e57b7a99
SHA256ee89e1aa5e2e9a4256ccd63d11680df224e300e6b6b27887110e59b9a161c221
SHA512c85efe455ddc4bab19b6a19d27ae245ef8bdf8cb1cd91468faee54ec3cb431c6805d4e1c3c45e1b68c9c18c6be64ff2c3904e28cb67bba798d3de0c8750f9c36
-
Filesize
1KB
MD599b488e5b6669871cb05046e6ca50c20
SHA1b3f6c87d42b250f049261ef06a2b13b67538c5db
SHA25679c170c19175e01042dc8fef84e7b11b01b916e1ddd25634afde907244b943f5
SHA512280720614fd4e81f0de8d8b4a771a3d36a97049c0348cc4e0fab5b11580576620bc33328842e2faf6bb6862c551ab172b18a402ffb88dde54c4ad0e882caca9a
-
Filesize
1KB
MD557c88973f6fc99d03c9d91f5d56c395c
SHA1fc8f82010475d2683fcfeff4dbdf8378c72897ba
SHA256ba9c3b405a5de4de1a432aba1d29afd6f667045c7b6b04aadd4b03fe563eb3d0
SHA5120fef98d6d4bbee9be0aa352c791b275f62dd63db4e3247f882c75257800662ea49b299d83146d19bc9677356e138c8f77e0b4e80fdb70d4a9f6efe4a440d0dd5
-
Filesize
1KB
MD5fbce031fee3573b6aabb18b6b34c2832
SHA15d4931a35f9215509cb2c570376034620f886a69
SHA2568bcb7b1a03100f79a5cd7faad8faf551b2116479eae757850c633c24d10388a9
SHA51275d93f0040cdde4cb8e17571733970e9e6419ed14275debfbc8fb5945284a0cf0efefa86c535a605b9b03d2d7491382b0a4c38b36391e5c8300cf169b533ffd6
-
Filesize
2KB
MD546c03101c50678ab2610478c47f809ef
SHA1d2276a04365f4f9524630c21495929976b36dce9
SHA25644e96bd771300cf57965e38f881dbf13c01c55ee443a4a905b57cda7c22c7c50
SHA512f662ac2581857f313cbe4ad7a76dad9cf4877aa097b2d57d3d9789b30b8e01f7d6e1a65ca7d9c61293ad6d9c9d0818ebedc31ed34561fd4ac3500798d8b050ee
-
Filesize
1KB
MD5a7e3749c3ea2dfe26ef2a698ceed26df
SHA156086d10695c7265f90d6e080f1c3b1d1c14b95e
SHA2568b08441be05c37da083e52e3a14b317abefbdb5559056868148f43c1e5e60a2e
SHA512f99859d248178a87569fc66cee91a14896c1570a940bf04844bfd5482e9e1eae95ad59c750ff62b470206679a91ec09c3852a4ebd158e5a70140d489cae9edad
-
Filesize
1KB
MD56003e20e1ad2e1970dc24eb94795db06
SHA14a92dc31f36b3f73d480110b85297e3bc1f364c1
SHA256d2f805f34a0327260b83a7aaa33f246d6cb312262db4932a1a3248b5786e1368
SHA5120189533ccb137645c7eab41156042012f2e983685d3e912c26bb05949cd21e52b9639f2faf2a3af152b6e1e6ce185e8f651d86c9e8dc49e7499f7c9db06c9930
-
Filesize
1KB
MD593f08c70d3e80a891264b4c7519c1357
SHA16d13ac3f934afd5370eb7752af02a39fb988b949
SHA2566022a95aab6c3008ee5b690b88ad9d64dd9ef7c5c0db7b08eafe9b46b85e532a
SHA512e96d34ca7090999d99d40c7ae9e42390c53cb4813039be2bf90abbbf9808c9ce2a1bb2aef9590a709920fe9e4c6b2d464eaf32ecff97b1d51b70ded155a8c5b7
-
Filesize
1KB
MD588914cda6f298aff5021dccdb6ea2207
SHA13043e7047f947a8e09fd768a5685f53b3d274f75
SHA256eb4b912df996bd3a6b51340e7859943c539adf143b27728e03a1bde0c9fd54a8
SHA512370708f9bd53f9a38669826ad664cb00aea2ef9e0ff831cfc30b5539149f0669891f8d6fa3ea6d73d6de2b61c8693d827c2fb0a78349f1c2d8253850d158ac11
-
Filesize
1KB
MD5460a9554a39d4274d3ab3b7cab3e5421
SHA11f49a16ad80508cf713600bd249b3b1aa7d8f276
SHA25663f86249bc17482f9ef53c0696e269382452f84c5420d40088e208e8bdf99e88
SHA5126694e9769ef11be6dacaf8b36909f17ea1e2c6f64fe51e863a48da31ea6e84dfb3a0780fd93408b771e22afd139a6f6428aba383ecc54b275240fdf7c4005c7e
-
Filesize
1KB
MD5450135b56ef24c26df8e5f15ff3fc91b
SHA16b24527e4bd6e9d667779ab4e299d8aa21ff6aa9
SHA25618eb1843fe044c37a0b7026c26c19764a0c3681d5b85e4b36ecdf01061ce9400
SHA512e2af236b8013a7d43c2e9f9e86259735968d55727756a91a350e371c77815a867fcc0f0385003a799e67fc663b82b26a28b66e5537c4462de4157821c18bae12
-
Filesize
1KB
MD56a489b824be76ea677dab8b734b544a8
SHA1980dcac488ca898fec8681a888727fcd830eb6f9
SHA256ef8a54ccf4173fe589371fce1910f128260c5ac22c98cf8122ffded600400926
SHA512cf1d6b9ffd3dfef55c41845f6b925f7675b7d7ca1d4ec8dd0e57a57b5897dbb2f1ecae3886b91b5ed9bf13dfb0d89fa6bf2d84f0b26a723df8ef78c0d404c3d9
-
Filesize
1KB
MD5558778d014fded44147c0187ee18dbef
SHA1a8c7dd8da45bdc6334fe116702aee40dc520abf3
SHA25605852e2130309594fe1a2d2fbe899226cdbfb17ffd51c9eb7c1f6dedb68682fe
SHA512c2376d243252c01eb599661f823f18d68322d5e68e53bfa4baf553b72e29ea4e3661f24f10dad420306667613c574faef4e73f4e69e00fff4046dcb69540a733
-
Filesize
874B
MD5cbe59c2e083e47aa001a62dcd624b136
SHA1f0541f3d7f0b1e448a61a7c88737b7a73605714a
SHA256775f1efc52b6bea95d882d041d8158a7cacd64c9506d5402e7cd5abbe172cded
SHA512fc2ed3e00344a85bd2c7ff5afc0ba4340fd06b99b1be26c176bf2ac3dead5cc9c45d5cb73cf3191dc21bc22d0bf04097e9636732b229cffde4123f69e81d199e
-
Filesize
128KB
MD5603d3065ac909e2f3183b82af07acdbb
SHA1514ba64a00350e78dda9e1b13eff5991827f3f3b
SHA256c539ec02a573092a3aa7da28adea3e204dcc12d703c1b57f0eb9aaf9b00efe75
SHA512861f1cbe8f770f38ab74a9e8fdd085982fca82163af5c0617e19d5a66e31a4c39571f3d744ac353bb8ed0a1d1db33b6c45b70c60608ede0196caa3d4a6820b08
-
Filesize
10KB
MD5e71f713f25c7dec81807b60142daeaf4
SHA1f2fe350ed0d98ce6ce99cd9e0411238fe5335c8b
SHA2562d9c1f86ec62c5afdd35ff0ca3a89863151d351379601565f5f87963d82d98ea
SHA5122307e9931705686fb2bc1ba83bdfe028cb517bea1aa815589a898f095aaa6be3472ad3aafa40d4b0ee357e8c440435514490d358a749da9b9d526ebf13e3e4fc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a51776a4-b29a-4f75-9f9f-1cce6d9bd819.tmp
Filesize6KB
MD5bbb45ab24d084cf39e256c4fbb49514d
SHA1849c865001da4e5ffc8ae33b60deed7792e2cce5
SHA25612ceffa616fd816fd8a781acde8e4a1eba994d7fa89b247a90464df24700c3c9
SHA512038e3bd54f61a2533d0d619cf0fbdd8ace23d28b00cda28c5a2df7a73f20af29589f993592eb18c3e880740caa9cd36520df847e13fcea32a1d42725bf637a0b
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD5589c49f8a8e18ec6998a7a30b4958ebc
SHA1cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e
SHA25626d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8
SHA512e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
Filesize
139B
MD5391e9dcfb011b67a9fb6f3bc2a8699ca
SHA15a20ffbfbf6af96d6449b1ce0f44eaff229baaa5
SHA256aa987b97949dd41cd5a04a3e37749271d9612a55f4f39a29b5ef88eec8468ac7
SHA512a0f13236ed6fd91a0d26a134f98d5d348f3e951879f268e5a8776245d3084b5462e1e87bea737df4a7dc7ee4c012dfe5728966c360152c591b213d02ab2b122b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000004
Filesize50B
MD5031d6d1e28fe41a9bdcbd8a21da92df1
SHA138cee81cb035a60a23d6e045e5d72116f2a58683
SHA256b51bc53f3c43a5b800a723623c4e56a836367d6e2787c57d71184df5d24151da
SHA512e994cd3a8ee3e3cf6304c33df5b7d6cc8207e0c08d568925afa9d46d42f6f1a5bdd7261f0fd1fcdf4df1a173ef4e159ee1de8125e54efee488a1220ce85af904
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e9ca8db8-ad9f-418a-8a48-ca1045b89a5e.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
72KB
MD5a59b0b6e8e921a74e11153b2702fe6bb
SHA196a993048957cd5e03de70c652bd544c757a6090
SHA256b1ed2f0e22c268dc475edfc394d8e4bccc64909a90b3f43f2af25e13d7f78968
SHA5129d929bfc06d07f2b669d1e2b6de96f253b4a3a224c0969ec3f0d6f0646151bd4ba820bce370326cf6ea0acbbcdf347f98d458b11090af6d28fd63c2a51b0de4c
-
Filesize
2KB
MD5fa5c7873849accf37869013f99b244b1
SHA1d20f0649fb2e3fb8aae2487623a9e177c5ffc897
SHA25623e8ee7a56cacc189026fe5f809499f176e1bbfd8112bdee59e1330bc5a75a37
SHA512a8c098b29d12e4ec07ddc8534ee53730d7ca93c7d6ac02fcbb475c85f7f96fdbd115fffc7eb62880eaa84388958b48f312ffbd67d611ef5f6d3ae167f39f1f0b
-
Filesize
319B
MD5a711b2b9d75d296346bf313bbdd81c71
SHA153555f7ed33ec7881dfa0b54a627b25b6a7ceaca
SHA256b50d2f4c6fa762860d7aeb53606d87da5cb215d708e08796c9a419488c5c5c1d
SHA5125de2682bdab816bf389ff4662fed0754e4a3abcfa8c97dcb8dd49bed9118f584ecb63a16284b8f541627daca9e513532461a7ee50d019496fd596e8aace407cd
-
Filesize
594B
MD5c730ddd83f15a1b266e493aa643b4476
SHA1951129cc36735d94bda021544bb434b117a04152
SHA25661e6d8d49614ec8d7743dca2a40bb622fe5711799b28adeaaa30eb1e1e356e49
SHA512f1ec4c586cb60fb20045ab2a61e8ee1731dd89fd101ae7d63ae3827164a16740fe309fdf8455c742fe75d84523bb12ecac2e51a6ff087b48420975f768291876
-
Filesize
337B
MD57523395cbbeacd7eb5571f1f649f3162
SHA1cdd048dc0c890e9a252e8ff0334434add159763b
SHA256a3960ee6e1f9e415712d098d106d37002ace2e93d28169fe6c70b7f1636ce4c4
SHA51261231637f6e938fe5bf28c0341acee882a5e4b433c8c03103200d2a48a36f545dc4a20f41e602ad9c19c91727030735464b8bfd664f5fb3591f128d42b74704d
-
Filesize
44KB
MD538cbe00e506f97fc4b1609a47dd11466
SHA1591773e15a8f8db67439abc6817f7d7e2156e6dd
SHA256f642d554acd7bd21955ec514e0f05b27b873b479e50d1c5e59c8887cf9b73c1f
SHA512843d8d0c79c0ec3884fd292ef6fe0dba895e3304391dc3ea3ecaa55a764912fc1ea5af4117a3dc4de82ed75cb065454fcf1296ef770ee7307e75e017cf5ded59
-
Filesize
264KB
MD5152fb23655917390ad74879611223552
SHA1f8bfc4abffeb6f77e946f8d2e40d4f9ecf620e58
SHA2569064f7d6e5cf22f7f4935b27abf3b8b967c1a458e08052a920a46df665cb9f75
SHA51244bed1b0b09bc84eac03739e83a2abe84462af448a343f27fd5e95fbb2544b3c9e5e5bc761cedf7ebd97e9e3009b3b4904ffaad2f72c746c7e91290374935fb2
-
Filesize
4.0MB
MD510256642f272abbb6142bd71070f60df
SHA1a75279b314a80c42210c2e60063486cbd4b5aafb
SHA256bf460cdce01bf34be2f5819a81f52ba9185436b84af783f0f477dd0231daad9c
SHA5120d4090e1ee65ec2c7b37462cd3d715518a7f310d54c6d3659af560ed2ceca9fada8c25ac8a1670ee0fe96b5f7829e308a124cad498f436e0ef261691c2f33381
-
Filesize
120B
MD5a397e5983d4a1619e36143b4d804b870
SHA1aa135a8cc2469cfd1ef2d7955f027d95be5dfbd4
SHA2569c70f766d3b84fc2bb298efa37cc9191f28bec336329cc11468cfadbc3b137f4
SHA5124159ea654152d2810c95648694dd71957c84ea825fcca87b36f7e3282a72b30ef741805c610c5fa847ca186e34bde9c289aaa7b6931c5b257f1d11255cd2a816
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
12KB
MD5a85827ee878eefc3f0cedb20c7367180
SHA1d2df111d77cff9036e9fd6c7026ca1a20f61a3ed
SHA2564e42ad7f0fa7c90d3b73cc5e574a85ba73723b8549b92516958430bed1e0e1e5
SHA5121135523b2af269160ce45080e45da4e1a0318fb2736284842b586da480df7bb9d9e87cda4d7bec987a956efcfe21e5dfa7d7dd6acb42411e2156fe48ecfb477e
-
Filesize
12KB
MD5e1e3c60c5255cc1b224bc65fb07c9e33
SHA163ddc9522a8958f16351835337829b21073444a3
SHA25646614d6d60cc21c75fc0ae081557b24ed845765b8ab542941752f7cfb509b00c
SHA512d98ba0bdf5e0607598e67d69e6400b76d5fc88e7a1c951292e04b381025e9e425c754e4f1a119017d0420ba82f6dccea2312a298c4399eb8939979f6747564d0
-
Filesize
11KB
MD51bd06b482ff6bc054b92a8885caacb91
SHA14fd0b090454327fc0dfde952df2d5c3e680aabe9
SHA256573511d7173705a9e1faae04a5706d3ada1603e0207abe34d7a81bb43a763dbf
SHA5126562d5aa44bdf484ee088edbf9079ef976e53e24662da3e4e17f5162f2e27e6619d76ea4e2db4b89b7c6691677b389f1ab3a3b3d39fe81184ba10dea99928add
-
Filesize
11KB
MD5590edc25b0d5a4445c95ec8fccb76e44
SHA19e05fd0479f39f05ba9ce20f7e60a667a3ae23bd
SHA256f242aa98d2a1d4075bb88a20a435697bcb57f6114b4235cf6592c10d37b10dd7
SHA512b045a9990d8594e5922e6a9b0a895eeb579e51a6d97f7d27d7a5eb57b534d7e5ed3bcfda83cefeeb5a264fb53a7f3bb5d9be2ba328048fc0bd1126f34506f9a6
-
Filesize
12KB
MD51bb5fae74cf8e282b0a68e13782b5dc4
SHA1a9634355ca783a9e7584b07895aadf2141a84ee3
SHA256696da51056b61bde7d5cf18a4696aef710f0e12221ab9355d066541c5e025e37
SHA512d78fda7ead4bec3f796b7a6d34034d166172fe79d0fd9624e445de78567f3453c8236d19de925dbc481153babdf31e0396193853d87fba6b8fa80cb0548ed44f
-
Filesize
12KB
MD5a2e1851c05585a77ab937d7b40025cc9
SHA139caade36cd0c257a9b4fec2f2a83e38d6ccc347
SHA256bdc6f7a2fd8ea83497c38a9fb3e61713c8fb73d7bbdc28fa2b322ee0a86953fa
SHA5129905b649a96103d46125c56a40f3bcf5ca9a23d8a1cb74f7e2b34c96974785985784eb631c3dd96caa87d3de78248a6ddaef0e198f8f7ad68ce1dc46cadb8965
-
Filesize
12KB
MD582cd83eb5bba78cb8061780906c81393
SHA128b48a79608eda654ed0220e4fc6c789b04fa8a9
SHA256352e250c1884d80d5526dbdb954c5cfc90bf1d70e384a9e3ef8163e80b42c462
SHA51257c7124b5bcf05ee84d8b3d0feb45164fe3ad7702e63b5df99a1f1ba5124a7f8961a61f05be57138f633d75705d6b645d9373764050c9f7d812ebd189e64aefa
-
Filesize
12KB
MD54747eb5e6626131af583aba1593fa459
SHA1968a933082c89538e2f4fb441c0654b2ec310b3b
SHA256782110bd6eb7c2a05cd7b17d75091b3bcb1f4a92fdb72b7de44dc57f7898b2bd
SHA512a488dbad03515755af4edaa01bde5721bcc927458a95fc8c0a579f51a0b5a56a0fa2f3280e908d7982b0288b5654c34533fb5a6419fd309a316cf495f2583bf6
-
Filesize
264KB
MD53e72291fdea6b0ce269506a22ea33a2a
SHA16eebbec52fa9e8e49c184dcdbf53820181351688
SHA256248ade07274c7385549de0feb36b5cffd29a2aac2342f8a7dff8fc4393c98bfa
SHA51256b838dc52899f1cb34f5c93fc3449deeee39d469724a784bf0095ad538b34879034a305afedb9dd539abdad192cfb3b1129fd4129698aa94e1af425452540f1
-
Filesize
264KB
MD5275918b26b1638b8361ba6d35cb70863
SHA1ac4f124e06cf2b4013fb675f2fbc17a9102e30a8
SHA256107ef31c01e03d4edec5ba262df12c68e51e112e2f9432bd3752ee3d50ca6f15
SHA5128aa480b3125fe52324cddd802c4cc0c869714eb1fc6b503512e24e667537a865ac1034aac6160da646289a4aae75055f09877b3f2d6fdb83c7fba12eb9fb18e1
-
Filesize
4B
MD5bca5f5e0faba0909157d24f0d726ee67
SHA1ed088bc65547f9413e502c609b9e8bb482bba4ce
SHA256bdc5c17b0971c0ce3f3856e963d960aefc5af12a73ffb80477d934881f17516f
SHA5125181436d3576d7cfeaf8ba6922b3f11ca1a4619881e53e6d44ce10902fa32e4b1a899b68c84848280aff5ed84f3f7f944e1296969fece345fb5124ef826a1c24
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres
Filesize4KB
MD55c72b8ea31f71dc22d7c73021530ec0e
SHA1728442217239a81424343b431134b6a7e043ba9a
SHA2565f3512fa1dd3504853cbcef797a1deb25fa3a15a7ecc9234b39cfb4475b024f4
SHA5123efd96e417bf17701d7b27096da19b88dfe7a2ebbbcd33b9da1a636816c9163f9c03916c7421d43fe5fa9b741a68204b385ff5549cb4befc2eede150c807f3b9
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
4.6MB
MD51b57a241eed58ce47249a846f2391652
SHA1345999af03a6c515191d212a200fad24039100c1
SHA25625913bcf70e0a8447e3ae39294cb3c3be44f15dcbccc4a0cd2aa4538e5ecc0f1
SHA512870cc586696961c4de63643f264514140357cad1c9a4eaf9f1e631507c680359cdc760728afd46f6511155dc5c37b7c61dcd6825b185635aa0353fb18313a8c0
-
Filesize
5.0MB
MD52071a20b3379c50b5481716951e9a32b
SHA1727ee72cf45db1f163e2740072d8c55d52fb2741
SHA25626764f24835796bc0837862a162a31c7a5e047490f1231e21a037dc6c5a46a97
SHA512c96e3fbb9ab584743bd85a52ad7c0abd70ae808bb107e7717e5e1fa19faa5882869e630aa4833bfe282d23f16cc1fe48e81732ec9c607455c08d17748e437496
-
C:\Users\Admin\AppData\Local\Temp\{24638200-2CB2-4A05-938C-07FFB41EF3E6}-MicrosoftEdge_X64_123.0.2420.65.exe
Filesize164.1MB
MD54b37da5877ccab62032498a24d3863ca
SHA129180050a88947eaa76bc28126c2192264d006cd
SHA256bcbe8e2ea625adaf3f7a55222908b532abd8760c35fb509f9c152a032808d13f
SHA5128480bfbccc189c4328de8ac4a8fe9b2bac8eed6318b145fa91e5a338342fafe29b97b36c097d018821dbfbb59b5e3bd6da2e1e066fc7c9dad32c625056bf9202
-
C:\Users\Admin\AppData\Local\Temp\{E7D148DA-281E-4008-A05A-99F2FC8E2B46}-MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe
Filesize1.5MB
MD52412838b3caca23e45c8e9f914ec67b8
SHA1c41209bc7f4c71faf2fddf3f022886fc3e78fdfb
SHA25648c1a3d1f9d843b902ffc8d6b64df566ccb6bfeed84f7d072d19da5d2e9d51ef
SHA512665bffe02b8f46551abf081c78f388b5582861f6f8d8986a860958a37942e01a80a73ba2b0d3a9b743c60265d7f2106b4d27700634bb41ea2481e6f58a8fcc30
-
Filesize
257B
MD542a5d3bfd78906c0f0f5a7142cb5675b
SHA192a1af0ae6c4122fd66ef514a114b2a1b6d93e62
SHA2564ce04633764d517ed12a07190a7d865b6645f4c10219eb4806427719a985ddbe
SHA5127d95c0e9e2117b26501736725b888e9ecbffa966ec45b37cfe067ed9b425176bab6ab641d750433b384d6b7c66285488c0c4e38afb2437e3596799f5e69d0dea
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
86KB
MD596ff9d4cac8d3a8e73c33fc6bf72f198
SHA117d7edf6e496dec4695d686e7d0e422081cd5cbe
SHA25696db5d52f4addf46b0a41d45351a52041d9e5368aead642402db577bcb33cc3d
SHA51223659fb32dff24b17caffaf94133dac253ccde16ea1ad4d378563b16e99cb10b3d7e9dacf1b95911cd54a2cad4710e48c109ab73796b954cd20844833d3a7c46
-
Filesize
132KB
MD5919034c8efb9678f96b47a20fa6199f2
SHA1747070c74d0400cffeb28fbea17b64297f14cfbd
SHA256e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734
SHA512745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4
-
Filesize
7B
MD54047530ecbc0170039e76fe1657bdb01
SHA132db7d5e662ebccdd1d71de285f907e3a1c68ac5
SHA25682254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750
SHA5128f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e
-
Filesize
4KB
MD593ceffafe7bb69ec3f9b4a90908ece46
SHA114c85fa8930f8bfbe1f9102a10f4b03d24a16d02
SHA256b87b48dcbf779b06c6ca6491cd31328cf840578d29a6327b7a44f9043ce1eb07
SHA512c1cb5f15e2487f42d57ae0fa340e29c677fe24b44c945615ef617d77c2737ce4227d5a571547714973d263ed0a69c8893b6c51e89409261cdbedff612339d144
-
Filesize
2KB
MD5a56d479405b23976f162f3a4a74e48aa
SHA1f4f433b3f56315e1d469148bdfd835469526262f
SHA25617d81134a5957fb758b9d69a90b033477a991c8b0f107d9864dc790ca37e6a23
SHA512f5594cde50ca5235f7759c9350d4054d7a61b5e61a197dffc04eb8cdef368572e99d212dd406ad296484b5f0f880bdc5ec9e155781101d15083c1564738a900a
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e