Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1200s -
max time network
1205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
New_Project_8.png
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
New_Project_8.png
Resource
win10v2004-20240412-en
General
-
Target
New_Project_8.png
-
Size
138KB
-
MD5
c502fe0cf44c58c37260b8c09b0d926e
-
SHA1
1829128dddd6af4385e516e5478c277086beaf8c
-
SHA256
1b196e6f126dc29b6f02c4c8b453ef4d01d52c371c9a0fd1a1ea7faf25e69207
-
SHA512
ad7d52b07df757e66d98a2f8428f35ab1fe98822af3f405b3563d54ca20f43516de0eb457ae46a7beb2152eb3e13f43ba932f208ae6482833c146edd5dea5a80
-
SSDEEP
3072:oD544AOMQTnEW6wcoKQmzs8RD/+80bqOFplFDmylEzUoBFyy:e5LTEWIoK7zX/AbfplFDmwEI6Uy
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe -
Executes dropped EXE 24 IoCs
pid Process 2704 RobloxPlayerInstaller.exe 3012 MicrosoftEdgeWebview2Setup.exe 560 MicrosoftEdgeUpdate.exe 4300 MicrosoftEdgeUpdate.exe 5112 MicrosoftEdgeUpdate.exe 4308 MicrosoftEdgeUpdateComRegisterShell64.exe 3200 MicrosoftEdgeUpdateComRegisterShell64.exe 3836 MicrosoftEdgeUpdateComRegisterShell64.exe 4176 MicrosoftEdgeUpdate.exe 2376 MicrosoftEdgeUpdate.exe 8 MicrosoftEdgeUpdate.exe 2200 MicrosoftEdgeUpdate.exe 4464 MicrosoftEdge_X64_123.0.2420.97.exe 2872 setup.exe 564 setup.exe 1364 MicrosoftEdgeUpdate.exe 1848 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 2744 RobloxPlayerBeta.exe 2852 RobloxPlayerBeta.exe 3016 MicrosoftEdgeUpdate.exe 2864 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 26 IoCs
pid Process 560 MicrosoftEdgeUpdate.exe 4300 MicrosoftEdgeUpdate.exe 5112 MicrosoftEdgeUpdate.exe 4308 MicrosoftEdgeUpdateComRegisterShell64.exe 5112 MicrosoftEdgeUpdate.exe 3200 MicrosoftEdgeUpdateComRegisterShell64.exe 5112 MicrosoftEdgeUpdate.exe 3836 MicrosoftEdgeUpdateComRegisterShell64.exe 5112 MicrosoftEdgeUpdate.exe 4176 MicrosoftEdgeUpdate.exe 2376 MicrosoftEdgeUpdate.exe 8 MicrosoftEdgeUpdate.exe 8 MicrosoftEdgeUpdate.exe 2376 MicrosoftEdgeUpdate.exe 2200 MicrosoftEdgeUpdate.exe 1364 MicrosoftEdgeUpdate.exe 1848 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 2744 RobloxPlayerBeta.exe 2852 RobloxPlayerBeta.exe 3016 MicrosoftEdgeUpdate.exe 2864 MicrosoftEdgeUpdate.exe 2864 MicrosoftEdgeUpdate.exe 3016 MicrosoftEdgeUpdate.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 216 camo.githubusercontent.com 220 raw.githubusercontent.com -
Checks system information in the registry 2 TTPs 12 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 5 IoCs
pid Process 1848 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 2744 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.97\Locales\sl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.97\Locales\pa.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\PlatformContent\pc\textures\granite\reflection.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ViewSelector\back_hover_zh_cn.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\textures\ui\LuaApp\dropdown\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\TerrainTools\mt_add.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\Debugger\Breakpoints\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\GameSettings\ScrollBarMiddle_Wide.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\face.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\fonts\Michroma-Regular.ttf RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\Debugger\Breakpoints\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\PlayerList\NewAvatarBackground.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\PlatformContent\pc\terrain\normalarray.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\avatar\heads\headA.mesh RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\LegacyRbxGui\_preview water 03.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\LuaPackages\Packages\_Index\UIBlox\UIBlox\AppImageAtlas\img_set_3x_14.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\textures\sky\white.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\textures\ui\InGameMenu\game_tiles_background.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\textures\ui\LuaChat\9-slice\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\textures\ui\LuaChat\graphic\gr-indicator-online.png RobloxPlayerInstaller.exe File created C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.97\identity_proxy\canary.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\Icon_Stream_Off.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\StudioSharedUI\clear-hover.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\VoiceChat\SpeakerDark\Connecting.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\VR\recenter.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\PlatformContent\pc\textures\water\normal_25.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\models\Thumbnails\Mannequins\R15.rbxm RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\AssetManager\explorer.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\DeveloperFramework\Votes\rating_up_yellow.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\RoactStudioWidgets\checkbox_square.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\textures\ui\LuaChat\graphic\ic-checkbox.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\AnchorCursor.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\MaterialManager\Texture_None.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\StudioToolbox\AssetPreview\OffSale.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\Motor.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.97\identity_proxy\win10\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.97\msedgewebview2.exe.sig setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ConstraintCursor.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\TerrainTools\locked.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\InspectMenu\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\textures\ui\LuaApp\graphic\phone-hang-up.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\LayeredClothingEditor\Icon_MoreAction_Dark.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\Emotes\Small\SegmentedCircle.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.97\Locales\de.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\TerrainTools\icon_regions_copy.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\TerrainTools\mtrl_sandstone_2022.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\UserInputPlaybackPlugin\ArrowCursor.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\AnimationEditor\animation_editor_blue.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\VoiceChat\New\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\textures\ui\LuaApp\icons\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\GameSettings\RadioButton.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\localizationExport.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\MaterialManager\Favorite-Filled.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\ExtraContent\textures\ui\LuaApp\icons\ic-more-settings.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\fonts\families\Arial.json RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\PlatformContent\pc\textures\granite\normaldetail.dds RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\123.0.2420.97\Locales\fa.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\TixIcon.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\particles\explosion01_shockwave_main.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\TerrainTools\button_arrow.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.97\onramp.dll setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133579285208319034" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\DefaultIcon\ = "C:\\Program Files (x86)\\Roblox\\Versions\\version-492b7f0827474659\\RobloxPlayerBeta.exe" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback\CLSID\ = "{E421557C-0628-43FB-BF2B-7C9F8A4D067C}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LocalServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\ = "Microsoft Edge Update Process Launcher Class" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ = "ICurrentState" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ = "IAppCommandWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ = "IAppWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebSvc.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ = "ICredentialDialog" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ = "IPolicyStatus3" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\CurVer\ = "MicrosoftEdgeUpdate.CoreClass.1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ = "ICoCreateAsync" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\AppID = "{CECDDD22-2E72-4832-9606-A9B0E5E344B2}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdate.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4768 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe 5108 chrome.exe 5108 chrome.exe 2704 RobloxPlayerInstaller.exe 2704 RobloxPlayerInstaller.exe 560 MicrosoftEdgeUpdate.exe 560 MicrosoftEdgeUpdate.exe 4312 mspaint.exe 4312 mspaint.exe 560 MicrosoftEdgeUpdate.exe 560 MicrosoftEdgeUpdate.exe 560 MicrosoftEdgeUpdate.exe 560 MicrosoftEdgeUpdate.exe 1848 RobloxPlayerBeta.exe 1848 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 2744 RobloxPlayerBeta.exe 2744 RobloxPlayerBeta.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 2852 RobloxPlayerBeta.exe 2852 RobloxPlayerBeta.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 2852 RobloxPlayerBeta.exe 2852 RobloxPlayerBeta.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1088 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe 1088 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4312 mspaint.exe 2032 OpenWith.exe -
Suspicious use of UnmapMainImage 5 IoCs
pid Process 1848 RobloxPlayerBeta.exe 4224 RobloxPlayerBeta.exe 872 RobloxPlayerBeta.exe 4948 RobloxPlayerBeta.exe 2744 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1748 wrote to memory of 4160 1748 chrome.exe 95 PID 1748 wrote to memory of 4160 1748 chrome.exe 95 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 4184 1748 chrome.exe 96 PID 1748 wrote to memory of 1560 1748 chrome.exe 97 PID 1748 wrote to memory of 1560 1748 chrome.exe 97 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98 PID 1748 wrote to memory of 4776 1748 chrome.exe 98
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\New_Project_8.png1⤵PID:2544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffe855fab58,0x7ffe855fab68,0x7ffe855fab782⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:22⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2276 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4256 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4268 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4416 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4464 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4624 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2660 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4868 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4360 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2556 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5072 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3196 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5260 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5344 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5356 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5452 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3188 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=5136 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=5820 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=5996 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=4908 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=3824 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5496 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5528 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1424 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5348 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --mojo-platform-channel-handle=2640 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=5264 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5328 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4960 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --mojo-platform-channel-handle=4088 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --mojo-platform-channel-handle=5568 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --mojo-platform-channel-handle=5592 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --mojo-platform-channel-handle=5104 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5412 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5764 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3296 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2640 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5488 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:3004
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Executes dropped EXE
PID:3012 -
C:\Program Files (x86)\Microsoft\Temp\EU5BEE.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU5BEE.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Sets file execution options in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
PID:560 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4300
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5112 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4308
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3200
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3836
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7N0MwMkM3OUUtQzlFNS00NTc2LUFERkQtRkExREM0REY0NUZFfSIgdXNlcmlkPSJ7MTEyODNCNTQtODAwRS00RTI1LTk2MjctQTgxQjRCM0Y4N0NCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntBRDFDOEQ2Qi1BMkM0LTQ3RjUtQjNCNi1GOTJEN0M2RkZGOTZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-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⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:4176
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{7C02C79E-C9E5-4576-ADFD-FA1DC4DF45FE}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376
-
-
-
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe" -app -isInstallerLaunch3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1848
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --mojo-platform-channel-handle=5428 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --mojo-platform-channel-handle=4892 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:82⤵PID:2584
-
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:huFhOlE52GnWf7yBMfblnzwKX0NdG00tbeNaK-MMWWk8KJ8Sb8Q9N99xdvyEL1_jPGSaNyaI9yl5aNQ-LT61T7ZOrZOu5wsFlRd1av2NSt7UEMylnPwz17REse7xLLNG9bSmcyBX3OIJqUAKlril84ItdUZrgr8IS94Jafaf2YHoGPMX-PkqPvWPKTHT3X3uAKB_PXVM931uHSAakvoMC1Wuo9cUc1IlZlt5WlNq23k+launchtime:1713455226098+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1713455067558017%26placeId%3D6516141723%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3De2c0c180-a578-40c4-b50b-30a6c1101d98%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1713455067558017+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --mojo-platform-channel-handle=5064 --field-trial-handle=1968,i,14670360318188830659,2815447849654510282,131072 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:j1bhwDoDqJj-lfh21lQ_WW2fySolH5PU7AnqE6x68YKo-LPPru6ssHc__mhUdWlIUEDYDIdXN4ffmcl7TopwonJzNENfoRQlJeBl9lCRL6VooMCPbDBC8B96v9yZDZUyaVZ3G1csO5BGO092BvPHG6mFpah1cCIJX5HjYWZSpcWXBKwShHwKzT8TL3BDuSWfC3d_PW5OnARsFMFSlgFFdQ9AoRbKFG0vm3oupyR3TSM+launchtime:1713455226098+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1713455067558017%26placeId%3D6516141723%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3De2c0c180-a578-40c4-b50b-30a6c1101d98%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1713455067558017+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:872
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3404
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
PID:8 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7N0MwMkM3OUUtQzlFNS00NTc2LUFERkQtRkExREM0REY0NUZFfSIgdXNlcmlkPSJ7MTEyODNCNTQtODAwRS00RTI1LTk2MjctQTgxQjRCM0Y4N0NCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins4OTZFRDQwRi1BQkQ0LTREOTQtQTQzQS04QUMwMEExQzExMDl9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTEwLjAuNTQ4MS4xMDQiIG5leHR2ZXJzaW9uPSIxMTAuMC41NDgxLjEwNCIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9Ijg2NTU3MDE4NTIiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:2200
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{166BFB29-A0FB-4FCB-8EAC-504CE57F78F5}\MicrosoftEdge_X64_123.0.2420.97.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{166BFB29-A0FB-4FCB-8EAC-504CE57F78F5}\MicrosoftEdge_X64_123.0.2420.97.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:4464 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{166BFB29-A0FB-4FCB-8EAC-504CE57F78F5}\EDGEMITMP_02803.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{166BFB29-A0FB-4FCB-8EAC-504CE57F78F5}\EDGEMITMP_02803.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{166BFB29-A0FB-4FCB-8EAC-504CE57F78F5}\MicrosoftEdge_X64_123.0.2420.97.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2872 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{166BFB29-A0FB-4FCB-8EAC-504CE57F78F5}\EDGEMITMP_02803.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{166BFB29-A0FB-4FCB-8EAC-504CE57F78F5}\EDGEMITMP_02803.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=123.0.6312.123 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{166BFB29-A0FB-4FCB-8EAC-504CE57F78F5}\EDGEMITMP_02803.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=123.0.2420.97 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff6fb6abaf8,0x7ff6fb6abb04,0x7ff6fb6abb104⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:564
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7N0MwMkM3OUUtQzlFNS00NTc2LUFERkQtRkExREM0REY0NUZFfSIgdXNlcmlkPSJ7MTEyODNCNTQtODAwRS00RTI1LTk2MjctQTgxQjRCM0Y4N0NCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InszNDA2RjQ5Ri1FMTZCLTQ4MTQtOTk1RS1CRkIwOEQxQTQwRTV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMTIzLjAuMjQyMC45NyIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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_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-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-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:1364
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4500
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\C437rPSQNVzgjPbIKiUZsEqostl9FnPve5mDqEpa\Krampus\fuckkrampus.png" /ForceBootstrapPaint3D1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4312
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:1980
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2032
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\C437rPSQNVzgjPbIKiUZsEqostl9FnPve5mDqEpa\Krampus\readme.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4768
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4948
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2744
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:1088
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3016
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD531ddc9e1c11a44b88cf96c45b3551ffb
SHA1811ccb9706f656e29d089e30a2ee1650302394e2
SHA25646cb58faa60db59cb8d145bf6493f7c01a8ea8895f812d65512e3c7340a054da
SHA51267e5a4ec4b030e48ac06bdf79bfb2b9bfe7778f046a739f23b7be65e143a7181954c7587eb6841636a6e667aabfa292d6831bab709cd798d1de01987bc99aaf8
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\123.0.2420.97\MicrosoftEdge_X64_123.0.2420.97.exe
Filesize164.1MB
MD5300df46436ba5d076b227c32967ada91
SHA1de9d47ef0c61fb04b7309875e2f03c8fa37d19f4
SHA2561614eb0c2697d74f2a05f8c973b2055e9cc158d94b19105e3a9d450adc9e333b
SHA512ba3053085da062ec32f87aec43f527624248a81b702c8cdb359c0fba7194556658b49aca8ef98d885de5da5b9b2eab3f1fac2c99891f91949d1b9a155e4a6971
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
Filesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
Filesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
Filesize
24KB
MD5f6c1324070b6c4e2a8f8921652bfbdfa
SHA1988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf
SHA256986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717
SHA51263092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100
-
Filesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
Filesize
5.2MB
MD59a5054a082e2d341025a7cfab14be01e
SHA16f880fa9008dfbd65ceed2022744b94d9c42231f
SHA256324961104eeb40c40e6bd00278affe755c82d77189606280fffd37852db54c3f
SHA512cf24a5a3b79894b93b041b2b5e71f494cbdff4cc524267b81b46c86ca5b001e3bc9a57b724f46d0bdd3ecb0fb3ccf0168db978e5928422df7023f736548c15b7
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
Filesize1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
Filesize
280B
MD51c63c11da19c7e2921343087342676c5
SHA13a198ed0191769b5fc13b80f04c77c26ddbee920
SHA2560ee0c0000bf52864777c552c66fabfbf0cdbbf0b0d090a5c925d635514679211
SHA512fa0e68791dd2b4cac1ea04909caa7c556de49013ca1c32ef6b8690af6000f36487efc5353a7bb8b35ea85dd408dc971e9036df978e54bef9fc123170c8a47feb
-
Filesize
118KB
MD5b5397d452b629d37f4d4033a8c46a9c8
SHA17c1a5d8e2132beddcd9e63197c1fd345973fea07
SHA2567fe73b377749f2b2ca5aa3effbea93928a43ff4bcb68320e38971a94de07dd4e
SHA51278769ca96f4ac6ce58e9cb3191949332cc891eaa21f15ee6a2a320ec37af979458522ca7c04ee537a1811ac438f464d6116eb78f1c2fbcf88284781351ca03f4
-
Filesize
58KB
MD59b603992d96c764cbd57766940845236
SHA14f081f843a1ae0bbd5df265e00826af6c580cfe7
SHA256520408fec7c6d419184ec68ad3d3f35f452d83bd75546aa5d171ffc7fe72cb2b
SHA512abd88ee09909c116db1f424f2d1cbc0795dbc855fef81f0587d9a4e1a8d90de693fa72841259cf4a80e0e41d9f3e1f4bf3a78c4801264e3e9c7d9635bb79ccf5
-
Filesize
97KB
MD59026c1a039bfb1796b34eeb74a8a716a
SHA10fff9a37ca34aa4811e4e48f4022f1e3bb5f95d0
SHA2564a3b444e966106bf9551108f259d543858a36d28acd8d2dd2f38e522ec922cca
SHA51251704c92f1a4fdb55604faabae333157526fb93f3b669aeccdd04a9f728122cf81bc2c8ee0df2efa23661666a697e8f4daa491b25a64282aaf68a4420d341da8
-
Filesize
49KB
MD520980bab135f476d48a3f69148762f28
SHA175394cf4059ccf01a554278c554a5610dcb9b73e
SHA256e4219e58333dbb133997b1fa9b51e906b464190beb8d206f0f39f1db909f95f4
SHA512ab291427fb1da8b8e6b47018d18de6b9267bceec59fea507cae5c43203e4099530e3a17a12d6840a231f9f5b3539dcf5a480573d61ddea14450dd48ba4caaf6d
-
Filesize
51KB
MD5588ee33c26fe83cb97ca65e3c66b2e87
SHA1842429b803132c3e7827af42fe4dc7a66e736b37
SHA256bbc4044fe46acd7ab69d8a4e3db46e7e3ca713b05fa8ecb096ebe9e133bba760
SHA5126f7500b12fc7a9f57c00711af2bc8a7c62973f9a8e37012b88a0726d06063add02077420bc280e7163302d5f3a005ac8796aee97042c40954144d84c26adbd04
-
Filesize
5KB
MD55a1a18b43d7a6b0711784912e4021eae
SHA1f11d8b93fb9f8227c52736e342c8e1c5ab570cca
SHA256c0652a6aabb3fa085f178249c244b87c1e3c1049a39b6920491027cf3b7c3d25
SHA5124de5913532f05b665b5803c8573a32c51e6b0f95f972bb701d08e4d62b7e36c639c6fee67c2fe508f4f71cf25f3e7b12875941a6c7133f29c3c1cc2f2ec709af
-
Filesize
8KB
MD54e624784d3abe37904c9d6f10fa4f434
SHA1137a399e724d3aaeb5fdde9fe43d888275ebc220
SHA2560f614961c6d5612bfbf14c1ac45ab0492322c511e7fc1259285a850a2ee0fe75
SHA5124eaf378a4cb9c93546f2584310ce445d6c9e8bf7e884ada528968347583b9f98550ec51895e56c8c7e5952d639f0a897d39348ed2a0d26cc2ad97a669a38e7c2
-
Filesize
6KB
MD5ad6624689a7ab7242e0e0a1842dc652e
SHA1f2e3a0fd811c882ecf03ad350de99cc55072f095
SHA25664ae462bba19eb32700b62c730976bacaf765c83afa342baca2fc0cb12473a68
SHA512e80a96c932e30cfb95ab72c71223b0d56708bbaf7a9494939dcda3bd7b4a17844573ce1c161004adf8917fb125e9e1e7fc05b6eabc37d3e8f0eda1b715603577
-
Filesize
120B
MD55ee3cb4e4ec239a353959aa52a83d9d6
SHA131a1c4b0d19e89a65f0883f244a5643319c0d90e
SHA2568142f20b1fb7cf35dec4d1af70fbbffb044cc89647fdd55220a6fa04dfe07bb7
SHA512751486c6452aeb304d2fd281b3ff24c6ac1701d102c68761e0dd3771f7ebd3d3013fe05a1d89289a6b9f531c694ccb0f8020312005e77cdab6bc1160dfb595fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
1KB
MD5b955eb3f07dbc7d0360606f6f4f29859
SHA1fa54240153f2510456287d6c40f92fed2bf570e4
SHA25697594c4df4311e563a00330d2491a71a415c7a791ba9412660e31444e44aa47e
SHA512a2cc3ed8dafa6ecbf7683294f8a6e763aae6089391280044546cf4c4a696f129cf75dbf9183545d157eb0fac08832600d72712a44261d0c68b9471de1dab0c95
-
Filesize
6KB
MD57c6df5a93429cb2ca7ad4e03dfaa4939
SHA15f1c3d09fedfe3475459613345374fcd741142c8
SHA2565cd5c7771aa963f1f1c83bfc26d5e756b86fa85640b704bd7ee188f526924a74
SHA51288c4799a445e17a7d84dc32e17b38c3fd75411ec7350c3400b08fd855d3c3914ed2db5848c84dd41ba193aa9d11f1d6750153dfd492917cc0c3786d267e1b97c
-
Filesize
6KB
MD55dfb75a5a1903d818c10986ea205509e
SHA197c3d1e36dd41bc6a3848bf52b4b5bc1e6dd392a
SHA25646af81536d1819f1724b1b57e8bc0b13d87f5caac4ac1e518e6093b9a64715b9
SHA5124bcbb8c7021aa41464656a05879977b9419bf5d3f1b1c2d38f81a1a552bd0d7a019fc120a2c9d2a14fd3c983417b0be4334c026e3601e7c99bf14b86bac5879d
-
Filesize
8KB
MD5b11b01c23485661cea1a9752d36b3493
SHA1de418fb3d70d9d4d7080e411a6c3ab187226cc8f
SHA256377b2314db6e847fe0553c5d2b8aaa9a367331c706e5e0add1c3b0a9a95dcc60
SHA5123a6ba37a7d0dab408e62513cdd93b693a99fa55d401c0b169736251fcfbcd27a45fb02711510dc56db83ba25d7d7f198204f6bcf12dda6662b3701709eaf46cd
-
Filesize
5KB
MD5af62ba10711c9cca9d50fb826416f1ff
SHA1484cd8bec0daf3cef3d23186ded73ab8b7809269
SHA2566c171acfd2b0bac7a175d8830d9773644de5994b21fb79d47decf131e5a3a9c6
SHA5128a0c004ed70639303552945ad7a72c0a100e58d125281e5bfda453bcb81a466ecd8dddfade9f5f0046ce0913d4658edbc1742d6318cdbeb64bddbb77759984a8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD55b0613fdb6fe5f0cd996f3c51d21fcc5
SHA10fcc4c9ced95d478598254895d6cbe03c636ee63
SHA256b380e68257268fa251bc7cd2ba9b15474b93b52f04e5cb8b386774e09d04a28b
SHA5124e224a930f45fbf03f8c906ec9cb4a40c388bacc14a88489940efbed86f8fada8363ce067af2221c999b3b6334b74fe764316a4b1846c8992be6b9c10c3ed580
-
Filesize
6KB
MD5261697d3da3af3cf1700294ac84daa7f
SHA1545e6addf1f6f24a5811b9d633e387abea2ba6c9
SHA256c4821dc60898b26561bbc3e4213cb2d7a70f14a36b1c4eaffc9f6d9efa0d8809
SHA512241897c0c714582edf318399c6ff74aa4d61173223f0d0c343926da24929438983d7da6400104962e9460f25308d74c27efda90d481aebb924e97c7e304bb20e
-
Filesize
6KB
MD5ee5b0292c560e9716b72e229ab17e260
SHA123eba3988160b5eee1d9f90a387bdf7fc75fa354
SHA25663bc7a8765dcb3c43f77c63c3d6dbf47e1e4587ebc25974053b588455dda8d10
SHA5122d213b64c20833f878a89d48d258e7065aa0aa846fc229d549bf4385c2c58b7ca9d3c0f69431b46c6e3a19128380d1490c36923f8082caf1fea1c03d0f41c75d
-
Filesize
6KB
MD58913803f342c60ceecaff1259dd18bb0
SHA14cb58f9ac1b0ca3c6bda90dbeda244f2e92eaac9
SHA2563b06ab9189433d53a050ba731384e291b196a5542b59cd910462aa4c9922f236
SHA5122e0e75cf5b71bc8a628d0c466bba1beac1215e4d943981f32639dc03da7e27d2b54cb2fb26779290bad5ac900c94764ac3c8fc24d30cc4b07b75c8cc4887e241
-
Filesize
686B
MD56e6e520e7d438dc6ff1a18a7ad139f90
SHA12ecfafc74c07e2aa641cdd8b510567ac1a2bfff5
SHA2560a40428b3ac904654f9b0e137ba8b6ad1c304975a0db49809f8f2b4d6bffce4e
SHA51237589b8523551f0c1c61e2d66886c02121959d9679991319b4a4fea73293b4a82220ab95d95d7ba56b76b3edbc44460b074f51d8451a7822a651a9a6e4e5efb2
-
Filesize
6KB
MD52a23291d361e906dde6a20dc7a41df53
SHA14fe046759654647372ce20c1275deb492fb0c42f
SHA256cd9b0280b04f37c8d4bc03e1dc77c16a980e493f2557701970af13440db64fb5
SHA512c60872a812d46dad7cfb2dd00beb293a53a9211f74ba709e8466836b7d0f46f2bc71445e2b6def64cf75923d0ea9332059da5de97bd108ec6b0596cbc73f9f13
-
Filesize
6KB
MD50e587ee1fad4be1dcbf84f0649b9c43e
SHA15bed68cfc8cf170c3f76eafb05de00f8a48e5918
SHA256f6f8e7f3e587ecad67bda126ea5593e91ab9d803866323e69445833c68539fd1
SHA512a51cc4dd0b3ff559b01d5461e0fd40589859d2a5f4d014c7d53c0f98eff8a9b3c7c613757472f680ddfdd33e26b88a3312917ecaf2c8e9bc3ea539bd4d60c36d
-
Filesize
356B
MD522a734030702c3c7c5b8ba62ed532399
SHA1438e8ea102fcc3bfa849a3acbc7a6f38fb516550
SHA25670254d1d78c22f721675f5c5bd379c1876de16665b12d6f74fed729dfa6d0257
SHA512f301799f38b0b44688c43ba94d8e8c2c6ffd0b14d4f6ba4e9e3f6db800e11ef35012391d06ef4e74dd45acc9ed736a4dad2656042c082c138efebb01e6cbb1b5
-
Filesize
6KB
MD565a8bb3674d50172dc58865007eb3f1d
SHA1008c23936c656ad5ac28eb7a1dbc8d2f3670e730
SHA2568e3e17d640e614a80b6c793fa68da8233850eee3a38447c4300941476ba903db
SHA5121ee10646dae9abe193f8d4d7b87bb0caf8ea82cff382cf6462e2f1f82adad3452335ea0f87ea41f57a2f9e267fde3f8572631c17cd73ed3cdd85fa3d452283cb
-
Filesize
6KB
MD5c6aaff15c39cf19d40eb8839ca7f2dd0
SHA100db378def40d480c82fdfb480e0d3cf6b7b2b29
SHA2563bcd2a458027259f2bfd192db0a17c28dd0090d8240f0e42f42c99eeaa30b613
SHA5123e9092a6e842266417e49d508e1ad8fbff3a09f326b81f10f8bb8914323057be2b424672ccb3231f78687f44c8b7e02d370bf05f5cf43acd0422b6a74b5ace5a
-
Filesize
6KB
MD554041c28e6e15d80e87f00c1294c3100
SHA16f97c0e5a7b4623c61fbb08e9382dcbe2dcc015f
SHA2561c933d50ae3102a051b4fdea21204a58c410ef1f906dc64ffa93331daabd8996
SHA512c5ea025e64227b1bb04037b35655977df597020673be16f56376384f338a1874df2a6d584d9b79c4cbb6de7c3a617a0b76173e4fa747c03ae94de95ad3e1a386
-
Filesize
3KB
MD5f4f96d7d270879915d7ded85790bc571
SHA1eae79429717d4cbbcb93dd1412035cbadadec2d9
SHA256e65c5be57e5efbe36250794e9185b5efcf6d80c489fd8f5b0056a8fb4bdcaf31
SHA512b6c307ecd6f6d939c33865d5e69327d07843321c47a0838ac7df592795f660520e81bad1f2832b40e2dd5bd94ae1d29b81147f0a433d9f1dffc5c621bb735d3a
-
Filesize
6KB
MD5e9daa2c5089f390956cc5c050deaea0e
SHA16bf2d0595bccb09926c6a6ae5717f2f047d8d60c
SHA256b38f35e592add1375561ded7d413e9145e66f47feb29fad61158694d7d3f48bd
SHA5123f6eefd1503369001efe6640d964f16b1819cd71b40bcffb01166547643d12533d9337d9cb6841d3d55438f7cf56e2127207d6f3f4ecfc8bcf37c6eeff1b7d33
-
Filesize
6KB
MD52486b267d35e660c337c252a4f80169a
SHA15938683db116d3d02cf4e13f1f7ebd5b4edfb31c
SHA2564b0c30c5744babc15b6d167867f90a797492386198ceeac8075ed6e43b85d3fe
SHA512a2d2abe5c9cb0fff4da0d9483b630f84ab636f1f274d66fa496ee62c1316a5dc4b133d07f66a5581ebf6f13981d7eb13833768ac6cbb9cd8fb1b7755328dddae
-
Filesize
3KB
MD5ee8d3ecb8543da6ac0d17246e6b02c63
SHA1c7ab2615c423f1308aa6e63618fc3a841b5cddd0
SHA256f42922e47aa3ed981e0e910ce80645befa4fc26f17e8bd5510bdf1b0001de3a4
SHA51233bfb4f4f2e83b98ccc788b7744279c6dd6228aa1f14acbea2d6d280c7d75025aba1131d2d94bbed55a9f85c596732bd25e6a0911406f33063bfb67f232b1004
-
Filesize
852B
MD5ac13f86f314d0cd0d9b344f9ca2c263b
SHA1e6ba938fb17b38b52b7016b96c03f4aec5dcca9d
SHA2560d9e8bc45639fa78a20af08b5816c9fb05dd90364922e6c40b8c49a872a87330
SHA51214f31e07b14283b1a685b03bf91f859ed891004dcfcc074c2c9e8c47b5a3afadb78258d9f1d5186da55e795e5645325b703de63b9a5eb581f1e6ee1952504442
-
Filesize
2KB
MD5be183052834684109e3de363e4cc7e1b
SHA1b94e8661ec872a17aa6b641b574c65f16a93d0c0
SHA256bc0cff5a4e9869fb8088eb6272e8c20586b751e8549165199d3ae4bef9e8986d
SHA5124178ab49cd6d4fb39e4a46c9d5325bdb417e9079696ce93c41389c116eb5addc95ae78966c1d14cd5f20dbb0f03a1c5d6df837e80f3be32f5ad9b7166244c048
-
Filesize
3KB
MD588000aebfd449bd6db6d89a568c1e8d4
SHA1c757c95a087d8842991143d5fc679fd4e75f8f22
SHA25614fb918d4e0e0e8f7f43d1281cea3eb3a04a5180718ae0128802f1d11c006366
SHA5122a932d1383b39ac574688d80f1f78b59604ffb565f66ab932965219718aab151e578fc62b97fd196033442bfb25d22938f226ee8ccb2e1a29176ee6b37f7a544
-
Filesize
3KB
MD54122a7bd34633ff750229dca0a1006a3
SHA1924524b527a34a88c5d97a4fce60b65914753ea6
SHA2569ccf5e87be0889158ee2baa43fa9affa8cda13c6dbba123aaca01b32ca3b7719
SHA512a5f8f2739168e4cd3ecd3134d388ce1f600ce773c52c12a370c0b7faa7fa35c4b3c177d7623fb1b2bc2a380629ac0969bc098b3161376c8faebf142ce69a7fac
-
Filesize
3KB
MD5832587907355e2b93fad5867f689fd89
SHA12f0aeeba11f17419a366413449e29b7b49c3b9a6
SHA2565cd5eef23411cc1fff86b18a9166f0a29ede47846f32b5d1969d1872d7f06be7
SHA51251eff41eebae47b3b95038d2929b30298fa53bcc72c40076c5648539b2443e889f7d2bf0f7f8c79bb5d727484bd470d8eebc18a43088f52c2aa49f8a0a2dcc07
-
Filesize
6KB
MD5bd4b76bcdd6df4360c95aace0901d7b7
SHA1a494677570a5369b81a659710f2e2cfc70f4d8eb
SHA2560ee40c99f66694a0f73dcd9148a980084f23e01b2b4fa92d905e933a50b7bec7
SHA5129fcecddc29f765c4496ce12dc006d6a23dc113798d91396aa7e422b67db027686595cb78f7af4a150d82d21bfa94d9abb25a52f6b9a2df75e135aa0b76c44081
-
Filesize
6KB
MD554387d6c73b4f89f18fb1bb777841e14
SHA1f3e47ede03392ae12dab806ef0f8679f40d0537c
SHA25642801a1a9e78c17903e2702ebb4f1cbe3ff1e8db1c3a43f5538ca252fe17ad05
SHA51206387061682fe75cac3850dc550939a09065c5ea0e1b89f42a81d9fada7d73dd55d74f27c414b97acd1e392b1c325763a4fdf10c287a82de0b13d0048a2464e0
-
Filesize
6KB
MD5969dfeeaf9a8c4a794a9527d7f5bfcd8
SHA10c398774b6e65a29580b86cc180359519b1cb4b8
SHA256a3798f966e42d139c48a5b7481eac34ead37c2f863c463e08d65dd120278f164
SHA512681a930389d56d4b9343e8c8fd2b3de3c962595833126988367aeae0063d31348b89df88f8c05560c6ba0e312b4bdf3b2873cd53ef7ea9d5ffaf06dbd77f883e
-
Filesize
6KB
MD53568108398f9f2cb9dc4ce7330cecb48
SHA18d83525d4366c1197baec874a560b3ff65c9b6bf
SHA25615b2cd61ad7160f2f200ee3da6c5e6e586f936143f71830fbacf97772d77236b
SHA512b292e312e91b358f0468621b22cb08cead0bc522df8dc50743f5b66128fa65be1b8d7dfbf0171fc884601f8b635ba2def4a9abcd90334b91212ec30836d3f841
-
Filesize
6KB
MD5c5a3e156c09cf83f40250e75830cdd14
SHA170270b9df910659c91379e0ab0a9a7b90fe8d184
SHA2569b5d76baf3ea86b87428823acc07cf02c1d9a57d6ad7b14a2551aca0f6999aac
SHA51217a505c93377bbc133349c2cb22f16e0d137c3b89a171ee6732ff5e9bb9da22cd8c7a18031acf04daf85cf0fc19a6da0a3ba14ab6ecf8ddc6973fa5eb131ddfb
-
Filesize
6KB
MD56abf2ecc98a5c3d0739ab6fb0072daec
SHA102e7589d7d4b188b202301d21116173e368b1853
SHA25647ddfe897b7ba6db43ef782b557128c2ac39c7eb85765e419af867e95e4c3da3
SHA5120f726ef1c918d1492445e6545069e96b3cf2102aff0f14a39464c32e1ef4974384b016de2d2a7404ac1ae16b5a903096c797e29c1395b5821da46f131415e80a
-
Filesize
6KB
MD5d015c641ace6c91e6dcba4b66462cff2
SHA1904dff7c78b5d73a1487ba385ae22a87dd9e347e
SHA256ba398b8d428b666dea2d0b67259f52768c5c1aed6606029288eabf0200b8431d
SHA51275a20a5aa956783eeca8c323ff5ef96a2db988db2f886f532bc3212cb879f67696624bba9f1b2c8006d7f6254a951bf880eb97ee80a7956cb8f07fc4a7ff2f28
-
Filesize
6KB
MD509fa2966de1bdacb38900690e8d694ed
SHA1e6257798cea82739a5664f0e93661344869615d7
SHA256e241c00e886c020050087cd6870974c9d1b731e791f695a76b68a0769c7835ac
SHA51219c45bd1efafb33f0cfdf493c2c27cd83f117c969e36aade42c09bea00d9f775d92a7042a1f319e3f24d39db6edfaece4fd19afcab25270a9ce9e2fca7413d21
-
Filesize
6KB
MD55f7ca52fd0f55a66b33a02ddcc9387ac
SHA1cee5fea8db2b2a60f799eacb968975d8aa91b4f6
SHA256a827c0ea224aa7c74c800527e1ab8ceda3d1c2b752433363276b55a085ce7ea2
SHA5127d6638c11cdc64d10d760e826add6620ce240b61fbd2f2c7777879d7bd58f796fe4ffa938eb8754c0cdb3660de139176b05b3664e45d9e81a7822b8e0a322505
-
Filesize
6KB
MD5b9c26d7884e008f67cb8868263f8b965
SHA110672974d3a86e1a91ca5b5a5c04a10569609820
SHA256267be8ed3c7d3fad47bdbef4ea00ca7eb06137f773b8421934168a5eeece1f08
SHA5127101678df1bb348eba14dce4070d486fccc16203139fd157b63e6ced3550012d36493ff1602810f7a01953a135b6483a31c62740a9e00bdfbe1af0057ca3ce40
-
Filesize
6KB
MD583894c1629a510700c92fe390b5c1c50
SHA1818ff4f64da12c566e126f28a2da9287a8f918a0
SHA2561aac5452794afcc05112608cde559b4524e44adb66881d6af6ae033632fbf7b1
SHA5122f4780d3fd6e03b27ecaee073b020446385ff19d4785fff3393b942f4d8c5a6987de16b6d3aa6444daacb7bd220a9eb86f2031515cd1937c96c9526064f7ca96
-
Filesize
3KB
MD5f1d78bd1e86a50f7afe7c68166d42988
SHA140923f964666e7397b93a815ea36f941d16c1fd0
SHA256e8fcc390ecb608cfc2bf0ee11e1d40049653c40dc5a33b90756576d23bb5ce47
SHA512f91a276da379dcfd51043a377bd5035bf47f4165799a919def608514432bc008b35b5fdaaed430e88c29a2facd00f6d7d028c3bfe14e1ec1edeb372713a031e4
-
Filesize
6KB
MD555c9bdc916d5fbd13516ac49f5ecfd8c
SHA1d46da1093690a4d11a8b09d5992cf04ccb1fa8d6
SHA2569e700a615397263acca38446f552ecd48f5b1598c83fb646a58808655cfe3caf
SHA512121a98cec144e3730c000c81fcb7622642fdaba07747742ba000f51416c3b77aba8370ca983e890ef81a944c0743807cf6d7b85b2d3546317875bdb0c5e0c392
-
Filesize
6KB
MD5d71fc7645a8ec3cd01c89f44f417840b
SHA15730ada831e5ab43c57b60dedd36c7d3d327ea01
SHA25603709f97d9e90f21fd6de17d65028fcacb183817fe08a829eb5afa6189e5a57e
SHA512e978d473f4892b2c1f8178c31419504ce8d2ed12c51f037f870653d23ca44d51e8c8162df0fe6b88f4cb35789dc16e4b8542a4e0f742614f8a499b70f61cba74
-
Filesize
6KB
MD5c419e482b2e2e1c7226b801df6eaec7b
SHA1b4fec4f2830a54da775cab4f13b0401126c738ac
SHA256d9f2c28920869b5fe308f7ccdb568ad57da79861c5827f34f984a69edb3e2284
SHA512c40ec4533763405b17869c1e2f5200bc2d812a213b96c1e68ef42d3f4d979bab67410728210c1248b2826504f3995b6528e38dbb43f2929994ab09d2a2048ae3
-
Filesize
6KB
MD5ae13a8a166bb070c60001bea552085ea
SHA1b02e50fe9dbd39f8d6da9840fd8f7533068fe166
SHA25677bc78c17368e1849c83d028c031f642785df5f325dd330ccc39bb205ced6b32
SHA512f5ce516eeaa1c3ed757768c8ce39e026943cbe1a596871a7ea2cab10d87e78659b9495fd5cd568775b88ab49b7494b8dffa789f55c173cad8bae51dfd4586408
-
Filesize
6KB
MD5784e118fc8de344c706ccd3ea4d38fd9
SHA117aa11402468656a0fea7d5e4235a315be5a0eba
SHA256cdcad2c6ffd34f7b5015b960d4a44992e5cb1a243989cd21a5fa2c4e59df97c3
SHA512cadca3a4bc2a49edbc9ca7191dac3b2d54214aac259f727feccbf7b25ac11c2826a5138a6d696d0eeafe3041a4509813092c0d08049d1524f05625d53c8e1271
-
Filesize
6KB
MD5d2f34672c125e23de14a63679df464fe
SHA1c5b32aa0947a55cb6c5c978cae47597804a0465a
SHA25655da926ed564f10d1d5ba5ac06e01f1d8abbf2449af0f34233e7b4215fdb87d1
SHA512d6810ee473d2a31c05412f4cdf906263c5a9467bd88a9e91b5eef7d78b13fb28221e63299209b1dcd93e91f0851c89d76226b8ff7bbcd335e813efa721cb9198
-
Filesize
6KB
MD595df81484367c9d4c54f55803a52d0c4
SHA1283717ab868deb06a494e8657be3e604466e0946
SHA256ca3d4ac4232bb06161ad1c64a24487f54ee5622eaaef065dc59aad7575abe767
SHA51236b4e6071fb7323e7ddcdff6618c68e22f7932b2152dd824bcfb1b7cfe0cc18bcc6d7d953ad913defa09f8325144e0b29275f9b3fee5b805cb6e391c4704e822
-
Filesize
6KB
MD5ba2a8b60384109e332ce24802dfd885a
SHA1c9354dc90e6124ae34e48c283cb996da4e835db1
SHA25651414799f06eba1f82dfe3ff077aac13104b528388b22b05d3af7abb029ba515
SHA512b337e090baadf6050f19ad5b9afc4242f3229492d879dbabfa22a7519e63506bddec4599bf654d715d6e1d9b34c459017f32521338ecd75d20a69a5755e88485
-
Filesize
6KB
MD58c97f77fe7f49cae33780156a7ec3f63
SHA15fcf5c5c39aeb11e058497fc8584c43cdacf850e
SHA256ecb717133e9d2999b9e2f4361a930e222c7a6f6e5b8f86a7431eb3a1d6ab7c9e
SHA51277ec07d4c8e996c7efa6d46028d0e7939a5960ece2bb966ad10b4fb0a9a22c0c06235fd352304282b2f012e4d72346d6d449ce005d85a8f9be615fc80cf1208c
-
Filesize
3KB
MD5432e67b78cae90949c0d9fac34c6aca0
SHA19625593a922dd90c5f78ebcf6fca1da8b5f2e4a4
SHA256aefc2968c680b2d475cb406d356992b3f5eb5dd2c61988cfbc33d0a3785d5a0c
SHA512e27596e17645bdc0bad75b4d0794ab47aa2683b243608bff466751e08b0bc57edfccd7b317363b61ede29ea83ca47a0ba4d831b74ff757c4f73ce5bb82df194a
-
Filesize
6KB
MD5489229f1f1a6cda4196a3a45463f3e3b
SHA1f393198eda3a45a8a0900a78f3898252bd0c5c6f
SHA256e432972fab0d7691aeead6a78f2634ae4994fdab45dafe3ebc8926a75913db87
SHA512a3bdef8a66843d763cdc889f2aeb6cb8f9264be8be6ddcfb662f9c3e8944daad86129abe418d78e4c980e364004ba16a38be2f25305a3489107850cc966a5cb5
-
Filesize
6KB
MD5d93ccd83868ab3b9fe99d33557975d15
SHA14b4564695e67044d2e69c26e31d7829dbc04f96f
SHA25609a705a53c4ea766753801edfcee411227343812304508e8c801399db65f2a1c
SHA5121f1fa4d61dea7a2aff67507457ea206caab2c330c3374c7a4dc43e8be01cad25bf87479ec4fe9da3889faf7af5fe42b6456350280fd764dd6e4956848e33bd24
-
Filesize
6KB
MD55d323addd68c682bf511507a8ffe802a
SHA10359950477ac180c84ac22bc62e901ba860bacc4
SHA256ded9ff23c98f6074b0c3857be332e553d7897d141181ed8185e44e38de14a0e5
SHA512d5c963e273c48a6802a38204f7164c72c43f7a735b2ab95285d8b8f9363c49e0dfd9b496203b9e17634a7b92c3070686718391e7bfe947f4ec9bf39f257588c1
-
Filesize
6KB
MD5fea4aa5b099ed583f509787da09bda82
SHA14a93188a90cb603fcaefb053d0fd5a74d7837f44
SHA256206e189929e6719d68d244d21bc9c0c40d3078584b39afa2865a0155f497a66c
SHA512ce2a2e6ee6a0151f4b434136be16514ef9525d381fb4ffe296c0649440ba77327f94947af3836673058aa5248d04acc783a90fd76d8eaa8e701ad06e631f9aff
-
Filesize
6KB
MD5271819ff7928ee5573358735067f0b1b
SHA19e43465866169031579126a22ad34ce8bcad25ad
SHA256232f3b231fe70c176e3a0204a73f5d3ca5d638d222c72176a21c445fe650225a
SHA512555c021f6f7be4d8bc9e26ff4a9f94ba86a3648e2e0c64c8ce21fd40e5a368ecad3119f2b7cbbd92527a4769974dde38f2035301b76876721b14f780b295345d
-
Filesize
6KB
MD58e832fe8b0966e5a4e8dc691e8478fc5
SHA1aff877b0ef6acfd00f286d6fdb0c9f0dad99d0a3
SHA256d8728a5106fcc13424e2af325d4089feef27f815f0d59b88ea240e1d822bde09
SHA5124435029fb9f81c357162990ef2a41a48b1c5afca47b1c92e350e6dc8991a9dafbaebc7e2500d86703ec62addebebbcc3295b5f50ba3bcceb0caea470ba215e4a
-
Filesize
6KB
MD5226b05d1c290ff873df19567f4e6dbfb
SHA158d95eff77262eb1ec0c41e85ca6dcb771b3759a
SHA25678fd91acd8b29af952102eb5a228c8839e22219c385a91d1fbb18ebf380db2f0
SHA5123b1320840a1bf03971a5f07ec255054042f9ed6bbab847c62ab79d37e9e8d0617c784bfd54f784ea6cb984961c0f89836900b227ea247aea75e8b2bed7a4f53d
-
Filesize
6KB
MD512891285629688f0f9cb939a53de84cc
SHA175def8de47406f56d6d6597a725cc3aa394d519d
SHA256c731b7a02a3d8b29473167a2cc41bcc20833822bcea3330d5e74f1e70a426292
SHA51298bc850ec9e09311d4b989170f68fbf3b2781f7e823a4b23c001956267c1006b4386563efcb0817e408443d80710fa0e0aca46b78333b326ce56702661aa401b
-
Filesize
6KB
MD524b58081240affbe32019063d1dbfe84
SHA1180dd7b730a0524088a1460f70795fcb9d142d4d
SHA2565a9a71281a485959b4af5e81fa3a8d02a080cd2603821af39e180d8d548d1e77
SHA51221b8bbcdb40050a4106913ea5a9fe79f7f4f5f0aa7bb63b8d3ec8ed1467ecf9d33b0e48fd7d0dbb66fb3ccee65c8701ce663ba5a416286a8d346424f6decaa2e
-
Filesize
6KB
MD5e60b8821c82cd333067251ec8c71ab4a
SHA187dc359ae40eec4eabb44d4281b82e37f398dc5c
SHA256e0491d72de14c08055a05d70aeef6665c85175ad1ba4e739f5c740079e9e49ba
SHA512fa9cc2555518a8febbecb4a49732b656f442c09aa98e5d5afec9fbd990c26f9e7782acc72eede3073ed4d99991c44e02f488272afd6640004192622cb57307cd
-
Filesize
3KB
MD56e6a17c3b9231afe748d62e96c1b53fb
SHA11038c66e621b9c760b79e5e79106908f84d4d1e0
SHA25602896ecea9bda3ad91385e0242adf1bb253fda76edb143b545c1a3e029189c58
SHA512a5f57c9a10b3eb81df4b36f81ca57ca163eec7b7bfad779b571f073be9f6d6f488c6c434dd879613bf3a063b916416047763813e61e6684d7682bcab9b4e5be0
-
Filesize
6KB
MD5cd32f223d85d4a820d0a6451fa46bd2e
SHA170dd8a60809afc3e831215743ba7db779664aecd
SHA25679b5c3032594f1d17aa8c059a61a472e5b225b5b4f1c0140703cfcce624bcb99
SHA51244296e32e81a3cdb15d4911e8484da3181be2b1dcbcbd6ccc4cb0a38bd548669000015eae5bde2f4f4f714597a28a91cc45771a133cc24d47dde718de81e3ec5
-
Filesize
6KB
MD521ae80e05cc3d7690663e8d8e0831043
SHA19730b824aec8443d031a18629714b14cb623cddb
SHA2560ac8ea0443a0e3a30397eba886ebe43226d6097a1590fada15cdd54432be1f63
SHA51293cb79c1681ea67c4b1c5e39604dcdafd86b2280b147394505879b94e54f584ac53f76450fd10d1653996287bfca11d46884f90e45175b56515a329ec161d230
-
Filesize
6KB
MD549f97a370a118400f2bbcac0c64847ed
SHA14296c07a7b7cf46c33671a03c5bd4ad13f322a32
SHA256837d014436e61fc56e4838348fb603b8ebebfe45e3d2da31921ff5e4c9ebb084
SHA512e059188dc76f5b806e765a458e9f0aef76a2f3116b47ea0658ff371b3ba489c3501da8b9f62e74a75d94f65e3073b9e48fc7f6ef933eb36ead9ae7024c49c293
-
Filesize
6KB
MD5c5f2eddebf3169f9d8cf34d5f897bbf2
SHA1f9c85e38c09e0bf49f6d8a924411779d95a5cf79
SHA256a9c90061d775b46e6510f778ad862118d76d9bd3e78c6d728f2c87d6fc3aba91
SHA512248a541f139f239ab378c62afacee0d97d1fde4304771611ce384b209aac16194f6aa3fe042917b1df1c099626fbe7e62b17458d5c711ba503aa2900eebd8242
-
Filesize
6KB
MD5d2b8344ff50daeb0b6c98786935945cb
SHA18081eb9fc3eae1cfc7c2d628e59576019da6c8ad
SHA256f4adff041f36798de5e986214db7888f553d395c9571ee1d821fb3096c2c5457
SHA5127e3887e8719c6eb3a12a626f8aa1b9d66f86beec5c561debeafcfdfaa52f164de96a3402dede40274f21e56ec8cb7c10a870563cbfaea9bff04721a8f9614320
-
Filesize
6KB
MD50c52e85bf553ff5a176928f15aa4ba3e
SHA18828514763850d96c4645997a1870235d54a9daa
SHA256e3012073f4d112521d9dfd84f43e951aaf088b8917c6038a9ab853e046b89193
SHA51267cf3e936bbbd9dd0be0195cdad62c79a8f60f02aee38c63b96f58902892e852a04289da0056bf6f49dfacdf8bf9ac04be1356752a69c74612875782b9e39b5f
-
Filesize
6KB
MD5614813443b14a8fd2c38fe5d86d5868c
SHA1eb895e34688329588abf95d14801e1d734e6b524
SHA25671ce8e55f9d1b7fcd83301dd6bfb690c72faa19fb97272caef073bbb38e2fd36
SHA512f9547aad9f34c9ec29b38e95a318db13b015eedcfab10342238982d51687b14a5775fa3e533c2046d38a5fdf4351ace4f0296eb4d7dc857bf5d46136b3004ddd
-
Filesize
523B
MD5ef58a738f5fd8e522b4b2dc704575823
SHA103a4328827523133857ce447538fb12af9eac548
SHA256bd995523bb3e9ccaa16d4f7783235b8bd9dcea553ec5be6ce8389e5fe0e4917e
SHA512b8c91e153d3cd7b6feb8cfdea2fe681c11f3a64a9da05427cee2509a42ef6204dd9c7236006d1fed046c13ba3a28006d8807576e707c13022642e07b59526072
-
Filesize
6KB
MD552a141831a1b87c97cee211a9d08f0e8
SHA1768cd5f866682f16fa4f340d24a87d4f940985be
SHA2565dfcfc15c25b7c033bed12bebb59bc325982d85a52131b07ed345aef8b513c65
SHA512a7e2d0d0b399da00b98d706bc5828d10d09d3fcdb0d9b83502cc6ca00cd38514436443a1fc02c5d494becdec66eaf2dbd47b5e6e4e9487a22a6948de6764974a
-
Filesize
6KB
MD5ec63519cc839363894edcf6309cb353b
SHA1e693b7aaf66df6444417f20717f9fcc70f2ec657
SHA2566a2aed878a102b23406185c7213f1f2a3b5f841460682034e6725de74d161093
SHA5122b898eb260742d87d730005f5fdc48eb2e54dd3659ce9a1d3237cd7d5aca47cc1184c732aea74261ea50f553d854c3b9aed9508ec00a65a240792110ad71e91e
-
Filesize
6KB
MD57d770a7d954500d6e4a1f4d1fa9b4643
SHA11993634c3635314642d96e14e22776ca1d1020ce
SHA256a97ca21d292d4c6d18285b4b0eca70a61496cdb455be2598138c9fe430ba8c02
SHA512e89681e6878aff633d31721e115a1e8ce022ee287117fce729fa3bf593cdb83d88509040bb61bf3ac87aa59f9e3dd325275918b2a32c7a2b8ac6de55c4de493d
-
Filesize
6KB
MD56a953ac623c4a0946730373ee3229570
SHA143925c79797aaa53b7a1bf2aba9e3fc616fdb826
SHA2568fe516a075bc488dc0fcb5665de378eb642a8a180f428c86fb86fed2d15dcae8
SHA512ff08e63e9db98b190cfff52a8fac7993627f621151599f5a0e5d27581a37950116619f2688722313187c8315d3f27e4d1bb05784b54d0c216954f7dd0380c6e1
-
Filesize
6KB
MD5541eee6e2554a2809f58a1786e63f5a5
SHA1f23e293a8836ab51115d7295e79df42f9ffb1e19
SHA2568185a3c3d8f54949183c71005efe2c7126deae14936dd555e8a7f66f70f51c6c
SHA5121e0dd998fa87001e570256197ab27d6af0c5acdbff7ce5ccf81f37178a68afa332f478f806c0ff5039a4b21d710d8ca07eaf1460d7fb1a647aeacd6030747dfe
-
Filesize
6KB
MD5eab09079b630a79f844b7b894a5eedea
SHA1c85fcc93bf73176a34346b84f55b0bcbcaeb397a
SHA256b083c00337f59f79c805c0c9df9cf81e316da503b8c3304dd23bf79f2bad2a1e
SHA51253f9a7e227fb8e833c41d225f547ba6442ff1784d6237c77f43f16af909757fc2478dc23e6d1328f22513afc0b89e642e35d178c36bd1a4c9f8afbfa2d87036e
-
Filesize
7KB
MD54d3647bb521b5e8ab4eda30453747397
SHA151330575bba95d687a88d652001e92d3395f1326
SHA2562a29bc746928159768686dd8971899d5298e164fe4d4658b6d94f2a0ef1838d8
SHA51251769ef9371f5ddb23802a4d50262ffd956f07eff2db8cf3e8bb255cbdc5bfbb653c8dda2bca23004011d42402ccbd2d28dc32f48f97c4e3c66d3c86cbd74a7f
-
Filesize
6KB
MD523f1751b206d9fc6fcbc500f03b87703
SHA10e90ef8040554b5aa61e48dcde059977c970f630
SHA256cf5bf138a83f227507a6c4598f07d3f06c9ea0bee2f79f6bf33bfcd212abeefc
SHA512ace06375817eb91d48844faeca1eb5ebf5362f9df30b37727f01d709e798959add11648a91fe0e65a498ad9ef6b4ec3755b7622c8b946f40ec52d27c703bdf45
-
Filesize
7KB
MD5213e2775d6645c5214c228374e7564d5
SHA1ece0ec214c27277064f28f68faae92f185198a5a
SHA256a5469a02098ce119d5aad5e293faa68c843e950a436573bcf4e924f65332661e
SHA5128d053a306b1b45849e1afbe6141cf056c1ce59d8ccfc3c5df1fec7c529f88262a59a9d982b43f87c2f719b68c69690153c85b752bbe8ca2d9c349abacb86c4b1
-
Filesize
7KB
MD5430aa90a57bbe03c60c5d4c32ae110e4
SHA1d768c1c4be828410d0a633d05012c5d3662ba7d9
SHA256ae298243816559320f58b0227b67053cc5c20035c71eb310bb9fe48e397d4143
SHA512fab723ff2dda998837b3c819f9da63aa9da172f088895a5b6e6d2c2212fca5b7f4fedbd3b1eb3febe16d8c2e7de0330421fbf16a8b9d89bd9ad8924bcd5f200f
-
Filesize
8KB
MD5c68da7d7674c7b9527758e9bea827256
SHA1349ec44cab37251d8fb693fb028cce98eaa38f99
SHA256052183a2a0e412c6da34b2c5c9206d7909731159d55da57f2717faaef2e31ea1
SHA5122f00023bfaef602907ef76542cb267817f228de140a1d9b30436b01f2c06c87ea1afd4e4045c3f2373e62f8ce700be7320b21e5eae0befdd1ed6e24a36aeb34a
-
Filesize
8KB
MD55801c2f7e238c4d5d7b80dda704cd2c4
SHA157893b8c2c39516d0b9d3706bac3d6407220382d
SHA256094e330b17156dcbd676c10f45b96f4ca3e8a77eddee5f4fe93f99986dcb7338
SHA51235857038222adbf62e92e1220b8b504f03788167916ddc39e68359af54e8d672494c90e25a97d1ba903bf810de3cef8b0dd734b864b06a188c11746b81139bdc
-
Filesize
8KB
MD546be0960cd7bd47f9060efd98a672172
SHA13c6246c0e8ed629431d5ceaa3081776f2611aa07
SHA25663a71134ba2dcb1f2fe20333fac71885b49b872b04bc36f71f8acd7b8aec69ee
SHA5122594ed6cdc7d8ba848f6baecba0a217cf9d176c5b5998d21d1e31a09707f2e15b472b69f853e954263ff6b3a825dea80ebdf9ad2a0fae6f84617f6703451b9ff
-
Filesize
8KB
MD505965df7591cc14e5b8ff8b7f9d646f9
SHA1a461a0af3819d54f55a5699d0c77701e4b331977
SHA25618bbcec87be64174339d66e7e975c0ac566bd44d24744f5d2d1eb3c7d919f233
SHA512e6f4d62d3118f4e11db383bdf3407f9ce9e351655e5589e79a4a02dcfe6e96e704a099be8da61f0c56f3c68bb655bbeaff4a1f8ecb0903e6c5dde149c045d017
-
Filesize
9KB
MD5b9457ada827059d7f2a8fa10e1496a25
SHA114b1c579b0c361eb87e0ea6b2179bf8c20f024a5
SHA256080c5873f50cbde955ddf51d0726db7228f97ee470d909d0eefbcc19a573de43
SHA5128e39ee2035acf2108699e2a2010e50f249d7db3191e33dc802cc4fe4559eaab77fb073e368222e03f7730403992f6b113ac722c4129b003098742742ac0a9240
-
Filesize
8KB
MD50fc3bdffc088e719eb846f37c133b4d0
SHA1a205d6b8e8df36673c0f0f189b5caa9697756bef
SHA256920b18ae2550ad614c8225256414812449d23c95fdadf0d1785fbea752943641
SHA5125c4a5832696321970f2b0da2da18e4b26baf8fe1ab5ee3abb144d70d04e618e545f355de783a6bb6c6137fd2d4822503336cb62d8e8e72c809f72d7345ea7843
-
Filesize
16KB
MD5c46c38dc2ac7dfe1b8c196ff815a700b
SHA10a14c7056a0093cd86a756007be22f753e05ccc9
SHA256076b92969f412a32f35a815a86aecfde4db1a4cdbfe2dc0a43ca414a2f0eb801
SHA512a4817d35f5b217674eec72710dbd15be115a9b2a1ca250d3af06f507f9763dab06b5716ab756f14bbe9ac69c4e80f69a482712511455cac5ef3bb1d37055c8f7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt.tmp
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5a0d11.TMP
Filesize120B
MD54a853ecf8bdc77829ce1a3490f567bac
SHA106e0e1e37bddc6cac0440eff41f303e6ea21242f
SHA256c5aabc42e8afb34d42af707fab687daf7a2bcefb41befdb5ad30b6b89f4417b0
SHA512225c5b1c61e5957e3ca0be250a585396d0e88932f0e54a6303b573c5b0b9ee3080fbfe873af5c72f24007afec65edb9ed403f86fe52c2454d30b91fe06c8722b
-
Filesize
252KB
MD59dcbd89bb1a54a3899804df681354f11
SHA1afa71be6a1280380cf2b14440528ffbd3e960a98
SHA256117b34ad852ff78aa7b6a37c62baacf430f1ab0455266c0b835502a46fe947dc
SHA5128b0b1c1ed5d9667428b50526db29121e1d996cb00a5df28cb380a713da8ded0e4ff1ce74e43ec14ad6dd523d7f7caa40d267d05c8b04f68b1c67fd78050a257b
-
Filesize
252KB
MD509f87b7faed92da2973f9c82f8da2c5e
SHA14c62e6b22a19c04ff6a17bfffc688fc3a1bb731b
SHA25639b9c79d35c05b620e4e556bd61e7a8da455f376be561331e1c2a442eca411c0
SHA512a7165b5cbfe2387816da209c5fc29b2c326c0d2e2f389a5d813144416616b5365adcbb1cf768442ddb2ab5395b6fa2807ba2f9c20364b769e521291bab95a9ab
-
Filesize
252KB
MD5a68918a07a4ed1749c195d114eeeafc7
SHA1a29735640c6c6cb0f3a32b4f09ac54e41f53ee29
SHA256d8ebb9ae7e9ab5e794e5e93f7dc81fa13192208502edf9139c08b48d8db186c0
SHA5126e26f5d9ead85e13391002a0d18ac2a3f837402c18a5687fa30b9f7940a5708bbdb4ac0122e1beed0e4f0f980498eba91c41463b10b19481ab3bdf70aebeb84e
-
Filesize
94KB
MD572b9ed7f013835c1225b9e5bdb4b92e1
SHA10aef0a0f1ca718170e4baa93f0f946b6a0ba18ef
SHA256ad075fb668beb22fb4fca440d85aee027bd51f8385c5b1bc87830a9dcd843f47
SHA512fcc641a09a3471dd905aa0f722f0722d63354a1c9dd736a61b57126d6f595766ed55acce6746a2d425f0edc6a99cb65a13c0e5f29bc55c1ff29d0304aaf278cd
-
Filesize
94KB
MD5edebfb351e00785d0c9467f4db3c2360
SHA1b4075a6be574b5fbf43947d3e985e0e2add19fb8
SHA256aeb3264419c3b9cf83af259218b10eef5c544065609b6519bdd4ce159becdbdc
SHA51250969100fb374d5f668d130b72054f4cedab0190eaafeacf76b480a60c4fcbef18e969c4dd6481e9d94890969f316980098a65d6d1e6b1b5da23b3996b0cc7fa
-
Filesize
96KB
MD56ef90d1b42df975a6b5d45bf24c67e90
SHA1c6583035ffa510b9d23939b6d0212e5fe197a19a
SHA256d1b80cf696955432403d39c6b07fa0b11fdb48064ae3b0d8ff362a55f628761b
SHA51202195633d4f75ada96415a763cc66529e3aa33de9a4161481944b68940d706ab1564a9df191a116befd2d8b22fd002a6a4b913e5df7e22e37943fce1d56b8816
-
Filesize
102KB
MD506b9a24230430799ce3757e192ea5f97
SHA110b001c0d9d082fe55a94594d32cb0c4d6772f05
SHA256531b098463eaf5935ef513bf234e2060c9b0757d2aa503d0103907195ea1a3b6
SHA512352434d9f49b01b168c39d9b61918f537188ceca51255046e4594b9af69b77bb29ebeba4bcfc0347b4e21cfa6da7c0cf6683e109758a729e18efca0c7bb16b3d
-
Filesize
105KB
MD56c02470ad14dad0cfc00c1825e4d53b3
SHA13a09cad87808b29d8ec21a7721aad0d99c72192b
SHA256197bde6062016774e39b38a6dc6af876863aa9a00fb8a17e9d39199b466551dc
SHA5126b153b9240373abca30b98dc43abb4910edfad1b74484b06914ba739f2e84b23e4a90fd2051d94e75d98ebbd5156647febeb78760e81abab76610c009acbada7
-
Filesize
102KB
MD5939162dbd85ad63b1b6de4d48b764047
SHA1fbbd59c10b093e59b1f51b06ecf8b686cf66d23d
SHA256d11fbf51120e4c4d1775c0efe66e78794268a0c872f99a4f85bf6ee112282573
SHA512213d2f4b078cffd0b6639e6326fda0a8b77cea1d02d65c2673820f758a783d438105ab3848140d80062db5366f22feabffcbe00e6ae38a0952d1e700f7bbf8c6
-
Filesize
88KB
MD5c5c20f5bf602d33689b975cfe3489b1c
SHA11919b3434de3b6a754469c40ea12328bb6706328
SHA256f0b044d612d35c428f7b64e0f2a2c5cb5873b57e294d4ba0af7b9419961932f6
SHA512cff92358a3de98136d31438ef1e12459644afb1822105472b9452adf521c617bba0bb06f229a950fead371083461c20638fba65ecd3198b92039fb2cce102158
-
Filesize
5.6MB
MD50106ef73f91b2bf65b225d25ca66840e
SHA1a6d345114879d6f7bba0352bab4e80a2688518e6
SHA2565ee503ec8e7fbc6a32d20b97dbaf5e1c85bfbaf31f8e393cbe20d654dd86760e
SHA512544013691c28f6e1741d65c96c461b7850c0ee0f3a27c8ca1d631fe5df1733aba3e78fcc94c6f96b602d5fb351d9f843cd593f413114482b9816e4422aa33aaf
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
5.2MB
MD50c1b8a4ef9d42a8bb164a9cb3c6d5f13
SHA1ae69fa0b3266efe502b5c6fcfce897de61db027f
SHA2562c06eec63b04eb812ee682e56d9d70896b15d1c647929e26f9d85cd383e667f3
SHA512882821984373f14d1d245d1bbea77b77bc92fe9012604da0151835c5822c25289ded8cbb76663fa29d36f231b28d8057a7a835f49b97761fe89f7c727e563dfc
-
Filesize
7.6MB
MD5dbb820772caf0003967ef0f269fbdeb1
SHA131992bd4977a7dfeba67537a2da6c9ca64bc304c
SHA256b2ac1e407ed3ecd7c7faa6de929a68fb51145662cf793c40b69eb59295bba6bc
SHA512e8ac879c7198dffb78bc6ee4ad49b5de40a5a7dbbda53d427d0a034941487d13c8bb2b8d590a1fcdd81cd6abb8f21fdfcd52924eb00c45a42ee06c1e4b3d590f