Analysis
-
max time kernel
2639s -
max time network
2640s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 15:23
Static task
static1
General
-
Target
sample.html
-
Size
18KB
-
MD5
1f58c81a76337ca7f0fbe3cea68b267c
-
SHA1
d091323df1bea65abe795ec6c16b7c5b688e685e
-
SHA256
c1a1f57cda7a3f62218671096a440569413b02daeaa37c1a09cb4f3a9a80a833
-
SHA512
f9880b13a4c518a321ea4d6400ec4f19a8d0d2789d89a6d5b2c1042b44483d5f68d21aec1bbbd67ee025a9422b51c2e8a60731286f8eea8f78f185a378f4655e
-
SSDEEP
384:rHdtkDODpmReVoOs4ei9ylKeGM3U8Hhhb7UAQ7chS2LjFrSQ+yVJCBXQL:rPvBVoOs4emyI1MPBhbIAu0FrSkJQQL
Malware Config
Signatures
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 7 IoCs
Processes:
setup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\124.0.2478.51\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe -
Executes dropped EXE 49 IoCs
Processes:
RobloxPlayerInstaller.exeMicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeRobloxStudioInstaller.exeRobloxStudioInstaller.exeMicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateSetup_X86_1.3.185.29.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxStudioBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeBGAUpdate.exeMicrosoftEdge_X64_123.0.2420.97.exesetup.exesetup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_124.0.2478.51.exesetup.exesetup.exesetup.exesetup.exeMicrosoftEdge_X64_124.0.2478.51_123.0.2420.97.exesetup.exesetup.exeMicrosoftEdgeUpdate.exepid process 5516 RobloxPlayerInstaller.exe 1632 MicrosoftEdgeWebview2Setup.exe 5456 MicrosoftEdgeUpdate.exe 5368 MicrosoftEdgeUpdate.exe 4784 MicrosoftEdgeUpdate.exe 6000 MicrosoftEdgeUpdateComRegisterShell64.exe 3824 MicrosoftEdgeUpdateComRegisterShell64.exe 5964 MicrosoftEdgeUpdateComRegisterShell64.exe 688 MicrosoftEdgeUpdate.exe 5072 MicrosoftEdgeUpdate.exe 5564 MicrosoftEdgeUpdate.exe 4540 MicrosoftEdgeUpdate.exe 2308 RobloxStudioInstaller.exe 1948 RobloxStudioInstaller.exe 3196 MicrosoftEdgeWebview2Setup.exe 4144 MicrosoftEdgeUpdate.exe 3520 MicrosoftEdgeUpdate.exe 5740 MicrosoftEdgeUpdate.exe 6408 MicrosoftEdgeUpdate.exe 9772 MicrosoftEdgeUpdate.exe 6672 MicrosoftEdgeUpdateSetup_X86_1.3.185.29.exe 6920 MicrosoftEdgeUpdate.exe 4692 MicrosoftEdgeUpdate.exe 7892 MicrosoftEdgeUpdate.exe 8608 MicrosoftEdgeUpdate.exe 8612 MicrosoftEdgeUpdateComRegisterShell64.exe 8460 MicrosoftEdgeUpdateComRegisterShell64.exe 3548 MicrosoftEdgeUpdateComRegisterShell64.exe 8744 MicrosoftEdgeUpdate.exe 9968 RobloxPlayerBeta.exe 9772 RobloxStudioBeta.exe 10160 MicrosoftEdgeUpdate.exe 6464 MicrosoftEdgeUpdate.exe 3904 MicrosoftEdgeUpdate.exe 9032 BGAUpdate.exe 3428 MicrosoftEdge_X64_123.0.2420.97.exe 3712 setup.exe 9340 setup.exe 8580 MicrosoftEdgeUpdate.exe 7860 MicrosoftEdgeUpdate.exe 7732 MicrosoftEdge_X64_124.0.2478.51.exe 2372 setup.exe 2184 setup.exe 9580 setup.exe 3688 setup.exe 3896 MicrosoftEdge_X64_124.0.2478.51_123.0.2420.97.exe 6028 setup.exe 624 setup.exe 3012 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxStudioBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exepid process 5456 MicrosoftEdgeUpdate.exe 5368 MicrosoftEdgeUpdate.exe 4784 MicrosoftEdgeUpdate.exe 6000 MicrosoftEdgeUpdateComRegisterShell64.exe 4784 MicrosoftEdgeUpdate.exe 3824 MicrosoftEdgeUpdateComRegisterShell64.exe 4784 MicrosoftEdgeUpdate.exe 5964 MicrosoftEdgeUpdateComRegisterShell64.exe 4784 MicrosoftEdgeUpdate.exe 688 MicrosoftEdgeUpdate.exe 5072 MicrosoftEdgeUpdate.exe 5564 MicrosoftEdgeUpdate.exe 5564 MicrosoftEdgeUpdate.exe 5072 MicrosoftEdgeUpdate.exe 4540 MicrosoftEdgeUpdate.exe 4144 MicrosoftEdgeUpdate.exe 3520 MicrosoftEdgeUpdate.exe 5740 MicrosoftEdgeUpdate.exe 6408 MicrosoftEdgeUpdate.exe 6408 MicrosoftEdgeUpdate.exe 9772 MicrosoftEdgeUpdate.exe 9772 MicrosoftEdgeUpdate.exe 6920 MicrosoftEdgeUpdate.exe 4692 MicrosoftEdgeUpdate.exe 7892 MicrosoftEdgeUpdate.exe 8608 MicrosoftEdgeUpdate.exe 8612 MicrosoftEdgeUpdateComRegisterShell64.exe 8608 MicrosoftEdgeUpdate.exe 8460 MicrosoftEdgeUpdateComRegisterShell64.exe 8608 MicrosoftEdgeUpdate.exe 3548 MicrosoftEdgeUpdateComRegisterShell64.exe 8608 MicrosoftEdgeUpdate.exe 8744 MicrosoftEdgeUpdate.exe 9968 RobloxPlayerBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 10160 MicrosoftEdgeUpdate.exe 6464 MicrosoftEdgeUpdate.exe 6464 MicrosoftEdgeUpdate.exe 10160 MicrosoftEdgeUpdate.exe 3904 MicrosoftEdgeUpdate.exe 8580 MicrosoftEdgeUpdate.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exesetup.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\124.0.2478.51\\EBWebView\\x64\\EmbeddedBrowserWebView.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\124.0.2478.51\\notification_helper.exe\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\124.0.2478.51\\notification_click_helper.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\124.0.2478.51\\PdfPreview\\PdfPreviewHandler.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.29\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
BGAUpdate.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\!BCILauncher = "\"C:\\Windows\\Temp\\MUBSTemp\\BCILauncher.EXE\" bgaupmi=54105E4D55184802AB30F0778D22BBBE" BGAUpdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
RobloxPlayerInstaller.exeRobloxStudioInstaller.exeRobloxStudioBeta.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxStudioInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxStudioBeta.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
setup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe -
Checks system information in the registry 2 TTPs 30 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 12 IoCs
Processes:
svchost.exesetup.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
RobloxPlayerBeta.exepid process 9968 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
Processes:
RobloxPlayerBeta.exepid process 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
Processes:
RobloxPlayerInstaller.exeRobloxStudioInstaller.exesetup.exeMicrosoftEdgeUpdateSetup_X86_1.3.185.29.exesetup.exedescription ioc process File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\DeveloperFramework\checkbox_unchecked_dark.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\scripts\CoreScripts\Modules\PurchasePrompt\Thunks\initiateAvatarCreationFeePurchase.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\InGameAssetReporting\Dev\Dash.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.97\Locales\gu.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Shared\InsertableObjects\Light\Standard\TrussPart@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\Localization\AppCommonLib.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\Debugger\Resume.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\Qml\QtQuick\Controls.2\ActionGroup.qml RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\Qml\QtQuick\Controls.2\Material\Label.qml RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\Qml\QtQuick\Extras\designer\images\piemenu-icon16.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Packages\_Index\LuaSocialLibrariesDeps\RoduxUserPermissions.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\Qml\QtQuick\Controls.2\Universal\GroupBox.qml RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\textures\ui\VoiceChat\MicLight\Unmuted40.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\scripts\CoreScripts\Modules\InspectAndBuy\Flags\GetCollectibleItemInInspectAndBuyEnabled.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\CommunityLinks\UIBlox.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\CentralOverlay\CentralOverlay\default.rbxp RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\Scroll\scroll-top.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\textures\StudioToolbox\ArrowDownIconWhite.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Shared\InsertableObjects\Light\Large\Fire@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Shared\InsertableObjects\Light\Standard\ProximityPrompt@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Packages\_Index\UGCValidation\UGCValidation\validation\validateCageMeshIntersection.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Shared\WidgetIcons\Dark\Standard\AvatarImporter@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Packages\_Index\UIBlox\UIBlox\App\SelectionCursor\Cursors\Invisible.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\FriendsCarousel\SocialModalsCommon.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\scripts\PlayerScripts\StarterPlayerScripts_old\ControlScript\MasterControl\Thumbstick.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Lua\AlignTool\Dark\Large\AlignMin.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Lua\StyleEditor\Light\Standard\InsertS.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Packages\_Index\LuauPolyfill-12e911c4-0c4b13ff\LuauPolyfill\Array\unshift.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Shared\Navigation\Dark\Standard\More@3x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\api-ms-win-core-handle-l1-1-0.dll RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Packages\_Index\RoduxCall\RoduxCall\Reducers\init.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Packages\_Index\RoduxFriends-f5bcbc0c-f336d473\RoduxFriends\Selectors\selectFriendshipStatusesByUserIds.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7C52.tmp\msedgeupdateres_is.dll MicrosoftEdgeUpdateSetup_X86_1.3.185.29.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Lua\AvatarCompatibilityPreviewer\Light\Large\symmetry@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Lua\TagEditor\Light\Standard\RemoveFromPreview@3x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Notifications\SoftLandingAssetLight.gif setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\AvatarCompatibilityPreviewer\check_body.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\ui\Controls\DesignSystem\ButtonControls@2x.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\textures\ui\Emotes\Large\SelectedLine@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\BuiltInPlugins\DepFiles\ControlsEmulator.d RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\scripts\CoreScripts\Modules\TrustAndSafety\Components\ReportAnything\ScreenshotLoadingDialog.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Shared\Navigation\Light\Large\Back@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Packages\_Index\RobloxShared-edcba0e9-2.4.1\RobloxShared\RobloxInstance.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\AbuseReporting\Dev\UnitTestHelpers.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\sky\clouds.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\textures\FillCursor.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\BuiltInPlugins\Optimized_Embedded_Signature\DynamicHeadExportTool.rbxm RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\textures\ui\LuaChatV2\ic-friend-empty-border.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Lua\Tutorials\Light\Standard\Checkmark@3x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\AppStartup\SharedFlags.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\Qml\QtQuick\Controls.2\Universal\CheckBox.qml RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\BuiltInPlugins\DepFiles\AlignmentTool.d RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Packages\_Index\GraphQL\GraphQL\jsutils\__tests__\naturalCompare.spec.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Shared\InsertableObjects\Dark\Standard\UIScale@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\AbuseReporting\Dev\ReactTestingLibrary.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.51\Locales\fi.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\TagEditor\VisibilityOnDarkTheme.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\content\textures\TagEditor\VisibilityOnLightTheme.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\textures\ui\LuaChat\9-slice\modal.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Lua\AssetManager\Dark\Standard\PackagesFolder@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\studio_svg_textures\Shared\InsertableObjects\Dark\Standard\Clouds@2x.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Packages\_Index\SocialLibraries\SocialLibraries\populate\populateDictionaryFromIds.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\ApolloProfileInsights\Cryo.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\content\textures\ui\VoiceChat\New\Unmuted0@2x.png RobloxStudioInstaller.exe -
Drops file in Windows directory 2 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp MicrosoftEdgeUpdate.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp.tmp MicrosoftEdgeUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
wermgr.exefirefox.exewermgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe -
Enumerates system info in registry 2 TTPs 18 IoCs
Processes:
msedge.exechrome.exechrome.exewermgr.exewermgr.exeRobloxStudioBeta.exemsedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxStudioBeta.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxStudioBeta.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
Processes:
setup.exeRobloxStudioInstaller.exeRobloxPlayerInstaller.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxStudioInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\124.0.2478.51\\BHO" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\PROTOCOLEXECUTE\ROBLOX-STUDIO RobloxStudioInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio-auth\WarnOnOpen = "0" RobloxStudioInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxStudioInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio-auth RobloxStudioInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\124.0.2478.51\\BHO" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exesetup.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeUpdate.exesetup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\ProgID\ = "MicrosoftEdgeUpdate.ProcessLauncher.1.0" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\.xhtml setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine.1.0\CLSID\ = "{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BA4344C9-31F7-44C1-9802-7F90B352D5C5}\ = "PSFactoryBuffer" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E3D94CEB-EC11-46BE-8872-7DDCE37FABFA} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc.1.0\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ = "IAppWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods\ = "12" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\LocalService = "MicrosoftEdgeElevationService" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\ = "Microsoft Edge HTML Document" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ = "IPolicyStatus5" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\ProgID\ = "MicrosoftEdgeUpdate.CredentialDialogMachine.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\image/svg+xml\Extension = ".svg" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback\CurVer\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ = "IPolicyStatus2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{BA4344C9-31F7-44C1-9802-7F90B352D5C5}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\Elevation MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
RobloxStudioBeta.exepid process 9772 RobloxStudioBeta.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exechrome.exeRobloxPlayerInstaller.exeMicrosoftEdgeUpdate.exemsedge.exemsedge.exeRobloxStudioInstaller.exemspaint.exechrome.exechrome.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxStudioBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exepid process 4056 msedge.exe 4056 msedge.exe 1232 msedge.exe 1232 msedge.exe 1952 identity_helper.exe 1952 identity_helper.exe 5532 chrome.exe 5532 chrome.exe 5516 RobloxPlayerInstaller.exe 5516 RobloxPlayerInstaller.exe 5456 MicrosoftEdgeUpdate.exe 5456 MicrosoftEdgeUpdate.exe 5884 msedge.exe 5884 msedge.exe 884 msedge.exe 884 msedge.exe 1948 RobloxStudioInstaller.exe 1948 RobloxStudioInstaller.exe 3856 mspaint.exe 3856 mspaint.exe 1824 chrome.exe 1824 chrome.exe 8244 chrome.exe 8244 chrome.exe 9772 MicrosoftEdgeUpdate.exe 9772 MicrosoftEdgeUpdate.exe 9772 MicrosoftEdgeUpdate.exe 9772 MicrosoftEdgeUpdate.exe 5564 MicrosoftEdgeUpdate.exe 5564 MicrosoftEdgeUpdate.exe 4692 MicrosoftEdgeUpdate.exe 4692 MicrosoftEdgeUpdate.exe 9968 RobloxPlayerBeta.exe 9968 RobloxPlayerBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 9772 RobloxStudioBeta.exe 10160 MicrosoftEdgeUpdate.exe 10160 MicrosoftEdgeUpdate.exe 10160 MicrosoftEdgeUpdate.exe 10160 MicrosoftEdgeUpdate.exe 7860 MicrosoftEdgeUpdate.exe 7860 MicrosoftEdgeUpdate.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
OpenWith.exeRobloxStudioBeta.exepid process 1392 OpenWith.exe 9772 RobloxStudioBeta.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
Processes:
msedge.exechrome.exemsedge.exechrome.exepid process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 884 msedge.exe 884 msedge.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe 1824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exechrome.exemsedge.exepid process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exechrome.exemsedge.exepid process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
mspaint.exeOpenWith.exefirefox.exeRobloxStudioBeta.exepid process 3856 mspaint.exe 1392 OpenWith.exe 3532 firefox.exe 9772 RobloxStudioBeta.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
RobloxPlayerBeta.exepid process 9968 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1232 wrote to memory of 2360 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 2360 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4944 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4056 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4056 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe PID 1232 wrote to memory of 4660 1232 msedge.exe msedge.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
setup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb094a46f8,0x7ffb094a4708,0x7ffb094a47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16161751952827710075,2146215491220774043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf6c5ab58,0x7ffaf6c5ab68,0x7ffaf6c5ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4320 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3592 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4464 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4900 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4744 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3608 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2756 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4912 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5196 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3172 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3188 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1896,i,401791644220272391,388198325334558872,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Sets file execution options in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzU4OTAwNkMtMzkzOS00QjJGLThGRTQtNjZCNkIxNTM0ODFEfSIgdXNlcmlkPSJ7OUM4MDNDNEItNzE1NS00NTY5LTg5QzktQ0FBMjU5NzU4N0E3fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntGMEFFRkFGRi0yRTBGLTRDQ0YtQjc2Ni0zMjdFOEYxRkU1N0R9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4NS4yOSIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU1MTc1MzY1ODYiIGluc3RhbGxfdGltZV9tcz0iNTE3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{C589006C-3939-4B2F-8FE4-66B6B153481D}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5456" "948" "724" "956" "0" "0" "0" "0" "0" "0" "0" "0"5⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\RobloxPlayerBeta.exe" -app -isInstallerLaunch3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzU4OTAwNkMtMzkzOS00QjJGLThGRTQtNjZCNkIxNTM0ODFEfSIgdXNlcmlkPSJ7OUM4MDNDNEItNzE1NS00NTY5LTg5QzktQ0FBMjU5NzU4N0E3fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InsyRkJCQkRFMi0wOTU0LTQwMDQtQTY5Qi04NDQ3MUUzQ0ZDNkF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTEwLjAuNTQ4MS4xMDQiIG5leHR2ZXJzaW9uPSIxMTAuMC41NDgxLjEwNCIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU1MjI1MjY1NDciLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B15C9F47-A990-44D3-9CD1-8AB1DBECB616}\MicrosoftEdgeUpdateSetup_X86_1.3.185.29.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B15C9F47-A990-44D3-9CD1-8AB1DBECB616}\MicrosoftEdgeUpdateSetup_X86_1.3.185.29.exe" /update /sessionid "{36D02F48-FA5D-41FF-9C94-85BCAD2988F1}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Temp\EU7C52.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU7C52.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{36D02F48-FA5D-41FF-9C94-85BCAD2988F1}"3⤵
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.29\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTg1LjI5IiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMTIiIGluc3RhbGxkYXRldGltZT0iMTcxMjk0NjYxOSI-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExMDk4MDg5ODM2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MzZEMDJGNDgtRkE1RC00MUZGLTlDOTQtODVCQ0FEMjk4OEYxfSIgdXNlcmlkPSJ7OUM4MDNDNEItNzE1NS00NTY5LTg5QzktQ0FBMjU5NzU4N0E3fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InsxREE0NDMxRC04MDJBLTQxRjYtOTFBNi02MTIxOUVCQkM3MzN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE3MS4zOSIgbmV4dHZlcnNpb249IjEuMy4xODUuMjkiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iSXNPbkludGVydmFsQ29tbWFuZHNBbGxvd2VkPS10YXJnZXRfZGV2IiBpbnN0YWxsYWdlPSIxMiI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSIxMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iOTA3MTk5OTQ1MyIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI5MDcyMDI5NDQ5IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIwIiBlcnJvcmNvZGU9Ii0yMTQ3MDIzODM4IiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI5Mjc4ODI5NzU4IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJkbyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvNzJlZDgwODctZWU5OC00MjljLTkzMzAtY2EzYzE5M2Q0MWFmP1AxPTE3MTQ2NjM4NzMmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9TyUyYjNzNzFKelRoSFhtZTFnWlJlN1UyVFRYNSUyYmxGJTJmTDlVNDNNdXI5YTBQMVFLUHFUNzRHT09wcmtYQTYxWFp5Z0pEZU1mWTJ3emlEbENITnI5NDNVMUElM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIwIiB0b3RhbD0iMCIgZG93bmxvYWRfdGltZV9tcz0iNCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI5Mjc4ODY5NTcxIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy83MmVkODA4Ny1lZTk4LTQyOWMtOTMzMC1jYTNjMTkzZDQxYWY_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-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-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb094a46f8,0x7ffb094a4708,0x7ffb094a47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5177135763491985846,3868026544798719926,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,5177135763491985846,3868026544798719926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,5177135763491985846,3868026544798719926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5177135763491985846,3868026544798719926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5177135763491985846,3868026544798719926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe"C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_F1FAB\RobloxStudioInstaller.exeC:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_F1FAB\RobloxStudioInstaller.exe -relaunch2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Temp\EU872E.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU872E.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /healthcheck5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QkNEN0VCMzEtRUE1My00RjA5LUI4OEMtODFDNjAxMUZCOENGfSIgdXNlcmlkPSJ7OUM4MDNDNEItNzE1NS00NTY5LTg5QzktQ0FBMjU5NzU4N0E3fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntBMzlBNTM0MC1DNjNDLTQ4NUMtQjM2Qi1BRTU1MDE3NjJCOTV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE3MS4zOSIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjczNTMzMjI0NDQiIGluc3RhbGxfdGltZV9tcz0iMTA2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{BCD7EB31-EA53-4F09-B88C-81C6011FB8CF}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "4144" "1372" "644" "1368" "0" "0" "0" "0" "0" "0" "0" "0"5⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\RobloxStudioBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-e2728ac197f84660\RobloxStudioBeta.exe" -startEvent www.roblox.com/robloxQTStudioStartedEvent -firstLaunch3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\RepairOpen.jpg" /ForceBootstrapPaint3D1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf6c5ab58,0x7ffaf6c5ab68,0x7ffaf6c5ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2264 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4328 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4524 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4672 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4312 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5144 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4736 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2660 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5916 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5756 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=6052 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5588 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5300 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=844 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3428 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3064 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6188 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6360 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=4324 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=6624 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=6828 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=6836 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=6964 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=6308 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=6508 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=6292 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=6336 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=6624 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=7112 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --mojo-platform-channel-handle=7628 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7776 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --mojo-platform-channel-handle=7980 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --mojo-platform-channel-handle=8240 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --mojo-platform-channel-handle=8284 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --mojo-platform-channel-handle=8392 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --mojo-platform-channel-handle=8576 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --mojo-platform-channel-handle=8516 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=8744 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --mojo-platform-channel-handle=8400 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --mojo-platform-channel-handle=8120 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --mojo-platform-channel-handle=9232 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --mojo-platform-channel-handle=8100 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --mojo-platform-channel-handle=8504 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --mojo-platform-channel-handle=9480 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --mojo-platform-channel-handle=9616 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --mojo-platform-channel-handle=9792 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --mojo-platform-channel-handle=9804 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --mojo-platform-channel-handle=9644 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --mojo-platform-channel-handle=10196 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --mojo-platform-channel-handle=10360 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --mojo-platform-channel-handle=10504 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --mojo-platform-channel-handle=10712 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --mojo-platform-channel-handle=10836 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --mojo-platform-channel-handle=11004 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --mojo-platform-channel-handle=11148 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --mojo-platform-channel-handle=11324 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --mojo-platform-channel-handle=11352 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --mojo-platform-channel-handle=11676 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --mojo-platform-channel-handle=11716 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=68 --mojo-platform-channel-handle=11752 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=10704 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=70 --mojo-platform-channel-handle=10444 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=71 --mojo-platform-channel-handle=9848 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --mojo-platform-channel-handle=7152 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=73 --mojo-platform-channel-handle=11252 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=8628 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=75 --mojo-platform-channel-handle=11592 --field-trial-handle=1912,i,1265806858354445593,5678975661701272546,131072 /prefetch:12⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3532.0.1801884553\559605304" -parentBuildID 20230214051806 -prefsHandle 1820 -prefMapHandle 1812 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {03efef7e-9b01-4d4c-84fe-e383c7e9d887} 3532 "\\.\pipe\gecko-crash-server-pipe.3532" 1912 244a2a0d058 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3532.1.1783061663\1359270341" -parentBuildID 20230214051806 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 22112 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69599d76-fd7e-422f-9b17-2bcd0a52d5aa} 3532 "\\.\pipe\gecko-crash-server-pipe.3532" 2468 24495d85658 socket3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3532.2.149523935\1029034624" -childID 1 -isForBrowser -prefsHandle 3436 -prefMapHandle 3432 -prefsLen 22150 -prefMapSize 235121 -jsInitHandle 896 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b45c231-8ba4-4d93-a21d-bd9ba92ea5a5} 3532 "\\.\pipe\gecko-crash-server-pipe.3532" 3448 244a5375958 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3532.3.783616347\1908862659" -childID 2 -isForBrowser -prefsHandle 3152 -prefMapHandle 2664 -prefsLen 22256 -prefMapSize 235121 -jsInitHandle 896 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bbf0ebab-8fd7-47c1-b8f0-29d53f62b41d} 3532 "\\.\pipe\gecko-crash-server-pipe.3532" 3384 244a2a0dc58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3532.4.687773167\1230407563" -childID 3 -isForBrowser -prefsHandle 3144 -prefMapHandle 2684 -prefsLen 22256 -prefMapSize 235121 -jsInitHandle 896 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d22e363-f031-4b67-a483-95709cb1df43} 3532 "\\.\pipe\gecko-crash-server-pipe.3532" 3412 244a5b49e58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3532.5.329086317\1183323229" -childID 4 -isForBrowser -prefsHandle 3468 -prefMapHandle 3576 -prefsLen 22256 -prefMapSize 235121 -jsInitHandle 896 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6f7f7fc-59d3-4b7b-a361-8569659002b8} 3532 "\\.\pipe\gecko-crash-server-pipe.3532" 3808 244a5b4bf58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3532.6.2075602781\1663478481" -childID 5 -isForBrowser -prefsHandle 4144 -prefMapHandle 4140 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 896 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72161156-201d-4354-aa53-dba9324d3375} 3532 "\\.\pipe\gecko-crash-server-pipe.3532" 4124 24495d40658 tab3⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x3101⤵
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjExMC4wLjU0ODEuMTA0IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxMyIgaW5zdGFsbGRhdGV0aW1lPSIxNzEyOTIyNDc1IiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNTc0MjAyMTkwMDAwMDAwIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjExNDA2OCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTQwODcxMzE3MDQiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1B32D7FC-8094-4362-B236-C8A45042229F}\BGAUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1B32D7FC-8094-4362-B236-C8A45042229F}\BGAUpdate.exe" --edgeupdate-client --system-level2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{30C475A4-CA8A-4A3E-AE1E-42D5909219E8}\MicrosoftEdge_X64_123.0.2420.97.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{30C475A4-CA8A-4A3E-AE1E-42D5909219E8}\MicrosoftEdge_X64_123.0.2420.97.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{30C475A4-CA8A-4A3E-AE1E-42D5909219E8}\EDGEMITMP_A9BA3.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{30C475A4-CA8A-4A3E-AE1E-42D5909219E8}\EDGEMITMP_A9BA3.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{30C475A4-CA8A-4A3E-AE1E-42D5909219E8}\MicrosoftEdge_X64_123.0.2420.97.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{30C475A4-CA8A-4A3E-AE1E-42D5909219E8}\EDGEMITMP_A9BA3.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{30C475A4-CA8A-4A3E-AE1E-42D5909219E8}\EDGEMITMP_A9BA3.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=123.0.6312.123 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{30C475A4-CA8A-4A3E-AE1E-42D5909219E8}\EDGEMITMP_A9BA3.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=123.0.2420.97 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff6074dbaf8,0x7ff6074dbb04,0x7ff6074dbb104⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MjVBOUQ5MDQtMTAyNC00MTc1LThEMEUtNTRDNEZEODNGNDUxfSIgdXNlcmlkPSJ7OUM4MDNDNEItNzE1NS00NTY5LTg5QzktQ0FBMjU5NzU4N0E3fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins5RjhGMUVFMS1BNDc3LTRGQjQtOTU5RC0zQTQ0REE2MjhCRDR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-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-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_UDE9MTcxNDY2NDM3NiZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1HZ0tzciUyYm94SGdmWHBDV2Q0eUNRYnI2VHcyN1pjbndUb3lxM3c4NEV5RmYlMmZJdHczTVNyM0FlVUJsTk5ja0ZPeWdEQ0MlMmZBbmExOURabUYwQjM0ajRtUSUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IiIgY2RuX2NpZD0iLTEiIGNkbl9jY2M9IiIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjAiIHRvdGFsPSIwIiBkb3dubG9hZF90aW1lX21zPSIxIi8-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTQ0NDYzMTE3MzQiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIGRvd25sb2FkZXI9ImJpdHMiIHVybD0iaHR0cDovL21zZWRnZS5iLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzLzFjMWZjOGZlLWYyNTAtNGEzYS05MWVjLTlmOTBlMzFiODI2NT9QMT0xNzE0NjY0Mzc2JmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PUdnS3NyJTJib3hIZ2ZYcENXZDR5Q1FicjZUdzI3WmNud1RveXEzdzg0RXlGZiUyZkl0dzNNU3IzQWVVQmxOTmNrRk95Z0RDQyUyZkFuYTE5RFptRjBCMzRqNG1RJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMTcyMDc2MDg4IiB0b3RhbD0iMTcyMDc2MDg4IiBkb3dubG9hZF90aW1lX21zPSIyNTIwNiIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0NDQ2NDMxNjQ3IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxNDEwNzA3MTY0NSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0MTA3MTAxODAwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-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-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\MicrosoftEdge_X64_124.0.2478.51.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\MicrosoftEdge_X64_124.0.2478.51.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\MicrosoftEdge_X64_124.0.2478.51.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Registers COM server for autorun
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.61 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.51 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff6c95b78c0,0x7ff6c95b78cc,0x7ff6c95b78d84⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.61 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D6FE31B2-01C9-4E67-856D-30916CB053DC}\EDGEMITMP_9D4EE.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.51 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff6c95b78c0,0x7ff6c95b78cc,0x7ff6c95b78d85⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FF937592-F0D6-44CF-9274-4CF31D134159}\MicrosoftEdge_X64_124.0.2478.51_123.0.2420.97.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FF937592-F0D6-44CF-9274-4CF31D134159}\MicrosoftEdge_X64_124.0.2478.51_123.0.2420.97.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FF937592-F0D6-44CF-9274-4CF31D134159}\EDGEMITMP_2C805.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FF937592-F0D6-44CF-9274-4CF31D134159}\EDGEMITMP_2C805.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FF937592-F0D6-44CF-9274-4CF31D134159}\MicrosoftEdge_X64_124.0.2478.51_123.0.2420.97.exe" --previous-version="123.0.2420.97" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FF937592-F0D6-44CF-9274-4CF31D134159}\EDGEMITMP_2C805.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FF937592-F0D6-44CF-9274-4CF31D134159}\EDGEMITMP_2C805.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.61 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FF937592-F0D6-44CF-9274-4CF31D134159}\EDGEMITMP_2C805.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.51 --initial-client-data=0x238,0x23c,0x240,0x214,0x244,0x7ff620e578c0,0x7ff620e578cc,0x7ff620e578d84⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RTU4NjVGNDctM0E2RS00Mjk2LUFCRTItMENENEUyQkQzNzYxfSIgdXNlcmlkPSJ7OUM4MDNDNEItNzE1NS00NTY5LTg5QzktQ0FBMjU5NzU4N0E3fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins5MEUyNjA2QS05OUVELTQ3MDctOTVCRi00MkIzQTZCNTU2OEJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RHhPYmpIR2ErblJhMmF0QzN3bytJRXBDNzgrWlllQVVia1hwREMyY2o3VT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4NS4yOSIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJJc09uSW50ZXJ2YWxDb21tYW5kc0FsbG93ZWQ9LXRhcmdldF9kZXY7UHJvZHVjdHNUb1JlZ2lzdGVyPSU3QjFGQUI4Q0ZFLTk4NjAtNDE1Qy1BNkNBLUFBN0QxMjAyMTk0MCU3RCIgaW5zdGFsbGFnZT0iMTIiIGNvaG9ydD0icnJmQDAuMjIiPjx1cGRhdGVjaGVjay8-PHBpbmcgcmQ9IjYzMjQiIHBpbmdfZnJlc2huZXNzPSJ7REVGMTY5REUtNkY1Qy00QjMxLTgwREUtODVFMDZGMjcxMEUyfSIvPjwvYXBwPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSI5Mi4wLjkwMi42NyIgbmV4dHZlcnNpb249IjEyNC4wLjI0NzguNTEiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iMTIiIGlzX3Bpbm5lZF9zeXN0ZW09InRydWUiIGxhc3RfbGF1bmNoX2NvdW50PSIxIiBsYXN0X2xhdW5jaF90aW1lPSIxMzM1ODUzMjQ0NzQ3MDMyMzAiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MDE0MzEwMTk0IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MDE0MzU4MTI1IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIwIiBlcnJvcmNvZGU9Ii0yMTQ3MDIzODM4IiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxNTI0OTUxNzc5OSIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iZG8iIHVybD0iaHR0cDovL21zZWRnZS5iLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzL2VkZmI2NTFmLWE2NmQtNGQ0My1hNTNlLTM3Yzc4ZWVhOWExNj9QMT0xNzE0NjY0NDY2JmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PWt5bXBkMzRqWVNCSzlZQUdKczZrR0JDWG5BJTJiYklXUDg0NERHS0FKTzB0dUtLM20wZHpRVmQlMmZBaUU5QUo3SDlKZFMzckc2VVdOY25ldE1iMndreU1MZyUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IiIgY2RuX2NpZD0iLTEiIGNkbl9jY2M9IiIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjAiIHRvdGFsPSIwIiBkb3dubG9hZF90aW1lX21zPSIxIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MjQ5NTQ4MTU0IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy9lZGZiNjUxZi1hNjZkLTRkNDMtYTUzZS0zN2M3OGVlYTlhMTY_UDE9MTcxNDY2NDQ2NiZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1reW1wZDM0allTQks5WUFHSnM2a0dCQ1huQSUyYmJJV1A4NDRER0tBSk8wdHVLSzNtMGR6UVZkJTJmQWlFOUFKN0g5SmRTM3JHNlVXTmNuZXRNYjJ3a3lNTGclM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIxNzI2ODI4MDgiIHRvdGFsPSIxNzI2ODI4MDgiIGRvd25sb2FkX3RpbWVfbXM9IjIxMjMxIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MjQ5Njc3OTY4IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MjY1MDg3ODUyIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxNTc1MTc3Nzk0MyIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjI1NzMiIGRvd25sb2FkX3RpbWVfbXM9IjIzNTI2IiBkb3dubG9hZGVkPSIxNzI2ODI4MDgiIHRvdGFsPSIxNzI2ODI4MDgiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjQ4NjY3Ii8-PHBpbmcgYWN0aXZlPSIwIiByZD0iNjMyNCIgcGluZ19mcmVzaG5lc3M9IntEOEZBN0QwNi0yMkVDLTRDMDYtODBBNS05MTREQjQyQjY4RjN9Ii8-PC9hcHA-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IjEyMy4wLjI0MjAuOTciIG5leHR2ZXJzaW9uPSIxMjQuMC4yNDc4LjUxIiBsYW5nPSIiIGJyYW5kPSJFVVdWIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMCIgaW5zdGFsbGRhdGU9IjYzMjEiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MDE0MzI4MDExIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1NzUxODA3ODkyIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PHBpbmcgcj0iLTEiIHJkPSItMSIgcGluZ19mcmVzaG5lc3M9Ins4RTBGQTJGOS02OEU1LTQ2ODYtOTE4Qy1BOEZENENDMkE4QTh9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Checks system information in the registry
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.97\Installer\setup.exeFilesize
6.8MB
MD531ddc9e1c11a44b88cf96c45b3551ffb
SHA1811ccb9706f656e29d089e30a2ee1650302394e2
SHA25646cb58faa60db59cb8d145bf6493f7c01a8ea8895f812d65512e3c7340a054da
SHA51267e5a4ec4b030e48ac06bdf79bfb2b9bfe7778f046a739f23b7be65e143a7181954c7587eb6841636a6e667aabfa292d6831bab709cd798d1de01987bc99aaf8
-
C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.51\Installer\setup.exeFilesize
6.8MB
MD526ef24e23b9ae5aaaa204a4b6901a6c9
SHA1d852dce2672850096d43ed7a9e30ca72f44eaf73
SHA256073aec6b50085f135e8e9903806cf817950cb09b686e106d7cf9edbe6296b8d3
SHA512a538ea6a04be7928e9533149b681d7371c6ad7274ff87207b3004ee4a436d64c5b96668e3bc91b30227dff8d5a2b30b81c50af7db99a413077f18c008d021822
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{1FAB8CFE-9860-415C-A6CA-AA7D12021940}\2.0.0.34\BGAUpdate.exeFilesize
17.2MB
MD53f208f4e0dacb8661d7659d2a030f36e
SHA107fe69fd12637b63f6ae44e60fdf80e5e3e933ff
SHA256d3c12e642d4b032e2592c2ba6e0ed703a7e43fb424b7c3ab5b2e51b53d1d433b
SHA5126c8fce43d04dd7e7f5c8bf275ba01e24a76531e89cc02f4b2f23ab2086f7cf70f485c4240c5ea41bf61cb7ceee471df7e7bdc1b17dfdd54c22e4b02ff4e14740
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\124.0.2478.51\MicrosoftEdge_X64_124.0.2478.51.exeFilesize
164.7MB
MD58f229750e00f388f5de3e974c351efa4
SHA1568c2bca689fbf870a965cb4867a76a2f5549fdd
SHA25692f8f1114c969dde4b8819de90c6b0662e9183c733e1378a64375fe4051382a4
SHA51209d00746c57f3928eecee36db144385b0013e307289a007a0983388ec3a45364edfbe4ded94f39d8c083a2c27d8ffbfe608e822441dfbf728cad880629a0407b
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\123.0.2420.97\MicrosoftEdge_X64_123.0.2420.97.exeFilesize
164.1MB
MD5300df46436ba5d076b227c32967ada91
SHA1de9d47ef0c61fb04b7309875e2f03c8fa37d19f4
SHA2561614eb0c2697d74f2a05f8c973b2055e9cc158d94b19105e3a9d450adc9e333b
SHA512ba3053085da062ec32f87aec43f527624248a81b702c8cdb359c0fba7194556658b49aca8ef98d885de5da5b9b2eab3f1fac2c99891f91949d1b9a155e4a6971
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\124.0.2478.51\MicrosoftEdge_X64_124.0.2478.51_123.0.2420.97.exeFilesize
38.4MB
MD571f4a3fd28d09de33dd6a850fc8f86b0
SHA167f10c48b975082b8c5575f68be671db968b878c
SHA2562127029e85f9d80ae2f2c4f5fef200c6d74aec57b7a0ce7597e83ef71d24c044
SHA512644f84d8610e57f04f3d17afa862ae0a3308327b1c2787ae496e378755ae02572da455e6aecb62d7ffb09b56319ba46e89602f70dcb8e39093cd0d992ed232b3
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.185.29\MicrosoftEdgeUpdateSetup_X86_1.3.185.29.exeFilesize
1.6MB
MD5b18c705b3c68cc49d9bf3649abc75c24
SHA16dc8963dea0f3185368790dee2a346301b4fa24c
SHA256c2ca3135f3cafd79bf90d4cb3118943ca17f40e0d651d1fc32b1b3d22d1412aa
SHA5127ac302c1e85c652bd897ce1af812950cd23a53c041af82fdcecb2314bbd1667bf2fc672dea40c21858e64befc9bf60190a4428f0b41c30317bb0e5ec7c00f71b
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FF937592-F0D6-44CF-9274-4CF31D134159}\EDGEMITMP_2C805.tmp\SETUP.EX_Filesize
2.7MB
MD5c11f635a9b793b9c12756b92219c81c8
SHA1107299e08c2a5cfe28d3b1aec4f81372efa28add
SHA25696adbf941978ff1af2df8c7bc44faefa09ce1cfc57c640ad66c58358e86913d6
SHA512281c7119817b3cc808d4f9d787a261e9dd8f0fbee7911f6ed349f5189528b3a244cb60d65f3df630445b0cd326849a67b533b07dd4fe675d6031e66141e3ce49
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\EdgeUpdate.datFilesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\MicrosoftEdgeComRegisterShellARM64.exeFilesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\MicrosoftEdgeUpdateComRegisterShell64.exeFilesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\MicrosoftEdgeUpdateCore.exeFilesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\NOTICE.TXTFilesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdate.dllFilesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_af.dllFilesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_am.dllFilesize
24KB
MD5f6c1324070b6c4e2a8f8921652bfbdfa
SHA1988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf
SHA256986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717
SHA51263092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_ar.dllFilesize
26KB
MD5570efe7aa117a1f98c7a682f8112cb6d
SHA1536e7c49e24e9aa068a021a8f258e3e4e69fa64f
SHA256e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01
SHA5125e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_as.dllFilesize
28KB
MD5a8d3210e34bf6f63a35590245c16bc1b
SHA1f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693
SHA2563b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766
SHA5126e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_az.dllFilesize
29KB
MD57937c407ebe21170daf0975779f1aa49
SHA14c2a40e76209abd2492dfaaf65ef24de72291346
SHA2565ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9
SHA5128670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_bg.dllFilesize
29KB
MD58375b1b756b2a74a12def575351e6bbd
SHA1802ec096425dc1cab723d4cf2fd1a868315d3727
SHA256a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105
SHA512aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_bn-IN.dllFilesize
29KB
MD5a94cf5e8b1708a43393263a33e739edd
SHA11068868bdc271a52aaae6f749028ed3170b09cce
SHA2565b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c
SHA512920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_bn.dllFilesize
29KB
MD57dc58c4e27eaf84ae9984cff2cc16235
SHA13f53499ddc487658932a8c2bcf562ba32afd3bda
SHA256e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98
SHA512bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_bs.dllFilesize
28KB
MD5e338dccaa43962697db9f67e0265a3fc
SHA14c6c327efc12d21c4299df7b97bf2c45840e0d83
SHA25699b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04
SHA512e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_ca-Es-VALENCIA.dllFilesize
29KB
MD52929e8d496d95739f207b9f59b13f925
SHA17c1c574194d9e31ca91e2a21a5c671e5e95c734c
SHA2562726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df
SHA512ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_ca.dllFilesize
30KB
MD539551d8d284c108a17dc5f74a7084bb5
SHA16e43fc5cec4b4b0d44f3b45253c5e0b032e8e884
SHA2568dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07
SHA5126fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_cs.dllFilesize
28KB
MD516c84ad1222284f40968a851f541d6bb
SHA1bc26d50e15ccaed6a5fbe801943117269b3b8e6b
SHA256e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b
SHA512d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_cy.dllFilesize
28KB
MD534d991980016595b803d212dc356d765
SHA1e3a35df6488c3463c2a7adf89029e1dd8308f816
SHA256252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e
SHA5128a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_da.dllFilesize
28KB
MD5d34380d302b16eab40d5b63cfb4ed0fe
SHA11d3047119e353a55dc215666f2b7b69f0ede775b
SHA256fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f
SHA51245ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_de.dllFilesize
30KB
MD5aab01f0d7bdc51b190f27ce58701c1da
SHA11a21aabab0875651efd974100a81cda52c462997
SHA256061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c
SHA5125edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_el.dllFilesize
30KB
MD5ac275b6e825c3bd87d96b52eac36c0f6
SHA129e537d81f5d997285b62cd2efea088c3284d18f
SHA256223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0
SHA512bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_en-GB.dllFilesize
27KB
MD5d749e093f263244d276b6ffcf4ef4b42
SHA169f024c769632cdbb019943552bac5281d4cbe05
SHA256fd90699e7f29b6028a2e8e6f3ae82d26cdc6942bd39c4f07b221d87c5dbbfe1e
SHA51248d51b006ce0cd903154fa03d17e76591db739c4bfb64243725d21d4aa17db57a852077be00b9a51815d09664d18f9e6ad61d9bc41b3d013ed24aaec8f477ad9
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_en.dllFilesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_es-419.dllFilesize
29KB
MD528fefc59008ef0325682a0611f8dba70
SHA1f528803c731c11d8d92c5660cb4125c26bb75265
SHA25655a69ce2d6fc4109d16172ba6d9edb59dbadbc8af6746cc71dc4045aa549022d
SHA5122ec71244303beac7d5ce0905001fe5b0fb996ad1d1c35e63eecd4d9b87751f0633a281554b3f0aa02ee44b8ceaad85a671ef6c34589055797912324e48cc23ed
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_es.dllFilesize
28KB
MD59db7f66f9dc417ebba021bc45af5d34b
SHA16815318b05019f521d65f6046cf340ad88e40971
SHA256e652159a75cbab76217ecbb4340020f277175838b316b32cf71e18d83da4a819
SHA512943d8fc0d308c5ccd5ab068fc10e799b92465a22841ce700c636e7ae1c12995d99c0a93ab85c1ae27fefce869eabadbeafee0f2f5f010ad3b35fa4f748b54952
-
C:\Program Files (x86)\Microsoft\Temp\EUB800.tmp\msedgeupdateres_et.dllFilesize
28KB
MD5b78cba3088ecdc571412955742ea560b
SHA1bc04cf9014cec5b9f240235b5ff0f29dbdb22926
SHA256f0a4cfd96c85f2d98a3c9ecfadd41c0c139fdb20470c8004f4c112dd3d69e085
SHA51204c8ab8e62017df63e411a49fb6218c341672f348cb9950b1f0d2b2a48016036f395b4568da70989f038e8e28efea65ddd284dfd490e93b6731d9e3e0e0813cf
-
C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exeFilesize
5.1MB
MD5911c020a364b10fe1de664c01de4534c
SHA18731aee51722d2e1604864eb8f03abe3e6d35441
SHA256cb84418aa6ff71e927125f05cd74b10cef07b40fe19a17f9ba5c3bd57f2d9591
SHA5127e2c2259dde1fcb1a10a3864b1e24f892fb28d1c0a9a8b1b32d6b512d9f49b031cf6119f55dad008f0b2a5dc87ae606ee0c2918fdc44fc307d56bc933537db7b
-
C:\Program Files (x86)\Roblox\Versions\version-492b7f0827474659\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeFilesize
1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
C:\Program Files\MsEdgeCrashpad\settings.datFilesize
280B
MD5e0ffe93460707c72ae6e1d0129ae1c82
SHA1aab95857cbecd9735acd341e6777f8b08459263e
SHA2568e6e33c3b7034c02367ff578bde4df6fdff58f04076918ffdb7fbb1e462b9fb3
SHA512069470fd1ce4d8c4f98845a7996c62a4d1cfe25e5f8798d5e59b281258439f423bd59cb63289119c58a2e62621b2dbe08fc6116a7f490740540df076398294d4
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
104KB
MD53b96037535f6df667ef3a2794ace5bf1
SHA1352cead147a8ac2b9bb5b5a1f2270cb2b416d69b
SHA25649bd25b10035ea66ccaee1e69ec04aecb83675f5b3090a948275912bbf17bd40
SHA5126af2939cce69acd79f6575f014e444f36c7304ebd422f4d37f8f8b86fdc325815859fe732f7c721b1db4a02011e40cfaf72c1de2e6ea96199711c56945cdb849
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD55b232f2ec5e33f7709f554291a0582c7
SHA18e09d16cdefd7434b6626535778c4d6aaa94502a
SHA256539b48bb8997ee07f386d39e50b64b6a7f14ae24e0fd7c49a5d72e387860d5b5
SHA512570f3bde7f527c8af2cefc04c0bb7d9024c2836b328a25dd50546cffc192d8256a276c6e8e07c0ca5afe06af86b819569f25ac6213e006588fc7edcc95e24d81
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000086Filesize
66KB
MD5ef690ee40641522de3b9aac5457ffeb6
SHA1b9de4994e71378b80dcb367301fd41b787525e89
SHA2565cb452e7c1e5fe4897db812e2f319f9a9807b243ff6d48cfa807ea6950583ca2
SHA512f94356ebc739890ac80a5bef82fb6fab44a995c7ca1216e5145277f32e29d119445e51b33d276b04c6cb18e63232b7fed6d0673770147160e677c7714260641f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000088Filesize
22KB
MD5b0f7a6a0c61a9ee52bd2cccb0f657f05
SHA1c5875bf357919ba9c11449923669f39871d07b76
SHA256038d361db14b45778487940824ce9cc4b30f504a0610c66c09ab6d0b52bcb4a6
SHA512293e321032320ed2ddd1af75b45b6ab794d1c50a945bbe33804a91d48a1f6ee43493137a4bba1f363629cde7f68802b589076149edced0964615dc60ce325877
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00009fFilesize
243KB
MD50d2dc4c04a97fd331759d4b4f4d7e4cc
SHA11745cae06747f7777f809fa3220cca4a8210dd84
SHA256b641d2012271bb75f7e82c5020f99d2ada0684651fc1787c70912b877b707bae
SHA512e86eecbdba2de835514cb6a4ccde7b830818f4dd0c3e9aed17c6d35961bee2f53c2b488c32dde29a3aced6d032bdbae8106058ec88d7959076ade2f5ce1023e3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000afFilesize
142KB
MD50df665800ee03ce503eb277ae3e2063b
SHA15c3e37ea9fd5963f079e0afd5d854fd39f43cd8b
SHA256be1c5feb95c748a71e6a41fc30b99ce90c7c5d79682b0877e1231dc106683fa4
SHA512fb59486dceb834bbda9f8f9f37bed42f655210453e3ee578e9982e2bc1dddeeb103f48734341dad90f8df04caa693e1a2238ed20af4d12c89503c9cb96f47446
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b0Filesize
18KB
MD561ae3e12fbb076db2c31e5cb3649bdf4
SHA19bba21703a9530fc36a7cc9caa02a91187883bc2
SHA256bf387e2d3c229cdaaa96b2f3078d0d798ecde6750fe372e937df731718eae621
SHA5122983d50c4a34f901793f140b14fdfbf41d39ad377d6d227edbc230b55e309faef15cbd1d44ab335b82223818881a56ebb21357577d7078bbe335b373bc70ddc2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b1Filesize
205KB
MD5f830b48b18992bca1cb4e37f991bb201
SHA1486acea52eeadd3472454d96594b327185b067c3
SHA256db5a47073c249975f3a5ba9c2faea8f9359f22372205696fe46f3af723d202c7
SHA512e9ece22be653c136530e6a5ebd372b17330d00fdcf0867f13f9a0ac0d1b62c60a2cf682f7736641141a4bf365070a4c5027b6c4e856456e7fa55bcb34fb4c830
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b4Filesize
88KB
MD50842dea92d0c2061fd65e2f96e778b86
SHA1e9c22570dd611d1f18af9020b57739be32145ccc
SHA2567a678bb4c89cb0bb5bba2fbf0a3d14442e07c3d8580b9a0102cb800ecc8bf252
SHA512c88e49bbc17ba12164cbd07f0cae58673be59a9d3e1ebc9af7b5d7aa5154e26a6c3a6fc7e83667ff1fd3ac7916825cce4614b28c2121303f3aad36dcd7bfeb1b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b7Filesize
170KB
MD5188484a4e044833b26601daf0e17cbd4
SHA17b40890f167a900cc87395e4a7079d380ee49c72
SHA2562e72678441934bb4631437dfb0ae04300c8c4da8e950464eafb5747326d40968
SHA512120190d1f1753367185540e01442c600ebe63d8544cc4639228ba9a58d92dbc01652c3b21c6eb10d2feaa98fc09d91274cb01f126922a580b8647a825adc61a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000b8Filesize
18KB
MD5550d87bf288378cd7c4722ab0fa2a774
SHA10ceadf298bdeaefc4bb7a2c3ead0d3a6a33adfe8
SHA256dbac94d7e67fa1d99999bf4016a46cee5bd9f046a88aff56114d1a6e0b3da269
SHA5123ef152d87b671e308ce1f516faf1bb6a595be99baf532df9d7d1beb87f7aba48673d5b1017c7943676fb55b7d83d2b7b0eebecc76e2d2fd5f982b5c79a4b35b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000c3Filesize
61KB
MD5447f82a0e2b0330df46c24289c983ea3
SHA1579d52b3a1da3d70f736e5b7c85a63af23c1860c
SHA256193d14be1adc4220283070ca7703c0f7a3169e6eafd17199d137b3fe3822d73c
SHA512b29791dea4f62da01c37c8c02a82038109a51871f149bc9a4c976374572382a6c16d45b1374f9e9464a6ba6ce6f50577a41800f1178a62d7c5c0d2531fab49df
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000d4Filesize
88KB
MD54112db26de0198ddeded3d8a6b677e30
SHA1ee6895369f4cc28371f86715afe57197c33a554e
SHA256ede6307f5d033ae63f0a85e4080664c9ecd6a6b3f803d82b354c4b39b0ed9acc
SHA512ef51638f6a1733937848cee61ea143c44eed90d95a4b2cc812fb72790f0915b9cf5a49d9cdfc633c3b6326a79c059a6750b4b9787611ce64d6441c46bb572c99
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\0d646e463b917717_0Filesize
264B
MD5e677caf76f78fa1bf353ad43db31d64a
SHA14e207d6a7c58fb13c895a4fdd010f3428237ab59
SHA2562fe267edb7c98e424d693ae9801842171b01af1834c346eee275b9123faa7740
SHA5121d540eeed1336fd04ab8afec7bb4b27135f663902621a67aad3de2a42b1a236add1d9e1e7dbfc030efc1ebd3ed25ef5d49f3427766757b9b33cc620f35fbb55a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\42101366bcc259a0_0Filesize
183KB
MD5f76624fabea338e8b93f4406c16fc3bc
SHA1265395decd35b64709e18f3e5997159bb0ee8055
SHA256dae556987edae98cd496a3a02d021a880ddfd9defe83a049aaf4968da58a3197
SHA51241f006df24a4f84176b275190c0fb17ffe257349fce7dc0293549aedb40b12954d17c02a0c0ac8ac8af362a25b91a2b941f1e9321c338d09b5683b04ad185dc9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\65c8faaa9851a1fe_0Filesize
298B
MD5c8d5d6bf300eac87cf1fb2fc4632be4d
SHA17d5ff7b1616238630aadd4ddb5deae515ccfd216
SHA256b26490fdb6ae2e46957120b20ca97292a244b514c45539f656cfdb458b80b9c0
SHA51203515a03772984481a74013673b0cdc2424050c4f7f9a692642c1919f8d40ec158044d8f89a698fd6c38543f9fb9df27e543c085d91b3d5e14f458b74a4bcd23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\6c1523cce07cd841_0Filesize
32KB
MD5d05d8ea62d093841a5708dc78e03086c
SHA1314a36ecba914bb1f7072b95ae22c2d5146e92cc
SHA2568df387aa0a59ad359c13280954145c24a06a2dac716744d35c2cb8e3580301b4
SHA512b55b0b5fd0d1b726c1965c1ceb4e7634e5e485e887ee04e0686f478ceb0190f9dbdeada7a4c4a77a95ff60bc0bc8c3c768b464b12feed7deb13d1d59675bb973
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-indexFilesize
8KB
MD59a8e0dc147526862ca827b69699f3041
SHA1e70d409639fa6564b0580d35de3a5b876946365f
SHA2562441a140b93f0d7707d21df28070d51637895d6a43fa907b11e763252ceda736
SHA512c134ccfdcc3ee1034832d2b0ec8255ddc71247552f1d763d77c48e863e91fcaa26f7688dd6073f68ac1c083038b5776b3b6fb5b7d68e9b4a3a8e3ea2393f0785
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD50d23e8373742b803eee24e6d19793b74
SHA1f241e666b0a11dfa46751c30b3ce613711cf16ce
SHA256830241f0bb55a79e5c8448a59dbeb481d7fd22d9e08a91679c9026b8a3534ff2
SHA512f2f42f00914180942aed67b02819da4e9495839fe4e76cf92638369aa48e3b41d6f114225254e08e09f86a8fc9369a911f3b6ab257317e0ca3bd9a75bc716f1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD542d7100a74b810e214a7bb322e330ff3
SHA103a23f0faaf861e4c246a03bde9265228ba5d4e4
SHA25691c2a1771490f2ccc6feab8a84e9e7e615afa90528aa01a6baaf37aad3d7e851
SHA5123936485e9fa2645177c1f2b303ca23450e5184d26f9e063a441375d5984a57eb833ae3d814f2c98d8f5f05e86f3dfa428fef3af6e261f981dae7c64f3c034cf5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD5a5b77daaf290ce35a15b12d723b29481
SHA1c15533a955380009ec487b581e64eb25e97f3f2f
SHA25686d8f57894caa1acdc9f7044b53d180ef5c9a38d30efa4cb80a44044e28871e8
SHA5121260bd446396ba90867b217793c45d8d329cea3b378b5f9e3239ddae4b4952bce288af343657540b6f0629255f18c3bf5ca1707cdd11fe43b8626954b6f204ae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD5e3bd8792c0e961fa322618b0b7b2b71a
SHA1d51c68fc5e66e1dde41c064c90d81204097a4466
SHA256e70fd26b62b1dcd083f61aa8da45cb69141415310641459ce59a3324aedcb91f
SHA512156b62944cc4e1ed442ee5ef4783c39c5b750a5a2571a7669c669d39023a51e2784292880a3938aabd19e3097a99bd557e6f3c84d5b523e4aca40f5805ea9de4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD5ab37c22d806c7e4ef1202d01ca3e996d
SHA1f1b672d9a107d835b565ad0da23a94c3fd9929f6
SHA25662df54dc015c315094ef0e5b71e5aa0cba5f7e6e2c60e4138c824324caeedf16
SHA512bc2af7d34958d4c8c87c9d3871e8e8777d9fd5030d469d812d840681f4f3d53941a8f2d34998018ebf21f36edb5b030ff4590446fb24678721e94483b16d9ed5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD558dc531c799675501f5dbbdb85d10976
SHA1dfeb218f8f257d3b2a27958d512603d034623032
SHA256701f69cb406110be836cdbbcbc7aa9eab0e308c37af06a3f3ad30d27134cb6d3
SHA512e0aa3a3dfdaf43d084727632d6971a0e5812c10d8bb767f6b711f62f550fda6577c5570903d496e7292fd0a68239466405aba0309c40811f80fb3b281d9a2ee1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD5a6eaaaab4a79e6dd05f868e6d4161f92
SHA1c31fbee7df112877f429d7efaeabbe3932bae7e5
SHA2562edae04cdbd33bc8f5cc36779776c2ed0933b90a7ea086f3d2f7249c421722a0
SHA512c76c2a0d2818817aaa6c0772cb3877b96e5bb0d2f65e855c46d16dcdb005ed3b54e5dbd2076c27159c395863797e1ec7ed6880aca882a0764ec4f058505164b7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD502c766ed679f4e7ebde944f67d51e61d
SHA197801f97b96181ea02e7918d0b5dc6f24cfa811c
SHA256d7ab315ad8ec19a81aed7d85ba140ec535e01990d10021be08c7a2608c33f5cb
SHA5123d15876948a6858f792ab7cd0f60f2066db01b1c0854713d81b48010aff8a0cc8d1a4751779ad2f4461e35a5c2fab0ae76dff67c9deaae4b5670598914cfd999
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD57e078108b19e3f12aba557be6aee2b28
SHA1beeeaad7adbde119c0c6e6b003052f1d6ed2836b
SHA256ab7e48bb330aab5221ef204f6f3ca1bc8ade623facb18268efaebab5fd59b853
SHA5120af98dddeee5af83f35f790292f6cc43d088d93eea227c9b2e0be17327ae6aa155a3c63cc682180061d61f01118da053ff8ec7b493407e2f91919f60c96ed681
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD5ce5c84a0fc23f4f067a23de646daa648
SHA1598c3b67212a3c69327d4c07010644fe506ce339
SHA25613cc705b0b12245bee9dde1d3172bc496b55759fae86e703f1212b4ac19982ce
SHA5124b530aa08b610f56fedd6d8d1404e1fc574a5b4302e9c963be6bdd6275d3e0c99d3a02a2568a51a157a89cd132c970d2ea303e6ef1081ed57e8c446d0eb2c575
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD5fc391157b2242141c7a1b3c65f2345ba
SHA1fb96e4c9849c628d113c3c3b5291e54f0e93ac99
SHA2569c066c3fb743d1c5468025af7a7882c2a19e02d521b87ef4acf57debcfdcbcb1
SHA512baab2584474254e35b6b12187fa5044207acb513a7d948c2899a9116057c823803b2c6d5da954080afab5beb402b4e7a902b97ee9029016896eaabd166fa05d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD54b1207177f06c2837cb2a549c1493b32
SHA1fc19cc52575a845fdb7c0a21d3432b9f8f26cdcf
SHA2566b49c149d3619e71c828526bf9560ffa05b668c8f3216b752319e5c556165544
SHA512e35f216cf36e56a768cec559a4d638771ab6ca7cf0f7c4916ece6d8547fc0c28d928a52de14f621c7bd4defae6803c7cd65e4861fabeb99e758f064e23461601
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD543c60c98ea49fe6fd01c9bea799d2a7c
SHA10d0bf0f1de3d9f7780dfba77fc70657590074000
SHA256ff51f31898f7a3ef6351073a8faf4cd51315e094debaee7b6da57273007cdd1d
SHA512d93cd63be87b5b9c7d0fb5e0851b30b1076caec8db99022308e69dde7f8195079b4241499c6c546ff24de436e52efe76c9e89087fb29404ad9c346e39476c68a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD5a7e1240c98c563d27714ec80358fa4e6
SHA197ffa334a27cd21bf3f605bfd9ebadbde13e49f4
SHA256258fd659acaa6b5fd335bd573144c8f5df8a107c01e5434ddd3db8e7eeb1bf92
SHA512ec2454e0847377ee9662f05bfb383ee76c52478d06a365cecadaf01db8732946207bc7e374f152bbe3b3db422301cc85d570ffef2167bc24494e817b6e0d868a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD5c3bc8456c9a03f5b8869720ef5992a6d
SHA151ec6f1e809e0de546d807ef84103dc6ac606fe7
SHA256651732ba44bfa5541f3663fa2494e8305b673969b8c8d0f8a7e22b27b055cb0b
SHA5125684cf6fcfd4915445b2b637a7528f3c86e22e5694d585c91048119ee86bc9be06b7ca3af10b897dc60ab370ce01cc19625c3ffb0654fc288f9360327d0bb08c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD5c710f6341c460e82f57197c817be4fb1
SHA1e3220e324bd603e2a96f95d11bf8c4b430ce827d
SHA256a18092371cf5808a55bf48c502d7841e282ded6291a7902e528b51c5928cbf0a
SHA512981ea62105f4cc2692ddb6c3fdf98f1b0279448921fd93d183062f89d73ac5dc327ab7d7c274a1fb64013a9e160bd0b93ccfc523649df8c8e2de326c18fc8476
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD57d2ae8e2a748f9f1818f532e72a18606
SHA17940749605275a34967f494a3d301e14898039f4
SHA25635f672191c2cbfdc360ee8b19a98af33e3d70613030090bd2f12208359423253
SHA512d60c4516c7f4f6b0b4069691bf33639bdb9304d0d616a17d34d17ad3d982f4b44a9193842f9fa6c0d9b51d33905e35cb9071f274cab8b47868b02e34aaa0f494
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD5ad1c63c79fe43f57ca81fc32ee7bfaf8
SHA173a4a9f980c21151860d4226f4a37ec9a149e732
SHA256a5e6acd80588ad26e27ff678bda72a0ad726d79a0a7e71d61ebfae7d260ffa19
SHA512796a87b48d351225e2d20ccfa2fd02edafd6e923a90d49d42372bf914bc5ea2dbfd12c94cbb5b154006f2cba6570367bce7deb44d3db47a818be3ce5e6f88490
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD570da023a405984ce4fbf7a99454cc433
SHA14ec1a0212fa376f1760ecd1a6a27b8ff04f4806f
SHA25684c819ec35cbc94bffcccd5657259ed3ad8740472dfd2a316d5aafb398cda620
SHA51240c4f650960ce6b94011f98fa1d00da55b60614712be5859977db97e746af74be279d5ec7f1530e6d02c7f62937596f6887440238983532795e6770d4a00bc13
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD5236ed6c017a661f56e0aa6f5a03c479e
SHA1b4ee1d935878ed5e48bb631a7a4def2be1170906
SHA256a9ba607b3f63a6e440e6948276d8a60f047a42795234ba15dbe46a064c2add24
SHA512f625436fe2cc820f61ef59df36ec30f8096d150f7c0dc67fdf0b697258ac084c0230bb4bbc7a6a2ab22da25509b80992d9a59b73179f2f0ef0ac89002d6d00cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD539b773e23b8ee28ad1a2525de67d3da8
SHA13f5e47ab9caa84bb3b6c4b9cf5b54eac6d7895e4
SHA2562a43acb5531c98da821f010e7d93e272599a89393935fc699cf7da1e93767500
SHA51203e44cdfe53cdecabe94f9da7738078355a190d6a4d938d6af7aa655cfc55adb3af4a4200ecf2e26dad52392808ceadce2da5ee5431d5257b951fb6638bdd424
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD5a929ea5060a715b5c435084cdb54f68a
SHA184a28cc9e8c0aaa6087fbc2ad04effa71db8fa32
SHA256a5a4ec01dbed35c5197e9b1c915d8b252fb8ef0bf04a26afbbd039ebc5bba56a
SHA512f34afde63a516ce2724342933839e1cdf44ba4c7b32d3fa72f0da7c495854ab7107ab77b2933b6499de5d24a1770482369d2f2482a892e70c07f7a91b1ba7f08
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD51d35cc6b81ca85246ff0267875607bb4
SHA114e13c0fed606425f68574795169695643a8f9d3
SHA256c48f7e6ae573f4f91c023127c90e79b12ae6c0dbceca38fb490ae5ba0e00c7dc
SHA512b79c65c3e2c5a133c02912f7d729a2c2d2ded64de09e6b200651ad0b5f94c10531a1e32feedee25362552977f2acdf0594bb191c00a99b071343bcbccb5ab550
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD58b48198d996b8c545bbadbf60af12412
SHA1b890e0eb8955b7579e8ddafc39556a8e0d158133
SHA256128c92374e3437fb486e22023c3b48903b44e8c5f8c96d297f6baf6536807102
SHA512de54fba781e66da6a4e50eb50edf08f31428321595e73975a8031a15bab94dd5b6760b3330ff94984f41cb0b3d862573b67117e092495e000ae85f3e45d0faf7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD5b0a01fab7a316c6310eecfb0f7039f58
SHA1bd06d47decc30e36c4b031e108ac4b03baa20e1b
SHA2565e730b678f403d5d17f61c4f4d9f477b48f76e91a160458dde6f0c8b28cc1fac
SHA5128b33f3afcd94bbfed374f8913432ca10c05d926c53fb0a273fb70c832edef3186c5ab2df55bf66eb5d8127f5b979eb389b22c769982bc9e2cd3724638420803d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.thesun.co.uk_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.thesun.co.uk_0.indexeddb.leveldb\MANIFEST-000001Filesize
23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
16KB
MD5221ffab5b983bf0af8a32b5a5aa8dc28
SHA131eade7fee1bc9c57025886ae554c47d8451f5dd
SHA25671d73d056f5021375b8bce5612fc5499bc083b503a2a2f58086599dfcc742473
SHA512674524a36712dab0da36fb37467db4acc70f41867f62e36299a1881d28cec484d902d92af1c5903a1023fbcaebbc6206b65898a31260ff5f9900e7e8287b12f1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
31KB
MD5296dcc43b9c3e895514c58584871d72a
SHA16929736651836d0f9cebe17779e73de19ba03800
SHA256e8472cf06aff77ee801872ff2dcdee6986c7e2ae93b9fd5391850e0fe20b666d
SHA51225fe861362e33f2d60444a537e19d9cdfe11a2d3dbd199af190a09bef4227f9dd076b4db9ee2e624d5775b151b454a489d7ed3f1e71f0c4180c656d89601cb85
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
31KB
MD5332f441b4b75bdb2e6f848930ccfda96
SHA1bd442b0c04dd04895f35018e542b258c63721629
SHA2563940d1616bbc63d66c06531466cfdeff34bafbf6825da574aba54f63e407a1d3
SHA512693afb2433f827cd6dfa72f1429dc7f7ac019194f6bb94b6ee3b28313693befc0e4b887e4079fc85c7ec4036fe533eb51d8a6b7a9d1acf74fef9746d306631a7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5abbe18982d665ba7a4aa123640609cb5
SHA188f8e2101911b32811528a807fc8a922e4cfb68f
SHA256078476356cb169df874e249378bdcc3b75390d3525748b5234358bb0be4de3da
SHA512bb384a86d66673ca152472eceb78c7b7b059f898f48bfa02f60f87ff60d39bcdeffc0ef8a269f21e9c1616bff1e39e06b9e5c2c725f7d74dfb06d30bd70bc650
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
29KB
MD5281bae3310d4ef7549fc5c1c01689e49
SHA1f475644de8ad062c510da3ea1478373051b39438
SHA256c85482b81ac8c6dc346a1d35c836b5051c075650cda211bbf2af45eb93c38ce0
SHA5127be586820b8267304ce2847928ba164838eb7d8ceb501599a3e3c834f0e591fd15ac736e21113edcf589edd91fe98cb116b229ffcdf07f1a20a5b6c6aade48e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5f0d14f0bc7e6210e5a947fbbdf182565
SHA1d274f0454977372f2ad873eb23ffe5fc92eefad2
SHA2562ba4240a59e2bcb82f7815e60bb6a1884598fd763497ccf5636d41028f961c8d
SHA512c6f561cdea610a6e4fe6c445f18e6fa1e4674f1c77939c3746fd0403f173657059d2c47a757b4e588e8d44385cf469636259d03410e6e4d90de33aad2f0b23ee
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5473f5b5d02f48ac7155c81427f3f8dbd
SHA16703ecdc1afed0d0b268a159b51257b95149615f
SHA2564fcbbe555775a74d9a6cfb7e7ccc3454d275000107354cf81eaef943be9baa19
SHA512db6fe82380112d48b915e43c4a1de17803f9a2fef019eae744af88081160570eb5cb568befbb087637bea97457de7aff291e1066c3b32110c7fd808a0ada50c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD590ddca105fd0d956a6480dbacc5809cc
SHA1165976f46216bb660136805d653d02eabdfc657a
SHA256d6da688bb6a9f802e431d55f1155ba6bace273c31c0eb6d73d3bfed0a78d073c
SHA512f3d894b4e3e413e175be19018f8766b3cc0cc2b265ebc1804166d4f1e8e64a61df12edabb7636c694e790f933d054776b285247be5925500615bb9eb40397662
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
8KB
MD5a047784e369c2bb321385386d1dbb386
SHA1202f5b745ff6020a65b2221666dfd37968fe2078
SHA256adae91a6b5f3b26d7709594c7340d8022a18931baac6573219b6972f3d776d85
SHA5123cb263355fd8542a150a8a1e1b3ab3ec621ad33296f4c656fa3ebc32050d6a5813e59800657cf8232cc3e100a7d97a35b0cb131633781abe0bd63c8a8d6c0d0a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
10KB
MD5a02f90700ca30f20f2060cb31cb9c6d9
SHA135706e744668b8d8ce97a4e2e5ea207678ab44ca
SHA256b4b8a8f80ed5272de4cf3d510d9c965ee8aabb234bfe22fb3dc40d0b417655c5
SHA5125e4b798a20eaee5b8ea3f438b4286d6ceb29acc7185378bed6404fae38d3aacfd49bf54f253720386b7eb99d2a610135941a9df2a4677d9e98d29865c60bba97
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
10KB
MD530eac8d1f8e2ddce801b5b7e95f24e9e
SHA1de80b78013d6f9c369d613aedeb06ca741fe70c2
SHA256efe685d264465120d8b1cc0146cc8dacfd1868a448f126135eb39bf1c8185eac
SHA51281e690168d3cb30f1d6226c7134621fa72d846ad1fc0c5fecca8e43719f317e6401d5da5adf3fd6bbb17224b34afc824631b6a8c33b9244199dd5861218b92b3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
11KB
MD5e2a36c8cdae988332fd22b52ee6e7851
SHA1b900e674b321e9c0c1c3893f46bb57991d568df3
SHA2560af95c7f7686439420e0e212903036785f5a0230f56414c233ae8bb895d73344
SHA512ad789095f56d3ca99b5a3b610262fc4862bfea2003b10f6391b36eed01692b08e648ead3c4c1a04b87c881f5730f43b38d0125827e3fc0331c534b129f0a9209
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
11KB
MD5dd809e2256204fa3fdb1bfa50dbb0afd
SHA1934ba9aa764391828ea08c38d57d63a33103cd47
SHA256821dc960f2e514fc6cf0cf6af5f9bc110c9b31a4a8915aebb9b211802cc4677f
SHA51253709e6bcbef6f9e0702e155b0c12fda2169714c30a5c716fba854b23ead8f7d99cc426e73811455fd601778441787fae89b1ec74b843a9231657521b3f16a3c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
9KB
MD53cbe58c296e07fefb927ae743c8402eb
SHA149f815569603577f6737719bf005b4e38b5ffcae
SHA256769568f553d704d40b243ee036bbca5c46b5eb9a5ad899147419792fb1008589
SHA512cfae008104c4b662fa8017f168a34af9ecf43fe381bb485bc95740b4279d6525eed41fec72ac5346529b10b8b0b021b1f2405dd359c65f68778c1fef178bfadf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD5f51c30eae716600dc7cb3740436fef22
SHA156cbb090cfeb58ef109fd240753fabe7143e7492
SHA256b38081c50a19887fc293eba2e6ec91512fd88fd28225c782d9a2e0a78111820d
SHA512fdeffbd52c446a425e4734fb5e7d9b5e771e2ef372fd0248abd2b63739dfa00194be93e1c7b1136869640b023e3ebc4dfc799c02d17e7994fc5b3221a5d75b76
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
10KB
MD595a23bb23023e584bc0cb5cb926681b9
SHA180167a37d9849d4ebdac2d1274aa38f9afde8455
SHA2560bb47d37403f7f05c10a5d2b46a9aef3e93401208499886686e98a9440de4a64
SHA5124be12de66b01379a40300302c2d26a0455b9b3b255cd77f8a409995f56bcd21196c18b84796577edc9f628841a969b22742f3802685ae125ea5e995ee74867aa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
11KB
MD5a3a934e8a94617bc1de8f5f6ed2889a3
SHA1aebf6fccc9ab8dc2e44282c9217bd431423da5a4
SHA256c52605cb35298fba7cdcb769983a1088939624a55652d0a4abba4c4b62487458
SHA512066941cbc9c194cb441449269e2142bcb7086cd4c9657690b2c37216edd4d1e7a67c6fa075f00258a6d55d43ee6ab43d437e6c31617ce8244664ddfcf9174f67
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5b44f7b2e15734ed978d7ec8ce4574820
SHA1efb57912ddda43c59c5d52e1245b046b290c86e4
SHA2568852b52bdacb01d75db04217cf90d718d629bbff33d0e39758c6348cf077514d
SHA5125c71f991f46011d5fa4fa7f2aba33723ecd4d7e805d6fb5085d876db0f9b692f96dd42ad6d1ec40c6c026bbf483faed98263721d8ab876620a3c53fc567602fe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD56dc120fd4686b0152815bdd6b102f3a4
SHA124e9c708f5bc89d572fa92c037d3f7cb5e6a44a0
SHA256aa22412fb833e77300fa9c0bc4b901b4b1bbe125978b54a6ce093ee1b9ff45a5
SHA5120bc10bef3bc1ab05541dae0b0ff87fd85123fb4251bed966ca0ee5b42f7e5a8d73f92ff8433cb0add89c3a927f5e1484bcbaf3c021e8f22c20a14076a6fc6024
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5617a319a3102b061b63c7d0d0e9df8cf
SHA18cf3184f443472498460e560ee5bab0bbf2e00a0
SHA256b73f49f9da8a3adee106b8bd45cad7560f2c4cb887f4c53464e95aabe286ea25
SHA512f941c3010b83f0d0fd87420d8eeab8be5adc52ac01d1f5df527c7a0f7ddaedaec44f4ea7914f4f07036c4b3e0c88eb7c088ee221c377d62786b7e2cc559ba8ef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5012daa59166745d33604ad744880b8ed
SHA1fda228588c36eabfebe6e9885a5740689e09d85e
SHA256eb183a72a25c1334d46e830ec11db5474325f995768292b8e58064ef2ca3685d
SHA512b63d77c1053eb897ba48139a9a3f2c832b25c8c287c86c2bd36171597c61a48f52ea23f3bd7ddbfdee58e3bf21c5d6dab0c8d75ec0fd455aa8e9e78ff4e4014b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
11KB
MD5cb90c68439e1b0687059ba8209be1f52
SHA14450b977bf41a30483d69e6e037209b03fef2dce
SHA2569ce5cb96b182e905e4fd8b9e8e2d3ec942853a8e3e132bf756d44d4d01391c0f
SHA512f718fb8e6bb1f6102958f6a1ce0ebdcc294994718740000fda08252a94ffa0e6482acaf4f67400213d547427ebb366904a474f5cf3ce1a83e123527579b3c9f7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5b9444c378e3bb76220ae509621616752
SHA1c27f041fc4cadf56355426959f757cc7cd19381a
SHA2560e127cb13d0c4253af44ff5ac6cff3d151622c49c6eb84258db9f41228aefae7
SHA5129d472a7596904eecd5c4c052522e7c461a1dcc38a3768c2a2b43a0b43f5c2959580171572e8fd7fb30c3f8bfa0d202e4c19ec8d23cf48f2754a90adbfa32937b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD51de990a45a4b548e33027d03eb46300a
SHA1f64a16a8d74963ba3d1ad1768e3377b791e02643
SHA256e7d70be1cd8324723b52dedee4d4291680c8b525da020c3d8513b473f8cc288c
SHA51249a6c8cc18e6c2cc9581b8f435bf33d5d6aa5cba4d8e4644edc3f0070b8655eeff7e85b590f8d45b3de6b7ed28cc27b42721e1edd6c5c018a17e7ef4c8b3e556
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD52d5590e85d76ca39f8ba6d5ab6d66db2
SHA1ddcdf3464b68478e9ef2059c5242d474fcf66a31
SHA256af779894515118b47b818381f05e9c2df46d5538d431eba3fcc0bb03c4af3c2b
SHA5127894e2705e35e06dabc2e605b755e3913e95e844df8c6e1b9cd50feece7eae15c1cdf0ce2f4d61df9b798bb18e9611d1fb907cab660a20f4527b6e30a3bb65cc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5a6e3ba737d4b51a69c42c6da6fbc0552
SHA1085ebe9a29ad546eaa120a9a037c990b2b6f39d4
SHA256cbeee25756f2a607cd6b19d9731a293e3538c3e1b709614b513e59c22bf6eb32
SHA5121168e83aa01e77a832506a53bf3eb9da522f41b80c04806bbfa9334873891996cc9bed5f63a62562269f7a0ff5ecbc33dfcf1b4daf56d9a15f66ef5afd0ffa5a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD549bcbfbb3ccec12e84592f9c94e628b4
SHA129d5fb9315f9a892df605c6d06342dddbdfc3621
SHA25697e6be73a5dfe328c57dc88ee678072278a73614f23bfb8dc90ac924b1761bfd
SHA512cb48d72aee8aa4560b12a5d31c05e17bbe697f24f6910612452aa8c010548c0d64e8f03d967e9342d11ec7c25c16a370029aa3c795a4b6719b86857f5421cf03
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5b3b76e010745dc15967746766f04edae
SHA16442f4177c94e53d13619fb6447b4ed2b2f76855
SHA2568b567e0c9d918cb8018cb07af8aa5e795cbaf60bc919b0e2f606c31672bec7f5
SHA512816adf1965a3a54d04f7c650e60af6b263b023beff62016b691c135efae29fcd53c480cdb2a8df7f075da8fc4604ab245c9dc7aa60dded5c41d5f468797e8404
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD51f8a9aabca0f917b09be933c37a86633
SHA178fbf2fcc8450712c72ed777e0968c2443077fda
SHA256428b9cf91b9edae7630a24127ef9ab54916681f345dbce3f98ee71f918875955
SHA512ebe7e0dee53d36d108b863d46770f18f6ce613371c560888df89b2d53415d61c8a8614d9678572e93842ef58f3df0e54a63256188481b76868adfe4789e4c0b7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5b6abd.TMPFilesize
120B
MD5ff968e64aeceb2c839b8148aea22aa4b
SHA19dc3af2da79b19a71eef8d593351723c162f38b8
SHA256226f850435303ba05420420767cd79c42f89ac2803bdee0765af62223a972ada
SHA5124d9e1e3eca9ea4cbc05405b3340e52b758d34a5e1c847b7699941f5432d0022512c867b8b3535f5ad290a447bb4f4cd6da5b6df2d11d01a9b3990630b6b52b87
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
240B
MD51b9d6dec7566f4e8eb4f184ca8bcac7a
SHA155457cdf7f827de8802de6b0abe19b30cd7b75a8
SHA256cdae4857e5f5bedd64d231ea74c0c5462b338d05fc1ebf8c4f974b791bf92754
SHA5129e13d4829bc25c05a087fb885d4c6bee91d1d1723bc15bea42a3875c968078f067a856de9e41a53072d4f54fa6ca045189bc49e69ca9e2ee7723b8b729cee81d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5c8d34.TMPFilesize
48B
MD5acf04beb765eff88f6720f3799b7b751
SHA1db43f5739a533994217ac71fcb964f1ec74cdff9
SHA2569be58048d30a6a2d3d5207849c8914bd0505d5ce0319b10b908dc6947fc378bd
SHA5128a1d1989359dd27bc52fc0077c10f8ddf341d7fc7b80452c06843c7f1cc2fbce07e90962fda85a5a7a9df63de194a5a7ef2facc2951d60d834e474046a5aa878
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\c1390aed-796d-4968-a09c-dcc0bfba1d68.tmpFilesize
8KB
MD5fff66f15ad87140568239091b243839a
SHA1046fdd682d568d9dfad83a7cfed2fef48750e6c1
SHA256a6735819f5cd492ae37fbbf215047a83933a7180d9b8c25c1a728e97282999ab
SHA5127bbbfae22221e952393c08bb1cecf06b2cbdb5fb23f03a91643681b4f8c53cfe34b2d0dfc744b4966c53e3ba477f0fb3e1fcf5c80878d963674d6278295ddb37
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD588423546998a6ea18b82af156eb4586c
SHA17e88bc474d3a00b1ba096d418fc0e276a4664769
SHA256e3b3086defa2af69f9debba240d1607b48335782adb024931e6130798570285c
SHA512be08465777ccdc3f143a4c74e20e112ad017e333e4efa87ff9f199d7738d2b104c1eeed0226bb3b30236941a0fbb90adc36d5eb045f5c2b9d64c40a12e870ace
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD563be349b3ac745208140ef772c735f99
SHA18cbaca2d2bb4415da8415317351af9a918005dc6
SHA2563c19fc2f22fc0aa36905bb83534755161bda1de2787181dabad29121602575f8
SHA5125cd07f5436d0919d5fd1f94e1435db280ffd5b30da60db53c86a499d5367f2e08f13ea639e80777f8da2cbe3455e01555b0516b51cd403f5ba6f19561d4358a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
256KB
MD528c94781396aba0d1a207228d86e9bd3
SHA1e4aa02165165795f236f6a0ab986abce84fceb39
SHA256d5a31153e0c4557d9309d0f5374c57f78de6d9a703d3fdeffd620d8746676d62
SHA512b0d93881f414e376d2014452993b39db8a0ea6f33fe4159d5ace58fafe43af38b278d6493bb6c6971037d69ba9c61e3fd672ff86b14471e006bd1a9d64b89693
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD5372873a86795aad41f26b04ab2c38094
SHA1f576f350888197879f180d6e2271e427726fe144
SHA256bc698e3443ff18078ee85b4aeee66e093f76df540e18da01bce301365bec3590
SHA512df906d0ce7949cc35c244b5e01063ef7cc59384da513cfe174d420b9e5ff82a468864ba739ff4879ce8646a5868ee390b5946a535524b4abc6d20aee647dc8d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
253KB
MD5d4ce393454aaa6f4141f029cb7aa1a56
SHA13b788b8dabd73ec4fae27374497721d2614b6af0
SHA2566f1140ae5ead7c817bceafb01119f975ef25b239d8bdb1a09b6a87f215dd4d77
SHA5124934bf5661cb64daa66828d6802284d9816dd0d55814bda98e30198a8ad6c574efdbd1f8fe881a6b13de4e7e3db3fb1150d19aee6c31481156461f8179ed68a5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
253KB
MD532afeff85714c9965743b38e69775d69
SHA174a81905848acdbe94292b1af11c4e005221ed7c
SHA256d882c1b5055758ce6008aa35ef4183ebab1f32c2771e02624b61927c4a5b3d02
SHA5124512831587e4f89e30ef2342e5a7425855635f593a5abbfdb7fb82e5027ff6d6e2c19fbc559ab166b12046993a5f7d060776802e78fe8b1bffa07a53b27e914a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
91KB
MD5f5e003a4fd402edda4e303fc8af20217
SHA1e0fa7899980c448eb8796d463e170e8157db8d90
SHA256664e5f1d79bd97e38cd338df628f5d6424b189f9b212bec1e66376be3a77cd65
SHA5123ad315709a2c0114d799509abbbf73722ee74b00ffe8fc04c068054d29a359382a5f032ff90fc98361c873d6261136d417c467c664037a26bbf6097812cbe98d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
89KB
MD5a3b554276e4e73da5d691537b276cebf
SHA1e4fe5c5b6beff6e16b2a5a8aaeb55a49d7be52ef
SHA256256a3009af0fe209d8a65496c37432c7d85bf4997d56869c30fb2102c92d1aeb
SHA5128b9faa05904edc6255cc92fa87fc400fb62251d0256bcb392c342375ce9ea1fe83aa5c13c9e038822ecb3de406e6cf908940a794a4b353a91957ca436c95c6a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5791f0c01a2e7c8c6b867a1b37fffe5dd
SHA1abc5dc247e89e2ff7f5937e208cce76198908615
SHA256c2ab80ff0e6105e5252a2770330f955a891957a8b5f93d091736b645f6b1385e
SHA51254e9ad686136f84ab45c00b0dbb0b9e670cdaa484b2aca2a887ed65498748a1b24d22d979af50ba81bdd2067b47458931dcb3a3d3050cb96930613ace9839d66
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54b3ca47c5956fa5daec144382c7377d6
SHA1b85fd845b4ab76419059a04a373508a8d9900286
SHA256617a5360971f193eecbaa1ae48bb2dce3f3a628c0c13a93167f60ed6894e3514
SHA512fbd2d97d3698fd30da845457c3bd9fad546bb10418c587e402f4210707128a3bd3326b670ae8d6fca82b8ba34b62dedef531380a9ffea727e6e4cda73c870015
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5c62ad2727ba0fcdd8564091577eaf4ad
SHA1bd39ae8357647d4170536f5aaa751d51318e31c9
SHA256b7bd783d373f9561bf0aa11f432c78b016158e503c87f2ebd3cf80981c929e6a
SHA512378e58c612becf35d0f9393624dea19b4234ee1275e19808f9dab27e8a4c5ed4791ae6bf17baea832f77a08e3ce94996cdb26c176716522b1a9f704376c7d645
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD57b464b1c60ebc38c58f7aa1e8bad12ae
SHA1f286517e9605031480b86d150af2699068972b8b
SHA256ea314851811e41b7598c899895962e1273ca62a6131bd7c63d56f112a12bccab
SHA5122a89d7b55e4ccdb2eec00fe5038d9ddcf9c8b3f224b515e5e12a4bf2775e0d4fae5f2804ddf0d2255a891543e8ce7d8802cb4ce578b07139fe845e430371a4ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5413ac9a7d8e85d6f3505c79db5d3c2d8
SHA1e0be26a7d012e140670818e752d5d0702d1a9ccd
SHA256fe86bf4de2ba5e65c83135a919f6335ee636bcb16f085c1d97d06b75913d7721
SHA512b86bf63e3a157dc6eaca6a06ad9b1c01cf9eb84090879f6bfda49d6c4bd81d96e1a46cf4249c9ce550f8a75f7c86623eb922a90a75926480936e0c9f8b06499c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5f6c4b87fddedea8c5625ead3c58e2d80
SHA1f6648d8056c658da085ddaf9efc2e6325a30d9b5
SHA25629f0e8ea68b49a978e2a0a224412fa4a3d156ff7040d095c7bbd73668d04d617
SHA5123af14cb821c8bc11c270f634804263e3ddcffb93d2a0534cdacd0d4ce74b0223ef2fae73788e7767eab0e4d1e139b34d218f3ee4355fac7c4d24f9883c19ef52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD583e963194dce64e1d7e9e3ff520bcba7
SHA1e78e7b7c8135f3f368d33fd8866dfd0da4e3964b
SHA25662d55a498c97becf8be84c4b52efb878402c46ec62a5b2cb0b042a5563f21062
SHA512cff4e709fab1bf6e934ec72525d1ed547db0ca62d1489c186eefb39846f51362bac9c0849c74771206d1c5d467b51a3e193eda3a4d0f05493c1a65dab68d974c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c17bb647-b419-4ef1-bf0f-ccd31a9e190d.tmpFilesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD510a2bdcb8c608cdcf352b52c7fdbe95f
SHA174a051343bbd6f3348f771658fd2537d7b5186a7
SHA256c987ee9615b1a5f06181c79b20252e02103331d56bb3eb212e0539faab20486b
SHA51262ff285cd8c0be271285948b89f600a996c8eea3c96a64fac730b5e046a6802fea8a45c523fb1a47994afec03bab103eb114749a08eb4a97ccefac8cb60b48ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD59371205649ea29d55f71b7c4d8191203
SHA1ee30edc93aecb7b600368ef346f9e6dea21c8528
SHA256d4b67b0729b16e1961ff9c6a81a29f3d294ee255ba07bc9bf549356474e64e99
SHA512f349e92bfca5eaf4b813aa1ecd9fa5faf7cb1127e48551c7c9fd124952911dc59caaca4ee165b343b18a92733eec46bf5b690162dc594c02976555694b0b854a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD58a55a52d0a2776562c903f91bcc5c51f
SHA19bef10045985c26c66451dc134f658c1dc0d4a10
SHA25630bf4094c8404d7a2f4054ba7c70984a448afd30607721ab79b9fbdc292a423e
SHA51220a9ad2a13dbf1a3d99e859e49950226dfe322934255b13dd7f2d3eb7e19b506796fa4a826de8314fc6d1a955db0e598a62856cf9418c625581bc8d930334799
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\activity-stream.discovery_stream.json.tmpFilesize
25KB
MD549aaed0036887221c7e176830e36a621
SHA1b9ea02016fe649fb1947e0c490c7101b14422057
SHA256100999f6f1a97f7d36833312b22d206d8e71d7ae271a7ff2e0c31d537cc44be4
SHA512a1a60686365ebe74940d5742156bd9e88aeba5a8c2f7ef4070bad21e47a86d3fc5737828dc08fc0d907a99170371e7386df7f0c7e652939646b2bc0e55ef4e40
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\activity-stream.discovery_stream.json.tmpFilesize
23KB
MD5b602917171ae572c64746294c40657cb
SHA1bfe5c35b31fb909914300c3abb5c109b18b61c77
SHA256b4d47558fdaf45f5688d07c4d6414bc9d860a5efde8b88c6ce2d501c8fcf5f5f
SHA51232c72f8806541a4387ae2b322829142cb2b26d95b68473b85fc270ee68ba97f8a721d5c6b7ea00359ecc3f844f184ef3ece80335f99d50f388483663039670cb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\cache2\doomed\23049Filesize
11KB
MD5bb2777de86cf06689ecd11181572a1ae
SHA1f919000e4dce8ced7ab58aff9db79ce750da7917
SHA25621b6d8c8da1d044f21f564196bd294fca3c618f992a148271f95472a62dddf5b
SHA512b55f060408cfc75d133d24b1099f1fb31d03de87079100d5c4f0058c9583f8f08ff34532a5a14037b7dd86e03afd189ef8f49e1cc8dff854c63e88432a601155
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\cache2\doomed\26163Filesize
11KB
MD59387e3ae726816074cf306574ae41957
SHA1719347fbf646cb341546eb0f00a4f4cca696e5c6
SHA2567e85af9c5bd61c144f3a1d8c8b2a90864d26d2884b1db4f73132402c3ab6067c
SHA512c59ec6c9678da0d1bca1ed99a876031f8b95c30f012521760c452524735618a0303d3efc36da6e9a854a99cbb1df01fff68b512e8d9f1113742a54468ebb98ce
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\cache2\doomed\7507Filesize
15KB
MD5cda1a6b64faf396a32abcd0b2088fa59
SHA1f6fd148e96adfe6839d188d160c4e468b5417958
SHA2563fd7ba10771a0052d327276132fd1d7be1f91387d45f9c2cab69bb96acba3e24
SHA51255f7eee235d4d64e45f7f0e166aaef6ee4a9721c59736f7729d0c152903c7aeba463a5221d7906efa79c1e67760f7333f333638e7abc7f9b10d50634f0c00065
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\cache2\entries\C72D4296C2EBC6FD41A9F780CD0C8F30F0FF937CFilesize
13KB
MD5bc7d992a3c025468526d534e6b1653b1
SHA10ca174807bc740048c5fe6af4ea55c39a380a8a7
SHA2569f84cf7b5ace28b4d20508c854edf0ec57caf5fc6ba30231556e2532f85a5911
SHA5125283c075f1dfb19a6af12ae60f403eea167270d657e9f43d098858abd3964a82f7ecb1cdd9b9b873b195ab7702ed140742989c5e53124a8ed4d8596ea95daea6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\cache2\entries\CC9AFF3BE02AD27708D587AE49B3DC68644172BAFilesize
13KB
MD5d9caa68ac97fb7495f930a3af123ac29
SHA1678f73f003c5c53cfde95613e23cea9ecd0a05c7
SHA2561bfb3d2cc08202df749c9e9d0cc0e0f6e06ca328eec3aa35031a0d1a97e1891a
SHA512238c9c78f93cc17007de007e2b02227207f75e6f20ff674dfa3b4156b97afb05d673153e7654fa234d56b730381397a33baef2e042bf759c16894d7e8a45a171
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_arts_and_entertainment.jsonFilesize
67KB
MD56c651609d367b10d1b25ef4c5f2b3318
SHA10abcc756ea415abda969cd1e854e7e8ebeb6f2d4
SHA256960065cc44a09bef89206d28048d3c23719d2f5e9b38cfc718ca864c9e0e91e9
SHA5123e084452eefe14e58faa9ef0d9fda2d21af2c2ab1071ae23cde60527df8df43f701668ca0aa9d86f56630b0ab0ca8367803c968347880d674ad8217fba5d8915
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_autos_and_vehicles.jsonFilesize
44KB
MD539b73a66581c5a481a64f4dedf5b4f5c
SHA190e4a0883bb3f050dba2fee218450390d46f35e2
SHA256022f9495f8867fea275ece900cfa7664c68c25073db4748343452dbc0b9eda17
SHA512cfb697958e020282455ab7fabc6c325447db84ead0100d28b417b6a0e2455c9793fa624c23cb9b92dfea25124f59dcd1d5c1f43bf1703a0ad469106b755a7cdd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_beauty_and_fitness.jsonFilesize
33KB
MD50ed0473b23b5a9e7d1116e8d4d5ca567
SHA14eb5e948ac28453c4b90607e223f9e7d901301c4
SHA256eed46e8fe6ff20f89884b4fc68a81e8d521231440301a01bb89beec8ebad296b
SHA512464508d7992edfa0dfb61b04cfc5909b7daacf094fc81745de4d03214b207224133e48750a710979445ee1a65bb791bf240a2b935aacaf3987e5c67ff2d8ba9c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_blogging_resources_and_services.jsonFilesize
33KB
MD5c82700fcfcd9b5117176362d25f3e6f6
SHA1a7ad40b40c7e8e5e11878f4702952a4014c5d22a
SHA256c9f2a779dba0bc886cc1255816bd776bdc2e8a6a8e0f9380495a92bb66862780
SHA512d38e65ab55cee8fef538ad96448cd0c6b001563714fc7b37c69a424d0661ec6b7d04892cf4b76b13ddbc7d300c115e87e0134d47c3f38ef51617e5367647b217
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_books_and_literature.jsonFilesize
67KB
MD5df96946198f092c029fd6880e5e6c6ec
SHA19aee90b66b8f9656063f9476ff7b87d2d267dcda
SHA256df23a5b6f583ec3b4dce2aca8ff53cbdfadfd58c4b7aeb2e397eade5ff75c996
SHA51243a9fc190f4faadef37e01fa8ad320940553b287ed44a95321997a48312142f110b29c79eed7930477bfb29777a5a9913b42bf22ce6bb3e679dda5af54a125ea
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_business_and_industrial.jsonFilesize
45KB
MD5a92a0fffc831e6c20431b070a7d16d5a
SHA1da5bbe65f10e5385cbe09db3630ae636413b4e39
SHA2568410809ebac544389cf27a10e2cbd687b7a68753aa50a42f235ac3fc7b60ce2c
SHA51231a8602e1972900268651cd074950d16ad989b1f15ff3ebbd8e21e0311a619eef4d7d15cdb029ea8b22cf3b8759fa95b3067b4faaadcb90456944dbc3c9806a9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_computers_and_electronics.jsonFilesize
45KB
MD56ccd943214682ac8c4ec08b7ec6dbcbd
SHA118417647f7c76581d79b537a70bf64f614f60fa2
SHA256ab20b97406b0d9bf4f695e5ec7db4ebad5efb682311e74ca757d45b87ffc106b
SHA512e57573d6f494df8aa7e8e6a20427a18f6868e19dc853b441b8506998158b23c7a4393b682c83b3513aae5075a21148dd8ca854a11dabcea6a0a0db8f2e6828b8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_finance.jsonFilesize
33KB
MD5e95c2d2fc654b87e77b0a8a37aaa7fcf
SHA1b4b00c9554839cab6a50a7ed8cd43d21fdaf35dc
SHA256384bf5fcc6928200c7ebb1f03f99bf74f6063e78d3cd044374448f879799318e
SHA5129696998a8d0e3a85982016ff0a22bb8ae1790410f1f6198bb379c0a192579f24c75c25c7648b76b00d25a32ac204178acaccd744ee78846dfc62ebf70bf7b93a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_food_and_drink.jsonFilesize
67KB
MD570ba02dedd216430894d29940fc627c2
SHA1f0c9aa816c6b0e171525a984fd844d3a8cabd505
SHA256905357002f2eced8bba1be2285a9b83198f60d2f9bb1144b5c119994f2ec6e34
SHA5123ae60d0bf3c45d28e340d97106790787be2cc80ba579d313b5414084664b86e89879391c99e94b6e33bdc5508ea42a9fd34f48ca9b1e7adfa7b6dd22c783c263
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_games.jsonFilesize
44KB
MD54182a69a05463f9c388527a7db4201de
SHA15a0044aed787086c0b79ff0f51368d78c36f76bc
SHA25635e67835a5cf82144765dfb1095ebc84ac27d08812507ad0a2d562bf68e13e85
SHA51240023c9f89e0357fae26c33a023609de96b2a0b439318ef944d3d5b335b0877509f90505d119154eaa81e1097ecfb5aa44dd8bb595497cdecfc3ee711a1fe1d5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_health.jsonFilesize
33KB
MD511711337d2acc6c6a10e2fb79ac90187
SHA15583047c473c8045324519a4a432d06643de055d
SHA256150f21c4f60856ab5e22891939d68d062542537b42a7ce1f8a8cec9300e7c565
SHA512c2301ed72f623b22f05333c5ecc5ebf55d8a2d9593167cc453a66d8f42c05ff7c11e2709b6298912038a8ea6175f050bbc6d1fc4381f385f7ad7a952ad1e856b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_hobbies_and_leisure.jsonFilesize
67KB
MD5bb45971231bd3501aba1cd07715e4c95
SHA1ea5bfd43d60a3d30cda1a31a3a5eb8ea0afa142a
SHA25647db7797297a2a81d28c551117e27144b58627dbac1b1d52672b630d220f025d
SHA51274767b1badbd32cacd3f996b8172df9c43656b11fea99f5a51fff38c6c6e2120fae8bdd0dd885234a3f173334054f580164fdf8860c27cbcf5fb29c5bcdc060d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_home_and_garden.jsonFilesize
33KB
MD5250acc54f92176775d6bdd8412432d9f
SHA1a6ad9ad7519e5c299d4b4ba458742b1b4d64cb65
SHA25619edd15ebce419b83469d2ab783c0c1377d72a186d1ff08857a82bca842eea54
SHA512a52c81062f02c15701f13595f4476f0a07735034fcf177b1a65b001394a816020ee791fed5afae81d51de27630b34a85efa717fe80da733556fdda8739030f49
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_internet_and_telecom.jsonFilesize
67KB
MD536689de6804ca5af92224681ee9ea137
SHA1729d590068e9c891939fc17921930630cd4938dd
SHA256e646d43505c9c4e53dbaa474ef85d650a3f309ccf153d106f328d9b6aeb66d52
SHA5121c4f4aa02a65a9bbdf83dc5321c24cbe49f57108881616b993e274f5705f0466be2dd3389055a725b79f3317c98bdf9f8d47f86d62ebd151e4c57cc4dca2487c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_jobs_and_education.jsonFilesize
33KB
MD52d69892acde24ad6383082243efa3d37
SHA1d8edc1c15739e34232012bb255872991edb72bc7
SHA25629080288b2130a67414ecb296a53ddd9f0a4771035e3c1b2112e0ce656a7481a
SHA512da391152e1fbce1f03607b486c5dea9a298a438e58e440ebb7b871bd5c62d7339b540eed115b4001b9840de1ba3898c6504872ff9094ba4d6a47455051c3f1c5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_law_and_government.jsonFilesize
68KB
MD580c49b0f2d195f702e5707ba632ae188
SHA1e65161da245318d1f6fdc001e8b97b4fd0bc50e7
SHA256257ee9a218a1b7f9c1a6c890f38920eb7e731808e3d9b9fc956f8346c29a3e63
SHA512972e95de7fe330c61cd22111bd3785999d60e7c02140809122d696a1f1f76f2cd0d63d6d92f657cdec24366d66b681e24f2735a8aabb8bcecec43c74e23fb4f5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_online_communities.jsonFilesize
67KB
MD537a74ab20e8447abd6ca918b6b39bb04
SHA1b50986e6bb542f5eca8b805328be51eaa77e6c39
SHA25611b6084552e2979b5bc0fd6ffdc61e445d49692c0ae8dffedc07792f8062d13f
SHA51249c6b96655ba0b5d08425af6815f06237089ec06926f49de1f03bc11db9e579bd125f2b6f3eaf434a2ccf10b262c42af9c35ab27683e8e9f984d5b36ec8f59fd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_people_and_society.jsonFilesize
45KB
MD5b1bd26cf5575ebb7ca511a05ea13fbd2
SHA1e83d7f64b2884ea73357b4a15d25902517e51da8
SHA2564990a5d17bea15617624c48a0c7c23d16e95f15e2ec9dd1d82ee949567bbaec0
SHA512edcede39c17b494474859bc1a9bbf18c9f6abd3f46f832086db3bb1337b01d862452d639f89f9470ca302a6fcb84a1686853ebb4b08003cb248615f0834a1e02
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_pets_and_animals.jsonFilesize
44KB
MD55b26aca80818dd92509f6a9013c4c662
SHA131e322209ba7cc1abd55bbb72a3c15bc2e4a895f
SHA256dd537bfb1497eb9457c0c8ecbd2846f325e13ddef3988fd293a29e68ab0b2671
SHA51229038f9f3b9b12259fb42daa93cdefabb9fb32a10f0d20f384a72fe97214eff1864b7fa2674c37224b71309d7d9cea4e36abd24a45a0e65f0c61dc5ca161ec7c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_real_estate.jsonFilesize
67KB
MD59899942e9cd28bcb9bf5074800eae2d0
SHA115e5071e5ed58001011652befc224aed06ee068f
SHA256efcf6b2d09e89b8c449ffbcdb5354beaa7178673862ebcdd6593561f2aa7d99a
SHA5129f7a5fbe6d46c694e8bc9b50e7843e9747ea3229cf4b00b8e95f1a5467bd095d166cbd523b3d9315c62e9603d990b8e56a018ba4a11d30ad607f5281cc42b4cd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_reference.jsonFilesize
56KB
MD5567eaa19be0963b28b000826e8dd6c77
SHA17e4524c36113bbbafee34e38367b919964649583
SHA2563619daa64036d1f0197cdadf7660e390d4b6e8c1b328ed3b59f828a205a6ea49
SHA5126766919b06ca209eaed86f99bee20c6dad9cc36520fc84e1c251a668bcfe0afcf720ea6c658268dc3bbaaf602bfdf61eb237c68e08d5252ea6e5d1d2a373b9fe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_science.jsonFilesize
56KB
MD57a8fd079bb1aeb4710a285ec909c62b9
SHA18429335e5866c7c21d752a11f57f76399e5634b6
SHA2569606ce3988b2d2a4921b58ac454f54e53a9ea8f358326522a8b1dcc751b50b32
SHA5128fc1546e509b5386c9e1088e0e3a1b81f288ef67f1989f3e83888057e23769907a2b184d624a4e4c44fcd5b88d719bd4cca94dfb33798804a721b8be022ec0c6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_shopping.jsonFilesize
67KB
MD597d4a0fd003e123df601b5fd205e97f8
SHA1a802a515d04442b6bde60614e3d515d2983d4c00
SHA256bfd7e68ddca6696c798412402965a0384df0c8c209931bbadabf88ccb45e3bb6
SHA512111e8a96bc8e07be2d1480a820fc30797d861a48d80622425af00b009512aacb30a2df9052c53bfbf4ee0800b6e6f5b56daa93d33f30fecb52e2f3850dfa9130
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_sports.jsonFilesize
56KB
MD5ce4e75385300f9c03fdd52420e0f822f
SHA185c34648c253e4c88161d09dd1e25439b763628c
SHA25644da98b03350e91e852fe59f0fc05d752fc867a5049ab0363da8bb7b7078ad14
SHA512d119dc4706bbf3b6369fe72553cfacf1c9b2688e0188a7524b56d3e2ac85582a18bbee66d5594e0fb40767432646c23bf3e282090bd9b4c29f989a374aeae61f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\nb_model_build_attachment_travel.jsonFilesize
67KB
MD548139e5ba1c595568f59fe880d6e4e83
SHA15e9ea36b9bb109b1ecfc41356cd5c8c9398d4a78
SHA2564336ac211a822b0a5c3ce5de0d4730665acc351ee1965ea8da1c72477e216dfa
SHA51257e826f0e1d9b12d11b05d47e2f5ae4f5787537862f26e039918cb14faff4bc854298c0b7de3023e371756a331c0f3ee1aa7cebbbf94ec70cdfc29e00a900ed1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4p84urxf.default-release\personality-provider\recipe_attachment.jsonFilesize
1KB
MD5be3d0f91b7957bbbf8a20859fd32d417
SHA1fbc0380fe1928d6d0c8ab8b0a793a2bba0722d10
SHA256fc07d42847eeaf69dcbf1b9a16eb48b141c11feb67aa40724be2aee83cb621b7
SHA5128da24afcf587fbd4f945201702168e7cfc12434440200d00f09ddcd1d1d358a5e01065ac2a411fdf96a530e94db3697e3530578b392873cf874476b5e65d774a
-
C:\Users\Admin\AppData\Local\Roblox\Downloads\roblox-player\0106ef73f91b2bf65b225d25ca66840eFilesize
5.6MB
MD50106ef73f91b2bf65b225d25ca66840e
SHA1a6d345114879d6f7bba0352bab4e80a2688518e6
SHA2565ee503ec8e7fbc6a32d20b97dbaf5e1c85bfbaf31f8e393cbe20d654dd86760e
SHA512544013691c28f6e1741d65c96c461b7850c0ee0f3a27c8ca1d631fe5df1733aba3e78fcc94c6f96b602d5fb351d9f843cd593f413114482b9816e4422aa33aaf
-
C:\Users\Admin\AppData\Local\Temp\tmpaddonFilesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
C:\Users\Admin\AppData\Local\Temp\tmpaddon-1Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-msFilesize
5KB
MD5cc5f6712b0f6f40bf61d8c45506c5b22
SHA1a8e00810d8dce1f88ee47b8b4f3324a4e43e5d7f
SHA256732ffea6f9cf4f1ce5885b9ba336650e83b6bb6faf6ce1a007d4fad8432d5671
SHA512c2f71210c472e82d5bb8c037262a69a6729f6b6b69805ce427d37e952a35ef1c334e32a2162003f5c21a5a3972f8ae2c949f6b69e2e58fad82604e6167528297
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\AlternateServices.txtFilesize
743B
MD5820e0175c555d464dbc77b8db8e9907b
SHA1eada1e391a17817b936d235dea0a4c35c6db5293
SHA2567a1f7682487962c24bdcc6bdc6b2e07bd9f6e1954214b20abcc8cb36c137d7f5
SHA5128ab4dfb6046d3d27e55431b814723e94cdbe42eb8937282404200f9add200bc77b9ed391e106a4581268fd0b732c9509bebe84e5333d096ae05166505be1ccbc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\bookmarkbackups\bookmarks-2024-04-25_11_4vRn4xgoFylhmlhKaysslA==.jsonlz4Filesize
1004B
MD5fb8c27cb6ea719ed05ad601da7b4bafc
SHA19e13c8c86d94ce2bf3526e928497be4b8ed9d255
SHA256a36fba24df564dc278a13bdacc530dd1693f35eb9feb3c85ce9b6d1726712465
SHA5129b7343484721a8a0e0b79c627f739a7334cedc5d5db4eb3e1b383845135be1c029079754e68fa1279cb5aadac84fead2bbdc6d7a80065892ab15f7489852563f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\broadcast-listeners.jsonFilesize
216B
MD549a4af5158b666845850d4fb5705d108
SHA12b6eca9c8987eef6ac0b54073dd1ff23f9227b2f
SHA256ca078582c5a8c085ce8e8a234ceb62706f21ce7d3d693d213253e36cc9c9c932
SHA512a66470798d8a18f16b5e0303aec2b7e04e76cf5e88da93b007e2002cd900851b942de5e5d355e5b4e761c17d1e155745469d101111b5f261225aab6f83b727fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\extensions.json.tmpFilesize
37KB
MD5a44f66a39ee03281afb8a70e596f793d
SHA1941010f95083927eb2b516ff854615046238f736
SHA256d1b431ba576a2f8692d2af4e6236da1bf038dc15bb4b532a6751cfdbbc66a1fd
SHA512eaa49811c236e80a4e65eda12853bea9aa501a883731917db8e610933a43be06a7b9a27b2c0686ab2edced823fa711b3e406ab39e3c99a2e8e683e6211ea8f40
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dllFilesize
997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.infoFilesize
116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txtFilesize
479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\gmp-widevinecdm\4.10.2557.0\manifest.jsonFilesize
372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dllFilesize
11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.libFilesize
1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sigFilesize
1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\prefs-1.jsFilesize
7KB
MD503c9487112886d8b8fd740a3fb4b9358
SHA1de8c16d5d96fee4c79bad6fc5505e54f1ad324c7
SHA25638815a652c04f70dfeba128dca14237342d8cb05cdafe993d512c070dfef7627
SHA5124f7d97ec5dca9c1b942c32930997c59eb611f9b2fb38c2295872a34e4de8c1cd35e2061871b58391e646858923e36feff072c8fb1021b179ea8dfe3623a68d84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\prefs-1.jsFilesize
10KB
MD53422b3984142d4cd84e092936af572d3
SHA19431eee1151025ee9a2cb0e4ca1283fe9a134fca
SHA256891af03bbb4a50c3c43fc711bdfe1b2b8545461e6f1d0e09a6ed6def1ce236fe
SHA5125c909dc6a7bf69bbe9b6f244667c43326315cef4f1530ded6ae1f3f0fa0bd3eef2cce8ae2e85e0f0c4bf5bd450a48827b5146b820438785f725fe4c79bfb9580
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\prefs-1.jsFilesize
11KB
MD596234e4a2aed706c88849c4ba7d8e118
SHA12cc0a28c5490dba4757c7f8be8a7b79ed1f0d767
SHA256107c2b10d229d8aa1aa85121d7f33adb0e518638dfbc29bc5c80ab7fe73de1f2
SHA5128367213c9ca87c0f160879846cadfccfca09b2d939036712dc49e9e724280c73afcd232ab8322e6c7d7008f7eccb06e5e00d59dde1b0ba4e40221614193315cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\prefs-1.jsFilesize
7KB
MD59bc62052f007c91b0546563306256391
SHA1a12709e7ae69d8911fddb01d9d133c6a40d89de2
SHA256e24afcdade98add0769952948653e40ae47fc90c1a64badbe648b1b9f0014347
SHA5122f0f18df4ca277d9acb2db2cafe59b85c5836565a6a44ea775217444ed0591d64d0f350125ac76ddbf7ed7e07b50541300af2f2ba6b802d799e069a29a00dd04
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\prefs.jsFilesize
11KB
MD5529c0165c3e860b0be903b82a3c92dc1
SHA1e5cf18f7c4cc70711f96a3e40e6cfb3bb29e4b56
SHA256d0aead56de016392adf61316b79af38a6726348b1bc4d0156f53f18b2c31e074
SHA512fe051d468d9890c49ee97d4a94ff172fcdd8ca2ab4b49a9b4ba185b5c522da459bde06c535f40978c18782733f3f78cf76a662650e0ad34c6878c389825d8e5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\prefs.jsFilesize
6KB
MD5fa00bc6d4501b419130f9a749ac770a6
SHA1b7b2374c9a0cdab6aa9ec7538bbe25a0c133e225
SHA256f2203dccc898f27ee4b9fe3b853a16ece16bd890ac115c7ed656a32e21598d21
SHA5120494639e3688fd0bd756ddd6e7e196a202b22128489dde6600fb098630e5535e570de32bf740567e2a5865777da3f0fa7132232165896638f881d38b1fe11e51
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\prefs.jsFilesize
6KB
MD556c0e72e38e4af7d194d4dcf2983ad8d
SHA1d17374a94234824df86ab81d4d227352ce0f352a
SHA25665f2636794ea9c125d6ac5181fe771a319ed9f9c3bffb51884c183fb854339d8
SHA512be4ade725b20aaff01fd5ba1025541024554ed71952c2694a179df1c2abb1c369b8bff9ec8ec46f72e12c1b619142d17f52763ee8026e691c3ea341f0de3801f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\sessionCheckpoints.jsonFilesize
90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD513eb984fe2613960fcdf7518dc958f42
SHA1f22d90c6e944bfab94d6f374a1e22e3a8cbe7bb6
SHA25636d294f23a43e2ae4c0e804d16f2876ff8063fb7db4939a4019ce768ce266b12
SHA512f25c54d7f6c435c9ffe64b9a256738c69805d823e7c2db7ca86c6f0d5301ebf85aef5a2020f83eb22dc7b8752362957b94c81a54fb945ff3919ff35adae6642f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4p84urxf.default-release\targeting.snapshot.jsonFilesize
4KB
MD583a4246639d5f1148b1e3f48dc801b5f
SHA10fa5036dfd0cde4b5c1462c973344b45cb7aa0eb
SHA25663719a684b4e05c7d7bb570a11b6acba293e75b346327d7695e68d1645969ff7
SHA5126752df0d8864d99e3986001821160149aa5edfe3aa29ec26bd0df1b95786d891781a9687c16d31a4bbf6abf869d8e71b6a840b3f2567ef50678a78d3def48543
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exeFilesize
5.2MB
MD50c1b8a4ef9d42a8bb164a9cb3c6d5f13
SHA1ae69fa0b3266efe502b5c6fcfce897de61db027f
SHA2562c06eec63b04eb812ee682e56d9d70896b15d1c647929e26f9d85cd383e667f3
SHA512882821984373f14d1d245d1bbea77b77bc92fe9012604da0151835c5822c25289ded8cbb76663fa29d36f231b28d8057a7a835f49b97761fe89f7c727e563dfc
-
\??\pipe\LOCAL\crashpad_1232_SQDFBPEUMAVQGYWGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/4604-920-0x000001DF840D0000-0x000001DF840D1000-memory.dmpFilesize
4KB
-
memory/4604-919-0x000001DF84040000-0x000001DF84041000-memory.dmpFilesize
4KB
-
memory/4604-923-0x000001DF840E0000-0x000001DF840E1000-memory.dmpFilesize
4KB
-
memory/4604-922-0x000001DF840E0000-0x000001DF840E1000-memory.dmpFilesize
4KB
-
memory/4604-921-0x000001DF840D0000-0x000001DF840D1000-memory.dmpFilesize
4KB
-
memory/4604-917-0x000001DF84040000-0x000001DF84041000-memory.dmpFilesize
4KB
-
memory/4604-904-0x000001DFFB330000-0x000001DFFB340000-memory.dmpFilesize
64KB
-
memory/4604-908-0x000001DFFB370000-0x000001DFFB380000-memory.dmpFilesize
64KB
-
memory/4604-915-0x000001DFFFFC0000-0x000001DFFFFC1000-memory.dmpFilesize
4KB
-
memory/9772-5361-0x00007FFADFF00000-0x00007FFAE044C000-memory.dmpFilesize
5.3MB
-
memory/9772-5474-0x0000023309EA0000-0x0000023309EB0000-memory.dmpFilesize
64KB
-
memory/9772-5363-0x00007FF60E070000-0x00007FF60F070000-memory.dmpFilesize
16.0MB
-
memory/9772-5364-0x00007FFAF5730000-0x00007FFAF5B32000-memory.dmpFilesize
4.0MB
-
memory/9772-5369-0x0000023309EA0000-0x0000023309EB0000-memory.dmpFilesize
64KB
-
memory/9772-5362-0x00007FFAF5730000-0x00007FFAF5B32000-memory.dmpFilesize
4.0MB
-
memory/9968-5394-0x00007FFB11DC0000-0x00007FFB11DF0000-memory.dmpFilesize
192KB
-
memory/9968-5387-0x00007FFB13830000-0x00007FFB13840000-memory.dmpFilesize
64KB
-
memory/9968-5390-0x00007FFB11C50000-0x00007FFB11C60000-memory.dmpFilesize
64KB
-
memory/9968-5389-0x00007FFB11B40000-0x00007FFB11B50000-memory.dmpFilesize
64KB
-
memory/9968-5384-0x00007FFB13830000-0x00007FFB13840000-memory.dmpFilesize
64KB
-
memory/9968-5383-0x00007FFB13830000-0x00007FFB13840000-memory.dmpFilesize
64KB
-
memory/9968-5382-0x00007FFB13810000-0x00007FFB13820000-memory.dmpFilesize
64KB
-
memory/9968-5380-0x00007FFB13780000-0x00007FFB13790000-memory.dmpFilesize
64KB
-
memory/9968-5409-0x00007FFB14090000-0x00007FFB1409B000-memory.dmpFilesize
44KB
-
memory/9968-5490-0x0000020A5F5D0000-0x0000020A5F5D1000-memory.dmpFilesize
4KB
-
memory/9968-5410-0x00007FFB14090000-0x00007FFB1409B000-memory.dmpFilesize
44KB
-
memory/9968-5404-0x00007FFB14070000-0x00007FFB14080000-memory.dmpFilesize
64KB
-
memory/9968-5403-0x00007FFB12520000-0x00007FFB1252E000-memory.dmpFilesize
56KB
-
memory/9968-5400-0x00007FFB12520000-0x00007FFB1252E000-memory.dmpFilesize
56KB
-
memory/9968-5398-0x00007FFB12470000-0x00007FFB12480000-memory.dmpFilesize
64KB
-
memory/9968-5397-0x00007FFB12470000-0x00007FFB12480000-memory.dmpFilesize
64KB
-
memory/9968-5392-0x00007FFB11DC0000-0x00007FFB11DF0000-memory.dmpFilesize
192KB
-
memory/9968-5395-0x00007FFB11DC0000-0x00007FFB11DF0000-memory.dmpFilesize
192KB
-
memory/9968-5396-0x00007FFB11DC0000-0x00007FFB11DF0000-memory.dmpFilesize
192KB
-
memory/9968-5393-0x00007FFB11DC0000-0x00007FFB11DF0000-memory.dmpFilesize
192KB
-
memory/9968-5388-0x00007FFB11B40000-0x00007FFB11B50000-memory.dmpFilesize
64KB
-
memory/9968-5385-0x00007FFB13830000-0x00007FFB13840000-memory.dmpFilesize
64KB
-
memory/9968-5386-0x00007FFB13830000-0x00007FFB13840000-memory.dmpFilesize
64KB
-
memory/9968-5391-0x00007FFB11C50000-0x00007FFB11C60000-memory.dmpFilesize
64KB
-
memory/9968-5381-0x00007FFB13810000-0x00007FFB13820000-memory.dmpFilesize
64KB
-
memory/9968-5379-0x00007FFB13780000-0x00007FFB13790000-memory.dmpFilesize
64KB
-
memory/9968-5367-0x00007FFB14210000-0x00007FFB14220000-memory.dmpFilesize
64KB
-
memory/9968-5372-0x00007FFB14370000-0x00007FFB143A0000-memory.dmpFilesize
192KB
-
memory/9968-5376-0x00007FFB14370000-0x00007FFB143A0000-memory.dmpFilesize
192KB
-
memory/9968-5377-0x00007FFB14400000-0x00007FFB14405000-memory.dmpFilesize
20KB
-
memory/9968-5375-0x00007FFB14370000-0x00007FFB143A0000-memory.dmpFilesize
192KB
-
memory/9968-5373-0x00007FFB14370000-0x00007FFB143A0000-memory.dmpFilesize
192KB
-
memory/9968-5371-0x00007FFB14370000-0x00007FFB143A0000-memory.dmpFilesize
192KB
-
memory/9968-5399-0x00007FFB12520000-0x00007FFB1252E000-memory.dmpFilesize
56KB
-
memory/9968-5370-0x00007FFB14320000-0x00007FFB14330000-memory.dmpFilesize
64KB
-
memory/9968-5368-0x00007FFB14320000-0x00007FFB14330000-memory.dmpFilesize
64KB
-
memory/9968-5366-0x00007FFB14210000-0x00007FFB14220000-memory.dmpFilesize
64KB
-
memory/9968-5360-0x0000020A5F5D0000-0x0000020A5F5D1000-memory.dmpFilesize
4KB
-
memory/9968-5401-0x00007FFB12520000-0x00007FFB1252E000-memory.dmpFilesize
56KB
-
memory/9968-5402-0x00007FFB12520000-0x00007FFB1252E000-memory.dmpFilesize
56KB
-
memory/9968-5405-0x00007FFB14070000-0x00007FFB14080000-memory.dmpFilesize
64KB
-
memory/9968-5406-0x00007FFB14090000-0x00007FFB1409B000-memory.dmpFilesize
44KB
-
memory/9968-5407-0x00007FFB14090000-0x00007FFB1409B000-memory.dmpFilesize
44KB
-
memory/9968-5408-0x00007FFB14090000-0x00007FFB1409B000-memory.dmpFilesize
44KB
-
memory/9968-5411-0x00007FFB12100000-0x00007FFB12110000-memory.dmpFilesize
64KB
-
memory/9968-5412-0x00007FFB12100000-0x00007FFB12110000-memory.dmpFilesize
64KB