Analysis
-
max time kernel
772s -
max time network
773s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
RobloxPlayerInstaller.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RobloxPlayerInstaller.exe
Resource
win10v2004-20240508-en
General
-
Target
RobloxPlayerInstaller.exe
-
Size
5.3MB
-
MD5
666f69bae6e56a62b7af6cb8496f677f
-
SHA1
ae052de936deeebe5fb8d8c059eb84fa38707c4d
-
SHA256
586adc8fe02d5ac562fbc338df3555732d9d0b77db7cad306aadec22447ce6f8
-
SHA512
ee479171bf4dbc0b7d690202e0a6c09ba88cac1a1a34e4f115c9d0c65f1ca752cf3d180d6047fa1066da933a48e8cac070d4f1dceec8abfd8ee1ab3590ff50ee
-
SSDEEP
98304:TYvoKhqqe2nun4wPPPJ+epgFnve4ryC+zEG1O1uFf:EZhPDMH3hgpQCkE6wKf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\!BCILauncher = "\"C:\\Windows\\Temp\\MUBSTemp\\BCILauncher.EXE\" bgaupmi=8ABE219D2CC145368DEF73C0F6D9FEFB" BGAUpdate.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxStudioInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxStudioBeta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe -
Downloads MZ/PE file
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 7 IoCs
pid Process 1056 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 860 RobloxPlayerBeta.exe 332 RobloxPlayerBeta.exe 4524 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 28 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\studio_svg_textures\Shared\WidgetIcons\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\studio_svg_textures\Shared\Navigation\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\scripts\CoreScripts\Modules\PlayerList\Components\Connection\EventConnection.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\RoduxNetworking\RoduxNetworking\PATCH.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\ui\Controls\PlayStationController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\PlatformContent\pc\textures\water\normal_04.dds RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\scripts\PlayerScripts\StarterPlayerScripts\PlayerModule.module\CameraModule\ZoomController.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\jtaylor_mock\mock\AnyCallMatches.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\UserProfiles\Dev\ReactRoblox.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\ui\LegacyRbxGui\Cement.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\ExtraContent\textures\ui\AvatarExperience\glowLight.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\DeveloperFramework\Votes\rating_small.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\studio_svg_textures\Shared\InsertableObjects\Dark\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\studio_svg_textures\Shared\InsertableObjects\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\Thumbnailing.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\QRCode\QRCode\qrcode.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\ReactDevtoolsShared\Shared.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\TagEditor\lineargradient.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\GameProductInfoRodux\GameProductInfoRodux\default.rbxp RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\ui\LegacyRbxGui\Gold.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\StudioFonts\NotoSansCJK-Medium.ttc RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\tutils-04e2814e-937da4f7\tutils\tableDifference.spec.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\GameDetail\Rodux.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\scripts\CoreScripts\Modules\InGameMenu\ExperienceMenuABTestManager.spec.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\ApolloClient\ApolloClient\utilities\common\filterInPlace.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\ui\LegacyRbxGui\health_greenBar.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\ExtraContent\textures\ui\LuaApp\graphic\profilemask_36.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\RoactNavigation\RoactNavigation\BackBehavior.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\ExperienceAnalytics\SharedFlags.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\ExtraContent\textures\ui\LuaApp\icons\ic-add.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\textures\ui\Settings\Help\ZoomGesture.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\scripts\CoreScripts\Modules\PurchasePrompt\Thunks\resolveBundlePromptState.spec.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\Rodux\Rodux\thunkMiddleware.spec.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\FriendsCarousel\PlayerContextualMenu.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\FitFrame.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\SocialTab\RoactRodux.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\LightThemeLoadingCircle.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\ui\dialog_purpose_quest.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\ExtraContent\textures\ui\LuaApp\graphic\light_bg.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\textures\Cursors\Gamepad\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\textures\ui\Controls\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\studio_svg_textures\Shared\Navigation\Dark\Standard\ArrowLeft.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\NetworkingGames-1.2.0\NetworkingGames\buildApiSiteUrl.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\textures\ui\Controls\XboxController\ButtonY.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\GameThumbnailsRodux\Rodux.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\ui\Controls\XboxController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\textures\ui\Emotes\Small\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\studio_svg_textures\Shared\InsertableObjects\Dark\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\scripts\CoreScripts\Modules\PurchasePrompt\Actions\PurchaseCompleteRecieved.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\ui\VoiceChat\Unmuted60.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\textures\ui\VoiceChat\MicLight\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\scripts\CoreScripts\Modules\DevConsole\Components\Log\LogOutput.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Packages\_Index\JestReporters-3.5.0\JestReporters\BaseReporter.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\AvatarToolsShared\RoundedBackgroundLeft.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\Qml\QtQuick\Controls.2\designer\images\pageindicator-icon16.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\Qml\QtQuick\Controls.2\Fusion\SwitchIndicator.qml RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\studio_svg_textures\Shared\WidgetIcons\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\InviteLinkExpiredModal\Dev\ReactRoblox.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\QueryRefetch\React.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\content\textures\ui\VoiceChat\MicLight\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\textures\LayeredClothingEditor\Default_Preview_Clothing.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\content\studio_svg_textures\Lua\AssetManager\Dark\Large\AudioFolder.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\SocialCommonTestSuite\ApolloShareLinks.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EU7755.tmp\MicrosoftEdgeUpdateCore.exe MicrosoftEdgeUpdateSetup_X86_1.3.187.39.exe -
Executes dropped EXE 53 IoCs
pid Process 1000 MicrosoftEdgeWebview2Setup.exe 3188 MicrosoftEdgeUpdate.exe 4528 MicrosoftEdgeUpdate.exe 2756 MicrosoftEdgeUpdate.exe 2232 MicrosoftEdgeUpdateComRegisterShell64.exe 4612 MicrosoftEdgeUpdateComRegisterShell64.exe 3968 MicrosoftEdgeUpdateComRegisterShell64.exe 624 MicrosoftEdgeUpdate.exe 4508 MicrosoftEdgeUpdate.exe 4348 MicrosoftEdgeUpdate.exe 4352 MicrosoftEdgeUpdate.exe 3856 MicrosoftEdge_X64_125.0.2535.79.exe 3432 setup.exe 4672 setup.exe 464 MicrosoftEdgeUpdate.exe 1056 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 1632 RobloxStudioInstaller.exe 2616 RobloxStudioInstaller.exe 3832 RobloxPlayerBeta.exe 4136 RobloxStudioBeta.exe 4220 RobloxCrashHandler.exe 1776 msedgewebview2.exe 1280 msedgewebview2.exe 2304 msedgewebview2.exe 1292 msedgewebview2.exe 2108 msedgewebview2.exe 1000 msedgewebview2.exe 3284 msedgewebview2.exe 968 msedgewebview2.exe 4364 msedgewebview2.exe 860 RobloxPlayerBeta.exe 2116 MicrosoftEdgeUpdate.exe 1052 MicrosoftEdgeUpdate.exe 4192 MicrosoftEdgeUpdateSetup_X86_1.3.187.39.exe 4472 MicrosoftEdgeUpdate.exe 832 MicrosoftEdgeUpdate.exe 4564 MicrosoftEdgeUpdate.exe 4968 MicrosoftEdgeUpdate.exe 4860 MicrosoftEdgeUpdateComRegisterShell64.exe 3288 MicrosoftEdgeUpdateComRegisterShell64.exe 1108 MicrosoftEdgeUpdateComRegisterShell64.exe 1988 MicrosoftEdgeUpdate.exe 2512 RobloxPlayerBeta.exe 764 RobloxPlayerBeta.exe 4860 RobloxPlayerInstaller.exe 332 RobloxPlayerBeta.exe 4524 RobloxPlayerBeta.exe 1068 MicrosoftEdgeUpdate.exe 1356 MicrosoftEdgeUpdate.exe 3732 MicrosoftEdgeUpdate.exe 3128 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 64 IoCs
pid Process 3188 MicrosoftEdgeUpdate.exe 4528 MicrosoftEdgeUpdate.exe 2756 MicrosoftEdgeUpdate.exe 2232 MicrosoftEdgeUpdateComRegisterShell64.exe 2756 MicrosoftEdgeUpdate.exe 4612 MicrosoftEdgeUpdateComRegisterShell64.exe 2756 MicrosoftEdgeUpdate.exe 3968 MicrosoftEdgeUpdateComRegisterShell64.exe 2756 MicrosoftEdgeUpdate.exe 624 MicrosoftEdgeUpdate.exe 4508 MicrosoftEdgeUpdate.exe 4348 MicrosoftEdgeUpdate.exe 4348 MicrosoftEdgeUpdate.exe 4508 MicrosoftEdgeUpdate.exe 4352 MicrosoftEdgeUpdate.exe 464 MicrosoftEdgeUpdate.exe 1056 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4220 RobloxCrashHandler.exe 4220 RobloxCrashHandler.exe 4220 RobloxCrashHandler.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 1776 msedgewebview2.exe 1776 msedgewebview2.exe 1280 msedgewebview2.exe 1776 msedgewebview2.exe 2304 msedgewebview2.exe 1776 msedgewebview2.exe 2304 msedgewebview2.exe 1292 msedgewebview2.exe 2304 msedgewebview2.exe 2304 msedgewebview2.exe 2304 msedgewebview2.exe 1292 msedgewebview2.exe 2304 msedgewebview2.exe 2108 msedgewebview2.exe 2108 msedgewebview2.exe 1000 msedgewebview2.exe 1000 msedgewebview2.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B1EC306-3EDE-4012-9BB0-FB836132FF52}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B1EC306-3EDE-4012-9BB0-FB836132FF52}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B1EC306-3EDE-4012-9BB0-FB836132FF52}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B1EC306-3EDE-4012-9BB0-FB836132FF52}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B1EC306-3EDE-4012-9BB0-FB836132FF52}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B1EC306-3EDE-4012-9BB0-FB836132FF52}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B1EC306-3EDE-4012-9BB0-FB836132FF52}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B1EC306-3EDE-4012-9BB0-FB836132FF52}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2B1EC306-3EDE-4012-9BB0-FB836132FF52}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.187.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 17 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxStudioInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxStudioBeta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxStudioBeta.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\PROTOCOLEXECUTE\ROBLOX RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\PROTOCOLEXECUTE\ROBLOX-STUDIO RobloxStudioInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\PROTOCOLEXECUTE\ROBLOX-PLAYER RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxStudioInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxStudioInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio-auth RobloxStudioInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio-auth\WarnOnOpen = "0" RobloxStudioInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133615772000768947" msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine.1.0\CLSID\ = "{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc\CLSID\ = "{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine\ = "Microsoft Edge Update CredentialDialog" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.OnDemandCOMClassSvc" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ = "ICredentialDialog" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\CurVer\ = "MicrosoftEdgeUpdate.ProcessLauncher.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\NumMethods\ = "26" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32\ = "{2B1EC306-3EDE-4012-9BB0-FB836132FF52}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1337824034-2731376981-3755436523-1000\{1E8DD72B-16C7-4A19-A50B-C580744FC006} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine\CLSID\ = "{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ = "IPolicyStatus5" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\ProgID\ = "MicrosoftEdgeUpdate.CoreMachineClass.1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\LocalService = "edgeupdatem" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\CurVer\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{2B1EC306-3EDE-4012-9BB0-FB836132FF52}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rbxl\Roblox.Place RobloxStudioInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\Elevation MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ = "IPolicyStatus3" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods\ = "17" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ = "IApp2" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32\ = "{2B1EC306-3EDE-4012-9BB0-FB836132FF52}" MicrosoftEdgeUpdateComRegisterShell64.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 5696.crdownload:SmartScreen msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4136 RobloxStudioBeta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2992 RobloxPlayerInstaller.exe 2992 RobloxPlayerInstaller.exe 3188 MicrosoftEdgeUpdate.exe 3188 MicrosoftEdgeUpdate.exe 3188 MicrosoftEdgeUpdate.exe 3188 MicrosoftEdgeUpdate.exe 3188 MicrosoftEdgeUpdate.exe 3188 MicrosoftEdgeUpdate.exe 1056 RobloxPlayerBeta.exe 1056 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 3904 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 2616 RobloxStudioInstaller.exe 2616 RobloxStudioInstaller.exe 3832 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe 4136 RobloxStudioBeta.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4136 RobloxStudioBeta.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 33 IoCs
pid Process 1776 msedgewebview2.exe 1776 msedgewebview2.exe 1776 msedgewebview2.exe 1776 msedgewebview2.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3188 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 3188 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2168 taskmgr.exe Token: SeSystemProfilePrivilege 2168 taskmgr.exe Token: SeCreateGlobalPrivilege 2168 taskmgr.exe Token: 33 2168 taskmgr.exe Token: SeIncBasePriorityPrivilege 2168 taskmgr.exe Token: SeDebugPrivilege 2116 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1052 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 832 MicrosoftEdgeUpdate.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 2168 taskmgr.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4136 RobloxStudioBeta.exe 864 OpenWith.exe -
Suspicious use of UnmapMainImage 7 IoCs
pid Process 1056 RobloxPlayerBeta.exe 2400 RobloxPlayerBeta.exe 3904 RobloxPlayerBeta.exe 3832 RobloxPlayerBeta.exe 860 RobloxPlayerBeta.exe 332 RobloxPlayerBeta.exe 4524 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1000 2992 RobloxPlayerInstaller.exe 98 PID 2992 wrote to memory of 1000 2992 RobloxPlayerInstaller.exe 98 PID 2992 wrote to memory of 1000 2992 RobloxPlayerInstaller.exe 98 PID 1000 wrote to memory of 3188 1000 MicrosoftEdgeWebview2Setup.exe 99 PID 1000 wrote to memory of 3188 1000 MicrosoftEdgeWebview2Setup.exe 99 PID 1000 wrote to memory of 3188 1000 MicrosoftEdgeWebview2Setup.exe 99 PID 3188 wrote to memory of 4528 3188 MicrosoftEdgeUpdate.exe 100 PID 3188 wrote to memory of 4528 3188 MicrosoftEdgeUpdate.exe 100 PID 3188 wrote to memory of 4528 3188 MicrosoftEdgeUpdate.exe 100 PID 3188 wrote to memory of 2756 3188 MicrosoftEdgeUpdate.exe 101 PID 3188 wrote to memory of 2756 3188 MicrosoftEdgeUpdate.exe 101 PID 3188 wrote to memory of 2756 3188 MicrosoftEdgeUpdate.exe 101 PID 2756 wrote to memory of 2232 2756 MicrosoftEdgeUpdate.exe 102 PID 2756 wrote to memory of 2232 2756 MicrosoftEdgeUpdate.exe 102 PID 2756 wrote to memory of 4612 2756 MicrosoftEdgeUpdate.exe 103 PID 2756 wrote to memory of 4612 2756 MicrosoftEdgeUpdate.exe 103 PID 2756 wrote to memory of 3968 2756 MicrosoftEdgeUpdate.exe 104 PID 2756 wrote to memory of 3968 2756 MicrosoftEdgeUpdate.exe 104 PID 3188 wrote to memory of 624 3188 MicrosoftEdgeUpdate.exe 105 PID 3188 wrote to memory of 624 3188 MicrosoftEdgeUpdate.exe 105 PID 3188 wrote to memory of 624 3188 MicrosoftEdgeUpdate.exe 105 PID 3188 wrote to memory of 4508 3188 MicrosoftEdgeUpdate.exe 106 PID 3188 wrote to memory of 4508 3188 MicrosoftEdgeUpdate.exe 106 PID 3188 wrote to memory of 4508 3188 MicrosoftEdgeUpdate.exe 106 PID 4348 wrote to memory of 4352 4348 MicrosoftEdgeUpdate.exe 108 PID 4348 wrote to memory of 4352 4348 MicrosoftEdgeUpdate.exe 108 PID 4348 wrote to memory of 4352 4348 MicrosoftEdgeUpdate.exe 108 PID 4348 wrote to memory of 3856 4348 MicrosoftEdgeUpdate.exe 113 PID 4348 wrote to memory of 3856 4348 MicrosoftEdgeUpdate.exe 113 PID 3856 wrote to memory of 3432 3856 MicrosoftEdge_X64_125.0.2535.79.exe 114 PID 3856 wrote to memory of 3432 3856 MicrosoftEdge_X64_125.0.2535.79.exe 114 PID 3432 wrote to memory of 4672 3432 setup.exe 115 PID 3432 wrote to memory of 4672 3432 setup.exe 115 PID 4348 wrote to memory of 464 4348 MicrosoftEdgeUpdate.exe 120 PID 4348 wrote to memory of 464 4348 MicrosoftEdgeUpdate.exe 120 PID 4348 wrote to memory of 464 4348 MicrosoftEdgeUpdate.exe 120 PID 2992 wrote to memory of 1056 2992 RobloxPlayerInstaller.exe 121 PID 2992 wrote to memory of 1056 2992 RobloxPlayerInstaller.exe 121 PID 1632 wrote to memory of 2616 1632 RobloxStudioInstaller.exe 139 PID 1632 wrote to memory of 2616 1632 RobloxStudioInstaller.exe 139 PID 1632 wrote to memory of 2616 1632 RobloxStudioInstaller.exe 139 PID 2616 wrote to memory of 4136 2616 RobloxStudioInstaller.exe 141 PID 2616 wrote to memory of 4136 2616 RobloxStudioInstaller.exe 141 PID 4136 wrote to memory of 4220 4136 RobloxStudioBeta.exe 143 PID 4136 wrote to memory of 4220 4136 RobloxStudioBeta.exe 143 PID 4136 wrote to memory of 1776 4136 RobloxStudioBeta.exe 146 PID 4136 wrote to memory of 1776 4136 RobloxStudioBeta.exe 146 PID 1776 wrote to memory of 1280 1776 msedgewebview2.exe 147 PID 1776 wrote to memory of 1280 1776 msedgewebview2.exe 147 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 PID 1776 wrote to memory of 2304 1776 msedgewebview2.exe 148 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RobloxPlayerInstaller.exe"C:\Users\Admin\AppData\Local\Temp\RobloxPlayerInstaller.exe"1⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Program Files (x86)\Microsoft\Temp\EU94CE.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU94CE.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Sets file execution options in registry
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4528
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2232
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4612
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3968
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjVFNzA5NjgtNkU4My00MzBCLThFMjYtNUE0NDVERDM1RjlCfSIgdXNlcmlkPSJ7QTA1RDcxMUUtQTlCRi00QUFFLUIyOUEtNTQ1RDJBOEREQjY0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5NzRBOTBDMi0yMDhFLTREMEEtQjQxMi0zOTc2MkY3NUFCRUV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RHhPYmpIR2ErblJhMmF0QzN3bytJRXBDNzgrWlllQVVia1hwREMyY2o3VT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4Ny4zNyIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ3Nzc3MjcwNzYiIGluc3RhbGxfdGltZV9tcz0iODMzIi8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:624
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{65E70968-6E83-430B-8E26-5A445DD35F9B}" /silent4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4508
-
-
-
-
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe" -app -isInstallerLaunch2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1056
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjVFNzA5NjgtNkU4My00MzBCLThFMjYtNUE0NDVERDM1RjlCfSIgdXNlcmlkPSJ7QTA1RDcxMUUtQTlCRi00QUFFLUIyOUEtNTQ1RDJBOEREQjY0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntFOUMzODU0Qi04NzZELTREQzItQkE2Ni1GMjRDQ0I5M0MwNTV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTEwLjAuNTQ4MS4xMDQiIG5leHR2ZXJzaW9uPSIxMTAuMC41NDgxLjEwNCIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ3ODI1OTY4OTciLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:4352
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05649BCF-AD59-48B4-9988-1E1953A04144}\MicrosoftEdge_X64_125.0.2535.79.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05649BCF-AD59-48B4-9988-1E1953A04144}\MicrosoftEdge_X64_125.0.2535.79.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05649BCF-AD59-48B4-9988-1E1953A04144}\EDGEMITMP_6F233.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05649BCF-AD59-48B4-9988-1E1953A04144}\EDGEMITMP_6F233.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05649BCF-AD59-48B4-9988-1E1953A04144}\MicrosoftEdge_X64_125.0.2535.79.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05649BCF-AD59-48B4-9988-1E1953A04144}\EDGEMITMP_6F233.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05649BCF-AD59-48B4-9988-1E1953A04144}\EDGEMITMP_6F233.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=125.0.6422.112 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{05649BCF-AD59-48B4-9988-1E1953A04144}\EDGEMITMP_6F233.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=125.0.2535.79 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff6a51b4b18,0x7ff6a51b4b24,0x7ff6a51b4b304⤵
- Executes dropped EXE
PID:4672
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjVFNzA5NjgtNkU4My00MzBCLThFMjYtNUE0NDVERDM1RjlCfSIgdXNlcmlkPSJ7QTA1RDcxMUUtQTlCRi00QUFFLUIyOUEtNTQ1RDJBOEREQjY0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntCRjc4OUI1Ni0zMEY3LTRBNEQtOEVCOS02MjgxNTU1MTkxNTB9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMTI1LjAuMjUzNS43OSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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_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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NjI3MDg2NjgyIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMjc3IiBkb3dubG9hZF90aW1lX21zPSIzNjkyNSIgZG93bmxvYWRlZD0iMTczNzE2MDI0IiB0b3RhbD0iMTczNzE2MDI0IiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSI0NDg4MCIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:464
-
-
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"1⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2400
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2168
-
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"1⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3904
-
C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe"C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_FC56A\RobloxStudioInstaller.exeC:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_FC56A\RobloxStudioInstaller.exe -relaunch2⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Executes dropped EXE
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\RobloxStudioBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\RobloxStudioBeta.exe" -startEvent www.roblox.com/robloxQTStudioStartedEvent -firstLaunch3⤵
- Checks whether UAC is enabled
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\RobloxCrashHandler.exe"C:\Program Files (x86)\Roblox\Versions\version-c46f37833a234ebf\RobloxCrashHandler.exe" --no-rate-limit --crashCounter Win-ROBLOXStudio-Crash --baseUrl https://www.roblox.com --attachment=attachment_0.627.0.6270453_20240530T211308Z_Studio_42A52_last.log=C:\Users\Admin\AppData\Local\Roblox\logs\0.627.0.6270453_20240530T211308Z_Studio_42A52_last.log --database=C:\Users\Admin\AppData\Local\Roblox\logs\crashes --metrics-dir=C:\Users\Admin\AppData\Local\Roblox\logs\crashes --url=https://upload.crashes.rbxinfra.com/post?format=minidump --annotation=AppVersion=0.627.0.44533 --annotation=Format=minidump --annotation=HardwareModel= --annotation=HasBootstrapper=true --annotation=InstallFolder=ProgramFilesX86 --annotation=OSPlatform=Windows --annotation=RobloxChannel=production --annotation=RobloxGitHash=eaa743d2ec5efd1c7cd63375418c0e423354daa2 --annotation=RobloxProduct=RobloxStudio --annotation=StudioVersion=0.627.0.6270453 --annotation=UniqueId=7137964022758697582 --annotation=UseCrashpad=True --annotation=app_arch=x86_64 --annotation=application.version=0.627.0.6270453 --annotation=host_arch=x86_64 --initial-client-data=0x5bc,0x5c0,0x5c4,0x598,0x5d4,0x7ff7a2498b90,0x7ff7a2498ba8,0x7ff7a2498bc04⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4220
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 627, 0, 6270453" --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=4136.1476.15961897710125686204⤵
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1776 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=125.0.6422.112 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=125.0.2535.79 --initial-client-data=0x178,0x17c,0x180,0x154,0x188,0x7ff9a3374ef8,0x7ff9a3374f04,0x7ff9a3374f105⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1280
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 627, 0, 6270453" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1788,i,3960505064683716776,1252424135928786446,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=1728 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2304
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 627, 0, 6270453" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --field-trial-handle=2044,i,3960505064683716776,1252424135928786446,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=2060 /prefetch:35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1292
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 627, 0, 6270453" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --field-trial-handle=2052,i,3960505064683716776,1252424135928786446,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=1732 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2108
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 627, 0, 6270453" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3660,i,3960505064683716776,1252424135928786446,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=3668 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1000
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 627, 0, 6270453" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4100,i,3960505064683716776,1252424135928786446,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4124 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:3284
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 627, 0, 6270453" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3684,i,3960505064683716776,1252424135928786446,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=3828 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:968
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\125.0.2535.79\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 627, 0, 6270453" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4840,i,3960505064683716776,1252424135928786446,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4868 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:4364
-
-
-
-
-
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"1⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3832
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:2268
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:5048
-
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"1⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9a88246f8,0x7ff9a8824708,0x7ff9a88247182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1816 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1676 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6196 /prefetch:82⤵
- Modifies registry class
PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:N79763mwEeNNACuGYF8tPbpzw_kwbjEqbF-N7loFZJT4lrUrals8SF0TCRiWizi8vbisjG5vg3JeUk6vXy3owmgX5C9Osk8NyauMwmzKSdn4IvqkLGzMicJD8DfYSeHX8DOOXi8B2y3EK7owaz95I5JU_sSxLpxpy1NzgWniIeeBRTjeXQ5PCjBgTt_C0vt3L14hHJADFQyvfF_TfXLh-ZbJTFRIQNfsOMtyQl_f7iU+launchtime:1717103709848+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1717103618330003%26placeId%3D16389395869%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3Dd093d1f8-ca7c-481c-8f94-705c5b40c3a8%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1717103618330003+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:kaxEOYf3_pHAg4ttnUiA-lqZA5hswnPBggminMZA75km9jlA2SHrcmwPPQM_wkKjAoAtj34frct3IUqYxvfhQRWFzxtPhh5Ei2Uw6C-v7XUEy5uCirdtzr6tFOw2_snCd4LaegRo9e4_lx-0nK9hbglOPhkJs0ypXkJBUzcncd1zuuBYf1L8KJh6c2BmDrvghmoZbidxSyQ3yprz_lSh4Yqc4VDdyVsp81Wbfab29BU+launchtime:1717103725006+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1717103618330003%26placeId%3D16389395869%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D09e41f8f-4054-4b66-ab3e-6e0fb38a1c06%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1717103618330003+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6820 /prefetch:22⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6784 /prefetch:82⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6828 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7332 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6772 /prefetch:82⤵PID:3752
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Executes dropped EXE
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
PID:4860 -
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe" -app -isInstallerLaunch3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:332
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16976147889023025033,2300166492244620570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:9693zUKyBOI9XpGYIHfHXbNbET3J5YgTyX-n8GAPLy9sH0_F5-GzeskoEoGzgmfNdU25uFTn9cdPw3wE2q3fETDEO-KxyBtQYSFfqSgmgNYXko-d4DXOPqlk0V0lB8iX-b3eEQ8IT4-mtBwAb_17A73WQNus4aXtjXmscK_RRKcByA_A3dkxi5P9aHatrPlKMpONoO97O6NbQUsDuHOzNkHqFcMFGzEz4AkuoFd266k+launchtime:1717103788341+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1717103618330003%26placeId%3D16389395869%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3Dea2da4ef-baab-4d32-adca-99f83260c6b7%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1717103618330003+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4524
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Checks system information in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1052 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{50EC7046-6EFC-4CA0-8382-556FA46295BF}\MicrosoftEdgeUpdateSetup_X86_1.3.187.39.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{50EC7046-6EFC-4CA0-8382-556FA46295BF}\MicrosoftEdgeUpdateSetup_X86_1.3.187.39.exe" /update /sessionid "{88F36458-895C-4892-A7E9-E4F4214C31F9}"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:4192 -
C:\Program Files (x86)\Microsoft\Temp\EU7755.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU7755.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{88F36458-895C-4892-A7E9-E4F4214C31F9}"3⤵
- Sets file execution options in registry
- Checks system information in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Modifies registry class
PID:4564
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Modifies registry class
PID:4968 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:4860
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:3288
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:1108
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTg3LjM5IiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMjIiIGluc3RhbGxkYXRldGltZT0iMTcxNTE3MDIzNSI-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iODYzMDAxMzM5MiIvPjwvYXBwPjwvcmVxdWVzdD44⤵
- Checks system information in the registry
- Executes dropped EXE
PID:1988
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7ODhGMzY0NTgtODk1Qy00ODkyLUE3RTktRTRGNDIxNEMzMUY5fSIgdXNlcmlkPSJ7QTA1RDcxMUUtQTlCRi00QUFFLUIyOUEtNTQ1RDJBOEREQjY0fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InsxODg5Njg0RC1DODBBLTRCRTQtOTc0RS02MjM0RTdFOEVEQzR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE3MS4zOSIgbmV4dHZlcnNpb249IjEuMy4xODcuMzkiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iSXNPbkludGVydmFsQ29tbWFuZHNBbGxvd2VkPS10YXJnZXRfZGV2IiBpbnN0YWxsYWdlPSIyMiI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSIxMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iODMxMDM1MzM3NiIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI4MzEwNDczMjg3IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-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-PHBpbmcgcj0iMjIiIHJkPSI2MzM3IiBwaW5nX2ZyZXNobmVzcz0iezRGQkFBOTg3LTA1NjctNDVGQi1BNTA2LTQ3NjI3MTkzRkFGQX0iLz48L2FwcD48YXBwIGFwcGlkPSJ7NTZFQjE4RjgtQjAwOC00Q0JELUI2RDItOEM5N0ZFN0U5MDYyfSIgdmVyc2lvbj0iOTIuMC45MDIuNjciIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iMjIiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzYxNTc3MjEyNjgyODg1MCI-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Checks system information in the registry
- Executes dropped EXE
PID:4472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9a8abab58,0x7ff9a8abab68,0x7ff9a8abab782⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:22⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1604 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3320 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3640 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4424 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4568 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4472 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4152 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4908 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3116 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4808 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3480 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4044 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4304 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3420 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4984 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5044 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5172 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:12⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4724 --field-trial-handle=1848,i,11870412588852089264,969343172710784235,131072 /prefetch:22⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4364
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x5101⤵PID:4364
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
PID:1068
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1356 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjExMC4wLjU0ODEuMTA0IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyMiIgaW5zdGFsbGRhdGV0aW1lPSIxNzE1MTcxMjQwIiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNTk2NDM4MzUwMDAwMDAwIiBmaXJzdF9mcmVfc2Vlbl90aW1lPSIxMzM2MTU3NzI4MTczNjg4NTciPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMzExMTg4IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMTYyODQ0MzQwOSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Checks system information in the registry
- Executes dropped EXE
PID:3732
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8AFDFB49-0E5D-4C1B-A02A-7DC80910D837}\BGAUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8AFDFB49-0E5D-4C1B-A02A-7DC80910D837}\BGAUpdate.exe" --edgeupdate-client --system-level2⤵
- Adds Run key to start application
PID:3092
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODcuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QURFQjM0REQtRTQ1Mi00MDEyLTlCNUItNzhDOEZDMEE1M0Y3fSIgdXNlcmlkPSJ7QTA1RDcxMUUtQTlCRi00QUFFLUIyOUEtNTQ1RDJBOEREQjY0fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntCRDZGODk3My1BMjg0LTQyRDQtQTlDQS03OEMyQzk3NDFDNkR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7MUZBQjhDRkUtOTg2MC00MTVDLUE2Q0EtQUE3RDEyMDIxOTQwfSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMi4wLjAuMzQiIGxhbmc9IiIgYnJhbmQ9IkVVRkkiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMTY0MzE0MzQyOSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExNjQzMzYzNDgyIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTIwNzA1OTM0NzAiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSI5MjciIGRvd25sb2FkX3RpbWVfbXM9IjQxODk3IiBkb3dubG9hZGVkPSIxODA0NDQ0OCIgdG90YWw9IjE4MDQ0NDQ4IiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSIxNjIiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
PID:3128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD5365eb1aab5e477760126569b7f72f85a
SHA106aa9c213c163b7716644314ea6d3997f882ab06
SHA25619dc1f8c7901ec057bfaf763d8354a07880ce6fa3093185c64b95d082f8055af
SHA5120d34bc14ed5328f2ded1c48acc29872a2154db0c4c9072a098266a08c0d0b235705223f988e64e3fd418e9c62338560e33d7f3d9ae933f43da77763e88938888
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.187.39\MicrosoftEdgeUpdateSetup_X86_1.3.187.39.exe
Filesize1.5MB
MD51f744e1c802560affe8b308640b6ab67
SHA1bbfecefdf891c11d573760d4dabdf86091463421
SHA256fa7d8a8cae60ab620d2aa887de62039d2647e4f5c1c649d75f0f52e14ec11a99
SHA512780440aa518397e52bb429b5a8e7697bf0096db0fe343cd40a541b60f34ad4976ef7fc2204737d296a8c1fbed2951496503dc50158d6455617c67483f87f3015
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
Filesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
Filesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
Filesize
24KB
MD5f6c1324070b6c4e2a8f8921652bfbdfa
SHA1988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf
SHA256986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717
SHA51263092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100
-
Filesize
26KB
MD5570efe7aa117a1f98c7a682f8112cb6d
SHA1536e7c49e24e9aa068a021a8f258e3e4e69fa64f
SHA256e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01
SHA5125e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8
-
Filesize
28KB
MD5a8d3210e34bf6f63a35590245c16bc1b
SHA1f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693
SHA2563b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766
SHA5126e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a
-
Filesize
29KB
MD57937c407ebe21170daf0975779f1aa49
SHA14c2a40e76209abd2492dfaaf65ef24de72291346
SHA2565ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9
SHA5128670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7
-
Filesize
29KB
MD58375b1b756b2a74a12def575351e6bbd
SHA1802ec096425dc1cab723d4cf2fd1a868315d3727
SHA256a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105
SHA512aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19
-
Filesize
29KB
MD5a94cf5e8b1708a43393263a33e739edd
SHA11068868bdc271a52aaae6f749028ed3170b09cce
SHA2565b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c
SHA512920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7
-
Filesize
29KB
MD57dc58c4e27eaf84ae9984cff2cc16235
SHA13f53499ddc487658932a8c2bcf562ba32afd3bda
SHA256e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98
SHA512bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc
-
Filesize
28KB
MD5e338dccaa43962697db9f67e0265a3fc
SHA14c6c327efc12d21c4299df7b97bf2c45840e0d83
SHA25699b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04
SHA512e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9
-
Filesize
29KB
MD52929e8d496d95739f207b9f59b13f925
SHA17c1c574194d9e31ca91e2a21a5c671e5e95c734c
SHA2562726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df
SHA512ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957
-
Filesize
30KB
MD539551d8d284c108a17dc5f74a7084bb5
SHA16e43fc5cec4b4b0d44f3b45253c5e0b032e8e884
SHA2568dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07
SHA5126fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2
-
Filesize
28KB
MD516c84ad1222284f40968a851f541d6bb
SHA1bc26d50e15ccaed6a5fbe801943117269b3b8e6b
SHA256e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b
SHA512d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e
-
Filesize
28KB
MD534d991980016595b803d212dc356d765
SHA1e3a35df6488c3463c2a7adf89029e1dd8308f816
SHA256252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e
SHA5128a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed
-
Filesize
28KB
MD5d34380d302b16eab40d5b63cfb4ed0fe
SHA11d3047119e353a55dc215666f2b7b69f0ede775b
SHA256fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f
SHA51245ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538
-
Filesize
30KB
MD5aab01f0d7bdc51b190f27ce58701c1da
SHA11a21aabab0875651efd974100a81cda52c462997
SHA256061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c
SHA5125edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e
-
Filesize
30KB
MD5ac275b6e825c3bd87d96b52eac36c0f6
SHA129e537d81f5d997285b62cd2efea088c3284d18f
SHA256223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0
SHA512bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679
-
Filesize
27KB
MD5d749e093f263244d276b6ffcf4ef4b42
SHA169f024c769632cdbb019943552bac5281d4cbe05
SHA256fd90699e7f29b6028a2e8e6f3ae82d26cdc6942bd39c4f07b221d87c5dbbfe1e
SHA51248d51b006ce0cd903154fa03d17e76591db739c4bfb64243725d21d4aa17db57a852077be00b9a51815d09664d18f9e6ad61d9bc41b3d013ed24aaec8f477ad9
-
Filesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
Filesize
29KB
MD528fefc59008ef0325682a0611f8dba70
SHA1f528803c731c11d8d92c5660cb4125c26bb75265
SHA25655a69ce2d6fc4109d16172ba6d9edb59dbadbc8af6746cc71dc4045aa549022d
SHA5122ec71244303beac7d5ce0905001fe5b0fb996ad1d1c35e63eecd4d9b87751f0633a281554b3f0aa02ee44b8ceaad85a671ef6c34589055797912324e48cc23ed
-
Filesize
28KB
MD59db7f66f9dc417ebba021bc45af5d34b
SHA16815318b05019f521d65f6046cf340ad88e40971
SHA256e652159a75cbab76217ecbb4340020f277175838b316b32cf71e18d83da4a819
SHA512943d8fc0d308c5ccd5ab068fc10e799b92465a22841ce700c636e7ae1c12995d99c0a93ab85c1ae27fefce869eabadbeafee0f2f5f010ad3b35fa4f748b54952
-
Filesize
28KB
MD5b78cba3088ecdc571412955742ea560b
SHA1bc04cf9014cec5b9f240235b5ff0f29dbdb22926
SHA256f0a4cfd96c85f2d98a3c9ecfadd41c0c139fdb20470c8004f4c112dd3d69e085
SHA51204c8ab8e62017df63e411a49fb6218c341672f348cb9950b1f0d2b2a48016036f395b4568da70989f038e8e28efea65ddd284dfd490e93b6731d9e3e0e0813cf
-
Filesize
28KB
MD5a7e1f4f482522a647311735699bec186
SHA13b4b4b6e6a5e0c1981c62b6b33a0ca78f82b7bbd
SHA256e5615c838a71b533b26d308509954907bcc0eb4032cdbaa3db621eede5e6bfa4
SHA51222131600bbac8d9c2dab358e244ec85315a1aaebfc0fb62aaa1493c418c8832c3a6fbf24a6f8cf4704fdc4bc10a66c88839a719116b4a3d85264b7ad93c54d57
-
Filesize
27KB
MD5cbe3454843ce2f36201460e316af1404
SHA10883394c28cb60be8276cb690496318fcabea424
SHA256c66c4024847d353e9985eb9b2f060b2d84f12cc77fb6479df5ffc55dbda97e59
SHA512f39e660f3bfab288871d3ec40135c16d31c6eb1a84136e065b54ff306f6f8016a788c713d4d8e46ad62e459f9073d2307a6ed650919b2dd00577bbfd04e5bd73
-
Filesize
28KB
MD5d45f2d476ed78fa3e30f16e11c1c61ea
SHA18c8c5d5f77cd8764c4ca0c389daee89e658dfd5e
SHA256acf42b90190110ccf30bcfb2626dd999a14e42a72a3983928cba98d44f0a72e2
SHA5122a876e0313a03e75b837d43e9c5bb10fcec385fbb0638faa984ee4bb68b485b04d14c59cd4ed561aaa7f746975e459954e276e73fc3f5f4605ae7f333ce85f1b
-
Filesize
29KB
MD57c66526dc65de144f3444556c3dba7b8
SHA16721a1f45ac779e82eecc9a584bcf4bcee365940
SHA256e622823096fc656f63d5a7bbdf3744745ef389c92ec1b804d3b874578e18c89d
SHA512dbc803c593ae0b18fd989fdc5e9e6aee8f16b893ae8d17e9d88436e2cd8cae23d06e32e4c8a8bf67fc5311b6f2a184c4e6795fed6d15b3d766ef5affc8923e2f
-
Filesize
30KB
MD5b534e068001e8729faf212ad3c0da16c
SHA1999fa33c5ea856d305cc359c18ea8e994a83f7a9
SHA256445051ef15c6c872bed6d904169793837e41029a8578eaf81d78a4641ef53511
SHA512e937d2e0f43ade3f4a5e9cdeb6dd8c8ad8b5b50a7b6b779bda727a4fe1ced93abd06720395cc69a274ce3b0f7c6b65e1eba1ecf069db64edb80d007fbb4eedbb
-
Filesize
30KB
MD564c47a66830992f0bdfd05036a290498
SHA188b1b8faa511ee9f4a0e944a0289db48a8680640
SHA256a9b72fcb3bdb5e021b8d23b2de0caeca80ddc50420088b988a5b7503f2d7c961
SHA512426546310c12aeb80d56e6b40973a5f4dffef72e14d1ac79e3f267e4df2a0022b89e08bba8ab2ffa24f90b0c035a009bed3066201e30fe961d84ed854e48f9c5
-
Filesize
28KB
MD53b8a5301c4cf21b439953c97bd3c441c
SHA18a7b48bb3d75279de5f5eb88b5a83437c9a2014a
SHA256abc9822ee193c9a98a21202648a48ecd69b0cb19ff31c9bbf0c79dab5f9609b0
SHA512068166cfdf879caf4e54fe43c5265a692fcaf6a9dcbf151335fd054bbec06260bc5ed489de6d46ca3fc0044bc61fa1468fea85373c6c66349620618ee869383a
-
Filesize
30KB
MD5c90f33303c5bd706776e90c12aefabee
SHA11965550fe34b68ea37a24c8708eef1a0d561fb11
SHA256e3acc61d06942408369c85365ac0d731c5f3c9bc26e3f1e3bb24226d0879ad9c
SHA512b0c1a9d7df57d68e5daf527703f0b6154a2ef72af1a3933bda2804408f6684b5b09b822522193243fd0756f80f13d3ab0647c90d2bed1a57b4a9fea933b0aa9a
-
Filesize
28KB
MD584a1cea9a31be831155aa1e12518e446
SHA1670f4edd4dc8df97af8925f56241375757afb3da
SHA256e4eb716f1041160fd323b0f229b88851e153025d5d79f49b7d6ecb7eb2442c57
SHA5125f1318119102fcee1c828565737ce914493ff86e2a18a94f5ff2b6b394d584ace75c37258d589cce1d5afd8e37d617168a7d7372cfd68dd6a2afcd4577a0bc51
-
Filesize
28KB
MD5f9646357cf6ce93d7ba9cfb3fa362928
SHA1a072cc350ea8ea6d8a01af335691057132b04025
SHA256838ccd8243caa1a5d9e72eb1179ac8ae59d2acb453ed86be01e0722a8e917150
SHA512654c4a5200f20411c56c59dbb30a63bfe2da27781c081e2049b31f0371a31d679e3c9378c7eb9cf0fb9166a3f0fba33a58c3268193119b06f91bebe164a82528
-
Filesize
28KB
MD534cbaeb5ec7984362a3dabe5c14a08ec
SHA1d88ec7ac1997b7355e81226444ec4740b69670d7
SHA256024c5eae16e45abe2237c2a5d868563550ac596f1f7d777e25234c17d9461dd9
SHA512008c8443a3e93c4643a9e8735a1c59c24ba2f7a789606a86da54c921c34cbc0cb11c88594544d8509a8e71b6a287c043b1ffe2d39b90af53b4cde3847d891ba8
-
Filesize
29KB
MD50b475965c311203bf3a592be2f5d5e00
SHA1b5ff1957c0903a93737666dee0920b1043ddaf70
SHA25665915ad11b9457d145795a1e8d151f898ec2dcb8b136967e6592884699867eb0
SHA512bec513125f272c24477b9ddbaa5706d1e1bb958babac46829b28df99fa1dd82f3f1e3c7066dc2fe3e59118c536675a22fc2128de916ca4c478950b9992372007
-
Filesize
29KB
MD5f4976c580ba37fc9079693ebf5234fea
SHA17326d2aa8f6109084728323d44a7fb975fc1ed3f
SHA256b16755fdbcc796ef4eb937759fe2c3518c694f5d186970d55a5a5e5d906cb791
SHA512e43636d8c947e981258e649712ad43f37c1aab01916539b93c082959fb5c6764c9c44979650092202839e812e6f252c6c3eaf66d3d195c1efd39c74c81ad1981
-
Filesize
27KB
MD503d4c35b188204f62fc1c46320e80802
SHA107efb737c8b072f71b3892b807df8c895b20868c
SHA256192585d7f4a8a0cd95e338863c14233cdd8150f9f6f7dd8a405da0670110ee95
SHA5127e67ea953ea58ff43e049ce519ae077eec631325604896479526627d688f2fa3bfc855a55ac23a76b1c9ef8cd75274265b8238423b95a2437be7250db0db31b1
-
Filesize
28KB
MD55664c7a059ceb096d4cdaae6e2b96b8f
SHA1bf0095cd7470bf4d7c9566ba0fd3b75c8b9e57ec
SHA256a3a2947064267d17474c168d3189b0d372e36e53bf0efb9c228d314fc802d98e
SHA512015dcb17b297a0aaad41c7b0b2199187e435855fd3977d16402be774622cc4f6b55d04ba9159a89e26e350c5602928c76dd9386be3974437b41888a0cfdddfa8
-
Filesize
30KB
MD5497ca0a8950ae5c8c31c46eb91819f58
SHA101e7e61c04de64d2df73322c22208a87d6331fc8
SHA256abe2360a585b6671ec3a69d14077b43ae8f9e92b6077b80a147dfe36792bb1b7
SHA512070398af980f193ff90b4afaecb3822534ef3171eca7228bce395af11ca38364bc47cab7df1e71187ef291f90978bdc37a8611d2992b1800cd1de6aa7fda09d9
-
Filesize
25KB
MD545e971cdc476b8ea951613dbd96e8943
SHA18d87b4edfce31dfa4eebdcc319268e81c1e01356
SHA256fd5ba39c8b319c6ba2febf896c6947a0a7bae6aa0b4957bd124d55589f41849d
SHA512f1c9fccf742fa450be249dbbf7e551a426c050ae4af3d2e909f9750068a2bdc801f618eb77a6a82d13421d27949c9f2a9681a44bcb410ccdeec66b24a70f6a9a
-
Filesize
24KB
MD5b507a146eb5de3b02271106218223b93
SHA10f1faddb06d775bcabbe8c7d83840505e094b8d6
SHA2565f4234e2b965656e3d6e127660f52e370dc133632d451ef04975f3b70194b2ed
SHA51254864e9130b91b6fd68b1947968c446f45a582f22714716bfd70b6dc814841fffe939bc2f573a257ec8c62b4ff939643211fb29cabc0c45b78a6cc70eaa3752c
-
Filesize
29KB
MD53bc0d9dd2119a72a1dc705d794dc6507
SHA15c3947e9783b90805d4d3a305dd2d0f2b2e03461
SHA2564449ee24c676e34fea4d151b3a752e8d0e7c82f419884e80da60d4d4c1b0f8cb
SHA5128df01ad484bf2924892129c59317f3da4f79611be2ca29e208114e5ed2cb96a63f753511dc4fe97e281417366246f2fb576cc6ef2618a67803ae7ac01be7b067
-
Filesize
28KB
MD5bcb1c5f3ef6c633e35603eade528c0f2
SHA184fac96d72341dc8238a0aa2b98eb7631b1eaf4e
SHA256fdd6bffdb9eca4542975f3afe3ac68feac190b8963f0a7244b4b8fa6382381d1
SHA512ecd79ddd9f3e6db1d0471132c453c324ab55bdead21de77392f418281bc8a2dd43e9009912896ffa3d55d4d3ef17b0aa847a084369b619eb04a2d2313641d520
-
Filesize
27KB
MD52ea1200fdfb4fcc368cea7d0cdc32bc2
SHA14acb60908e6e974c9fa0f19be94cb295494ee989
SHA2566fd21b94f62ee7474b3c3029590ddf06936105508f9bf3509620c42dc37486c3
SHA512e63b80a5929200c85c7a30a3054bd51eee2f27e603501f105073868690906f4619a27a52e58c90ac2ab5d5c34a4739dfdd2a511574afeb7d0118de88c5544f42
-
Filesize
29KB
MD560dfe673999d07f1a52716c57ba425a8
SHA1019ce650320f90914e83010f77347351ec9958ab
SHA256ef749f70e71424d7f548d5c12283be70a6d6c59cffb1c8101b74f37ecacb64af
SHA51246bfe77a49f14293988863a8e4dd0543202b954b670940d9ad5dc6d2b46e46104d8d6206be08a941f7e02b8ff3e2e2366b7b795d02352cff18971f8d0df5fcdc
-
Filesize
23KB
MD5cf91a1f111762d2bc01f8a002bd9544d
SHA1db2603af55b08538a41c51fc0676bc0ed041d284
SHA256baa9fae4fb8939e0b5fe0c7f393ab1ca40b52534f37bf2158a9a36331a221e75
SHA5129db864dbd194885b46f7bed9875f1e531e48f7644ce4494b8dc482c7516a6f783cd35129d2565b272dc674491a08c844a6da88bf9fa7843fcf89c96b4e0af799
-
Filesize
28KB
MD5ca3465347e57624ee2a5dd2299d4f4cd
SHA1551a151a8d49489c90400e18c34633aa2c2b8a4b
SHA2565b9509a1ae34d89c89c8e657742495037d28cd03e1cd48aef4dfaa7aeebe29f0
SHA512a4bdd458a7628a9f0664e1000512e056718cc924510a21704ff8c69b0b251a5a1c7f6f267d66325cadda1536aaee78440348be128d082112c71732e485ac93f3
-
Filesize
30KB
MD5269e84b82973e7b9ee03a5b2ef475e4d
SHA14021af3bfde8c52040ad4f9390eb29ae2a69104b
SHA256c3fb0cae3dc5cdd86518d60f998c3adec1c0c5804a74ffbb9a346a73d598af07
SHA512db716e2f6527af2dfeba4c22ff00e159d7cc0b482fc126e87b8b3d35b714bb382676066097352b6ebb87c8dfe7f6144e83100f0c9a9990b0d23c810b6c575c21
-
Filesize
27KB
MD5864edbc77831a64a3e3ab972291233bb
SHA1fa1f3eb3320c1b1a329cbe786abecf2a8e625cbe
SHA256aecab1eb46075d1a1432b3e14537f860a2ded49a13ca82f17fac44b40ad2da51
SHA5123d54efd01d6317fb4746b55db2c847a506f594cff055f0db84a72ede02dbe3aa03d8e65ea06c5ae365f44312a26cdbc45ad5f9a0de46d2b9c878aeeb24566b89
-
Filesize
27KB
MD57071c732cf3e4b3144cf07c49d8eb44f
SHA13800bf304b44d9d27ac26bed6ccc899669dc3b4f
SHA2569c75ef5c3f53c643d7bb8c5907a0cba6ca2d1d64e6bea39ce06b4ad5a20454b6
SHA512be3a0942e2af843adeb8e9b6acc7cd8adec956b761f71d8eb0a02835ee5be115ac064fda7088b0813d40ec3a24e7bb77816e9b67ef0cbdce1562c36880b15049
-
Filesize
28KB
MD530849a9c16061b9a46a66e8e7d42ff81
SHA12d0e86535d964acce8912c6bef3cc12346b22a6c
SHA256b8075c09d33cc6b6ff22fdb29ccc3dd319ce867f4b77a1d165f6f8d8cb4977e9
SHA512298ee10ff6cab7ff38d31e3a7826dedeab8e9ccc616eae4ca2e5ec333f42e5c6744650857031d8bf35034bd46c7c01a2646362ffbbef1f421995c73ba999ff0b
-
Filesize
28KB
MD51866ddadd9397dbf01c82c73496b6bff
SHA1b210a9df7d6a5e116fe7a9ff8d455b6cbfb5663b
SHA2569b4bb2ca3366a1935b4869796efc0601f94356b45e8613d28e023dd516f48d17
SHA51276fa5cade101d79d012e00904bf18692f85967ceea0ed7e81da4df65b85afc125a00127d9e06c8c59ffbfd2dcdc88488157b61922960559fa17d13dedca3ee59
-
Filesize
29KB
MD5064035858a1df697913f06c972461901
SHA1b6be99ae8e55207949076955389bc8fec81937fd
SHA2564850260d2cbb4b4ff3490eb90ce55a412268ad699f946b1cd686ddf9f0403bd6
SHA5129459056e919854213117b874e61b526af4ba35c3c3e195b204c5c3e59cc4dfa2b4a45c32551e1de144842844f246f5e0d025cdcc78dbf7265ba5e26e7209cd91
-
Filesize
30KB
MD57e90d4306c5768dfd1160ad9e2168a19
SHA14f7b17843ad226d51cfb0090235b55a29b5a674a
SHA2568ebe88477b1493733140f1fced91903276ec69c7302deed3281054b49573eb3c
SHA512f6d8b538915fa70bfb784ea7e6d4047759d8eecc822e4b76ac9666997a41901c8269a8185f29e5472bcfaa87e4b97483bd544f3fc8f656b60dca71d63b44d291
-
Filesize
28KB
MD5468a420700d239a0cd90b95896b0d6da
SHA1ce57e3abf57c7ae13e99546b2a5e19dec03cb9b7
SHA25624b304bd40f8e63848f8d2a1ca6ac8bc032b7a700161efad61ad445787650c87
SHA512604c4cc8132c520da70c4870514610364648ec6446afa47128ac3aa8a9157932705da93e8ed4e33d56f5191d611b26b76aeba1514e9dff1a13dd32693cfddb8b
-
Filesize
28KB
MD551230a1b9ab0dad791e583b7ee57afe4
SHA1957ba3e5d9b2df16ea3e099aab5b7e74d2055e46
SHA256a47fc6a9a75875e75f3415f068c357dd499e533849381b875272d5994c163670
SHA5125a3d754cefa1ab28748cb38021b5cbebd93fe513da0f4a7cbae98c0938acb10cdda939171d0842b09e97cb4c73f19272be665f767642ba1c5b25c709b5417edb
-
Filesize
5.3MB
MD5529ac613c7ac1ddbaebe9e7d9f82eca4
SHA1fc8cb991735a98a9663776a61cb9c185a3335f94
SHA256cd6a5d746b5c36525d781e6d40368f87a3edc3ea157bf63fb55baacc51337f0d
SHA512e2378819587ed7eb417d0375d49a55ef9292b9e8d22718a52688e3fad59d68a711281f25d1045a9da5442f2d805b9d98aedbf4278c9188208bb2edd917751e04
-
C:\Program Files (x86)\Roblox\Versions\version-d6abc3b106a04c5c\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
Filesize1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
Filesize
280B
MD598737476014bb333b74823fa0eecfc28
SHA1c92c9ff2544fc0c54e3375908b2493b28a2921d2
SHA2561b06a77c6fbb8f18ffeca980ffc19d097e83423596a8150d9132ccd331e821d6
SHA5122d048322f8abbf1d5d6b93046c25197564c5ae01d75462f88e8685bd4401eb2d437d2e9e1288e33aeb87952c67e7d2ff97c9fea48c9f398dd24012f4690244bd
-
Filesize
101KB
MD5b49ff2d0e77921b63ff426fe2397f829
SHA1300be354a5dbcf69fe8c1b7097351d88f7ec20c3
SHA2562783823a2a8305b2603c55b284ab3ad674e049eb9491246c51bd559e8a956eed
SHA5120b749916fc604c3d58f5df4635d8d15a1eb5d95394558d6d7f36c8895a1ce926c4a9e8f4ee0759fcbea209a40ee228e56bdd02846a8abdfcb03622394890d5d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\3a81a040-dabf-473c-9fce-30f39a32b21d.tmp
Filesize16KB
MD54c9e59110601b3b2252cfb0b483407c9
SHA1459ea2aebfdd6f2125f93b81554f87d4eba518cd
SHA256f88c082c887c2be48f9f81b75b9de2da2e8b70e3a2a389695664656340eced38
SHA5126c827c6fc63e9c7e70e03629bef4a17ef1427c4a69d65def658e6af2a2a333c71283ecfa7ac655525db8993dea72e9b5738d4ac7dec22d6c78ca58949a5ef403
-
Filesize
99KB
MD54e403e6848e1dc8390aa167882c64bef
SHA1a7729a99262cc51673626c2bf0c12679702e3990
SHA2562dd7a554bd36baae1da14a94c25cc665674d6c45b64f411c06fd3bdb749a2eac
SHA512ac27641025497e75f143cd039e634f02317b9b41567b9f688993efb81f08213b24872f4df86a814175a2eef3f4197af37aa83997b39ba8e3f752ec55598fb417
-
Filesize
69KB
MD5c356a0c771a0209d3482777edfc10768
SHA11ff2d992af8a6f19c30ecbe8f3591f26fe1cab08
SHA25632381f4549d36fa4583e599adc04056a4da80a6067c6805b7081c3f3f54a27ad
SHA512561084baf8d65579ead79e79c2c3920ef987384d52ecc11a2689aff95c54a6b823a0c4a8e5b910e60e569450e36563f53adb5796f261f13bbeea59130b81fe3c
-
Filesize
327KB
MD55af1f5628c0ed3c017578c350ec2cb48
SHA17d22949f9b3937c3919c8bb3b44b6bea8b674fd7
SHA256596c529a81532d6a7764277a52a4b4a85bda462c92581b46445d109e8d6fec4b
SHA512ffab1edf8783494db98ebe740a69ca7810ce2fa49c3caa4ad1c439c00c27dd0d282f5a68769e372f1246999e8eff6814937bd130918fe4ad08a63d9c166b9119
-
Filesize
133KB
MD5fe6ca7642fe53df5378b1b31cfe5be6b
SHA110c0912cd94d7e2efb3ffd3578bb7def26df2f6a
SHA2569c24b4941e6363576cebd2fada6864ffae9a8c9dc9b7f8992b8d618a24556d83
SHA5124a36ea9ad25ccded9f5f01e7638837ddea06ff4d9517c5aa13a41c6e92364fee5c2256ea050925b3b5324356a7ef3a8e14b71124614b9db6bb13325807df4ac6
-
Filesize
176KB
MD57da8a4626cbc744c7a3e5ea99bfd1206
SHA1dfa878b1390e05faa25888e88e1242a885effd78
SHA256407dc4bd99a4736162683248f7956582652c1004cd0e076f7503b6dd264de338
SHA51276ae0ad597b884b9f0cc82fc1b0d194cd83a163c1030cb43fe6a1f62599412ae8df0cce5bfafb3f5988a42d21ec2a29fb450567632e0459261ebcc9efde3cfff
-
Filesize
27KB
MD5d9f1b4028e56160b4fa63a9ba27d586b
SHA160e8bfc940918fcfac24a9ccab89fe6e32f7a7f0
SHA256083076465b80b5c92ab2d7bc3bda6d1c73f2e03b0428e656f49c0e30d3853127
SHA512e3a9ae445859b25d8126e5495d9a24509b1846d51ec1d739a21155645ff68d301a9bb90168b4cc4a786f55f32398099aba1e193cb43375a051e6a85ea303a08c
-
Filesize
25KB
MD5cf68af769f58b389fff370595f29e187
SHA1147c498e9a0b8217f7ab9a381f2cc95e338031a6
SHA256ec4a0ca7064697ac71f14a9c0495df7d0436672316ee3f2e5174499549218f7c
SHA512731760f9a6ec0327f608d785aeeecb9922b7f2a7e509caf31fea0e5db83c97c67563513e42ccd95f396c514d80b5481780441512b770d703632e514909027153
-
Filesize
46KB
MD5f871dd44ae8c9e11c5c85c961f8b2ab1
SHA17618910822a0f2639b405e3c0b13faff0431140a
SHA2562ae2564f74716a4e44850d845f0cca255c6c0c3a7dc0c8ee6bfca0212cc394ec
SHA5123b9638f705f83e37c3e0c9db1205b2ac76b96ba72ac56013a6aca6f34a7a9ff3548e8fc67d2b85c9f23f8337f696baa8fab01523fb04b5fd618b130501eed47c
-
Filesize
19KB
MD50f0c9989cbb18447d2f5d954c20ed99f
SHA19ad0fd560c0c478c67cc8f118e363b3a1d1cdb5a
SHA256a43a9e5bbd2d8a8aed070df3b2c799afe064312d6f248c4a498a67c0f9a02720
SHA512ad6a2c60d3e5aab48497169e380d0fa50d7a0fd2bfa0a07313d880afaafd2ff2be7521864ab7ec661866b1ee4309467ef2733a24dba7e0facde8d190739d9fa3
-
Filesize
96KB
MD5faa475d077f88260d6796a46fd5656ae
SHA192900a3395076a8021aba31fc975fdcef4bc60a6
SHA256e84fdb3d44a150998bf6846bc5519a66a97eb1e1462f3b92a9bfa997079025ba
SHA51298cd54d3022b9f11f9819c729d20df829345ba930f5399308f8bb4b810bb9b7db739c4f7eed33bcb294823661ec1217096f457159bd1fde54b10b75253d90bf2
-
Filesize
252KB
MD5004043add47fb7f7c77def472bdf63a9
SHA1a285093b0f01ad5721b70b16d6f6a5270b6a088e
SHA2561c969ca923bbd18127629f7498ebd813f844dfccaf396c14995e16b6f0ba0475
SHA5128543fa8ba2e0eacc04374d6de76f093621a7c4af7907181e01a33a861b1831f52a60552b18fdc71cbe880a60cc60e9a9d989923fb46372114b374dfc4ee4bb7f
-
Filesize
802KB
MD56ee227a16635fe5604b7b0522a40e0e3
SHA16382205c91495f6b93c2dc9e161715131219f978
SHA256bf550c9aae5091c935890dd13c70d1acd00702693670afdf9516c10586901936
SHA512ea68dc914ad394f0c35513359f6c52e11b0829a903f3398036d6b166d129d71678ed6f0acf26334ae6fba2674a5b52979a77a7a041ea6cb2d9da5656d186d685
-
Filesize
164KB
MD54d556c2cc10f8727638e49463b7d2a89
SHA1257179478e9f824988c329ac72563c9aaf7bf60b
SHA256ca0f78aad838f0e3fed01621284f941df080cf134c14768f9ae104fc47c996fb
SHA5123146f1d3b6a0bd3ced1231d313d23591ad14a680b08f75403c79a22c52632ebd279fb05a11918b060b860751633eada4715d13b066fdf6867222f2506ad10a65
-
Filesize
223KB
MD5a06dcd12ab1eab766d22c22b772435e1
SHA1de36891470ceaa364c65e9e31998aa1f1a0d4b03
SHA256eccc0756122ada1ed0f4f7df11d6445e980c44de3e6cd961271c821a669623ee
SHA5123998d3656f3e4e68a0507b51a6aab8251602dbd439839729eadc55e352c35ad81c1da0bd8cafd82dcf74ede5d7daaee47e1f37dcc6f6b308f5d1e355850f7b29
-
Filesize
42KB
MD58f1f73a6bbe39bdf9491f7672b28db4a
SHA117e1b5e01c6ec0fe14e5091c4bcfebc17c0c0f79
SHA256fc0f0e634256ad4acba4e91d7dbe8f18d90b5daa7c5868a5e2115cd45e41c92b
SHA512ea228c4f2126a188005608488b2d980d36984a06999d8fa5a00ffdf14073e4a00d417518fb1716f664394613bbf1ea70b74ad6d12335d1afaddfab51d42538f9
-
Filesize
32KB
MD50ca678222114585bc701a81128e81da5
SHA17153ab703cebe63231f07951ee322af357b30d0c
SHA256d9899ffd6d9533dd3c0c34f02c7ec9f36c0463e0b9386185b0fd0fc5a6247997
SHA512173f744c73f5dc6578dde2a593a0b66688b9c90e2ae066fcbc75f8c080378cfb4c863047cc36785250e788bf08b77efaaef02b56c1a4a8874fef8654b16c4f28
-
Filesize
2KB
MD531c93d390fdbc3db74f6639bd2af73b6
SHA13a35097eae291b00bb2d4395cb2fdfbeb2480ad7
SHA256c78b2be476ca6dd2c5b6719b50a15739bd37eb7e65636a419b2a5e16d57fd534
SHA512f6a2fc789f782e82a353947f50e0ff7cc6c788548b380776d8dd73de8de72748eb977f7f6d201b1c4bd5a5043c6c69cdbf735bd46582d3a82e7f2271aa1b79d8
-
Filesize
3KB
MD5ef29010cee7fd197ce3bfe986c6302a5
SHA13c54341ec1096e26fb6de1779a1ca58ad5b626c6
SHA2565fe58fe15ef50446a5d687260f9d96fd29074d4cb62ad4d6fc66a0e87f6642fa
SHA5120aab82055d0099fd4bc60a878694f2a309b035a782cc77e8692b2d7d56406d5e5e535f7ad9d42c95684bd4c8d9fc4da305dbd83f078af1f095a3f72de11086a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000003.log
Filesize43KB
MD5033b0e8ea305fb5d07b13a57b582170b
SHA1b1b04b0e6ccd58590434a62c28181d14a8624bf7
SHA2560719c90d4cf3b22f389105aa20ecaeb8a1a4d5d1b7f9baae4c09df7df25217b0
SHA51253c1576d777c9807102be6f2b19dbbd4d1882d515713d41d7fb5a025e568e56326ef4e4cb609248c4acb310461b072dd02ce89d3a9d975774791f70c44a07e18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG.old
Filesize392B
MD5ea007281645d281ef4d499077b906135
SHA1f79f4ea1ad08bb41f12380351e67f24416f80444
SHA25669e0f347e7e91906d6b8c91a62b5ba265a1a5d06d9d1cace4c1bc48599bc8be1
SHA512e6f8e0c7653334e7fcdbc8d53d2ce17b559816da36ee39d0fb04d58b6b762a9db6c98cc5ecb43d0820bf9430f19e0d22db038de9dcca2dd81e4a6142031dd5cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG.old~RFe605af5.TMP
Filesize351B
MD55d544f6e30cb97a4e4548cf007f93534
SHA137bfb626bbbba6e9fa00d0e39b05ae709de90cf3
SHA256f5cd80d3546e93c7ad1a3c67c9fadda50aaf2a83df2f3f84e14d6d988fd08698
SHA5121cb57217f8ad7d07d11cf11ea415f7d9b9de6e5969e7e8a4c8f826e637ee57f25635cc2692ea322ec8900494ad42826d8a17a005f82312807c7e3cc02bacb4bd
-
Filesize
4KB
MD528798a3a54108077b03a45841730bc0c
SHA109d93bc45000ad5eb9a2546cbe4f7c6cd5d0c0b6
SHA25658edc99ea80b637256e7e9816a7d9f114330ca214c6089ef892055a0b27a3ff9
SHA5127b7bd58e5a0cbbaa41a79f8960e8c0c180beead44c3c9debaad2c9fb457684432683b2f1d39865779a5d7e4986b502e194580a2b5ed0dadecd5c3d1081a81205
-
Filesize
4KB
MD55e29cb8c2df5b7ab11117219d92eb812
SHA1e9744749f72b676c1b0865810ca912a225602ef3
SHA2566ad2c851e62785865bead51752ab8e8aeb5bec6596740716564a38e19ff3b887
SHA5129b361264d34513935a6cb531961dff9f6314c7873f723342aeb6ab0638858102628717b16546c7266ef76c095db1230679219564643e1f5c663a1f2f522f91d5
-
Filesize
860B
MD50309b52e0f0ba94a4893a22555ae6caf
SHA188c9f8f00210f8be391285df11e1698a46cfdd95
SHA256933313402950c048aa63ba6199a0cc3a23ab2d33f4c413f1daeb7aa6573e3b08
SHA51206a7f1fe19e796f2d1a72bbca28511eebfa35ac81a233737c89263803a1016d7696421b3d9018f5636f2c9d90c48bcb32b4ebb71ad40e4d8f6879cb37b0fa9a5
-
Filesize
1KB
MD5f6abf4852a481c8d7192bc304714f626
SHA11fbdc43025ad830dfebad5263d6857c019c1e2b8
SHA256b16cabfb88f94790cb7bd1e79beb271f408e85598bfa820d0f3b2bab0905b8fe
SHA512ae41e2cfc76ccd39ad5eac599ab2d816b1dd6fa2d449bfb28b1e0232ed98259c6551bed5d3d5f891ae26400e82bdfee05d6bc907a6c13e17a1ff3a1bfba4a901
-
Filesize
356B
MD5aee419715b19b71e5605a1ce299e5504
SHA14044a9bbc309fef1662fa9ef406965f11ad8ab81
SHA256a3115d6f3413de03f6fb7355d6a1b48576e6dfe8498b5faf124bf1f20d59a070
SHA512b4cc286d1ee7b02e1f6e461edc2e4447290b4e5ab5ae571ce670bfe417d964144f87374294607ef1e71d65ed3aa66e73a439c8016b56f49ff8ac69f5ab833092
-
Filesize
1KB
MD5a42b6685ea635da1f8f8cf590c0cd72f
SHA1c154f9bc71e7f097b0c517d5f6ee785d71365415
SHA256edf6075d7cfcbb745b5e6413a71f259ed8c84ad8bda26d806363d543ba426190
SHA5125f57296cdd616c3919d63ba14cd56d7acd83f839ab41fea09a78e0d9c7b15febbd5fa7946a911169b2d491c3ab7aee75e3060c5d5ebcb40557f23e426fb972de
-
Filesize
1KB
MD534b095e9e496af41b36b040914a2d1de
SHA1fb1ebb47bdfb88df5fa0bf00475ea621c55a3ea4
SHA2569b03622255de2982948b1056f52b828c4cd3bae2ce3a26f53a864af62d9f743d
SHA51283818714844b526ff7e1a49ab3db414be3eb699e8163727393b30441e8b689b5e8e43a892c8b97afd09695f8ca6de95f8c80cadf2448be9f854f15cf8b802bb0
-
Filesize
1KB
MD534f2052c12815eff700334064fec551a
SHA155eac0a20b2aed314e1b95040e864e960bf130de
SHA2569c911389ac369009dd3a49910cad1db02fac232a2ed448ee1d315458b2a1b36a
SHA512ba8f268d1d7a48e84f963d727f5bc34357cf60a0bb2a378e3c286c63960228b822f6df26d15ccf986d65361fe5d7c6bae174f8991baab6769b6e710d6ed3ceef
-
Filesize
8KB
MD5f838cd96a78c4ce5ca8ae9a1ae468bff
SHA1d45fefb4c895fd581cfedd2d1fca60462d792ca6
SHA2562b9ec662f1e094cecdde6b3f6581b122e6af7a7500c16000663685768990fc59
SHA5127a7ce2ae98a59cc32cb58a1449c6fffa2875a674b02dd2a60fd4a74ce6c172d3644030a6096d4af4015ffec268152e0605db95484092d5ef3dded30de923df17
-
Filesize
7KB
MD53ca583a5424f20274bc6b2fa46c93b55
SHA13a43e39d6b5df28e8ba4abe007cf1d65a6c2fe05
SHA256a61a35edfff462b3af575605739b02e00d302aa966c41dc8c3544a6c721e51a4
SHA51241ac187d0a8be264cabef7bd14df84c42b2ab5735dcf9057f35e0e267cc1c39523d9ae46a3fbdd5ece0a7abb7a57442608f87885829122215f1ec5bccd572397
-
Filesize
6KB
MD5c783b3d284819464fde0a0205618dca7
SHA19f100971555ebbf327c5b85e7b963494a4fd5f5f
SHA256251a2090402b10e04b9546cf0687c6fdcd955320eb8d701e5f39874ab7cc05e9
SHA51219877a7b66984089b0ce27bfd73c9995e7aa8ee039906df80ef38911196ff58a24ecdc95e52dfb8df16ba1f054587f0b3957866a3ae9d847f15a4e5ee8d90708
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\0af7ef4c-e703-4a77-b663-90f095153b86\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize120B
MD553443bec9910c9207dcb8a9a374b2ca7
SHA16ef7f9949a9142097a63853bcedb05804a0eb900
SHA25696699810a7bcead22d57309a5a2acd808c3412238a3ed33c7eb52e2b9093c7c6
SHA5128ff4aef1e2707c337acc4a4e9d31f3e46066411528365f5b3bbc81963e62565268bb4363bdbd8af06161b9a7f4121b1dc9f8684379b6352f92bdc538befcc064
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize120B
MD5d71e0efb7027947e49b437b07ac1d7e8
SHA1fd1a437695f1b222dc2f179fb5e84122cd227b55
SHA256334bd516b3642803fa370562f36f70a57398b3c5c662120703f84a29e0ab51e1
SHA512bc10321fbdcf2d9d26ac9684a6c58eea8c8865a9eb8cba6a4007c49b026148be5b2625b884c345d51a0eb7d0be6f42e8dbcd1cd5f583ae17ff37e0e22e442388
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5fffc5.TMP
Filesize120B
MD51f530762bd5635bce9188dd709a4bf5c
SHA1e9e1010563b6e84867262bac7e125db685794e63
SHA25671293fc2eae11e7b17fb83dfca20b03a445b7d64fc550be44ced4c092d021639
SHA51229808092549238baee4555a944e56bae7e78abeef970f7ded442d5549a06b3b1c43fdf8fc924b6e1697aabf2811ed1840adf795f6cf65e728339bc9cb2b6c06e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\0a16f52e-997e-4d2c-94d0-60247c93b134\index-dir\the-real-index
Filesize72B
MD5473e76ea3b1f65019fd4fee752487573
SHA100f3370250a2623a8ab73935ba383e28f0b0e63c
SHA25666462448e65796e41b380f5524a7164a145e7db22349ed4117889c62509df750
SHA5124bb882f2d8dd26f6a75ff19ca6f270413a9816cb637ab35ca64ccd7bc1edc96d5d8f4da35a56a46b9e5bc1f7d7e5424c68a49f1aaaecc71b65efd4d5553ca8ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\0a16f52e-997e-4d2c-94d0-60247c93b134\index-dir\the-real-index~RFe60983d.TMP
Filesize48B
MD5849497e41644f997cc4393e60414ed4e
SHA1f96d06423addfc52631b36175731b886988e2dd1
SHA256d0270971b6d6799465f2719dc0f43b4821f7ac9dde56bc32d98137938b512247
SHA51263ff6efa1fbe265b076dc3fe5c421f90828ec93630a87176bd6f0b5903c55b938bb40ff540a4655a40ebb42e990883a55766c3e98b8b3b953b0a6b5ea8c5d418
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\1cd05170-7d97-4478-b16b-b2e713f7ae0d\index-dir\the-real-index
Filesize72B
MD59644f4a21c597935a3d765d006b2986c
SHA1d3011d7ce18240cc69200e8dd571a544708bb416
SHA2566e9cd3c22de2a87224f03514b74a063555fc5f02a59ed4b2b5c32ade9cb25522
SHA512cd4aa7cb6c536e2e07ff44be41b183805786e3006b61ad17296ab5e37ecef305b560a0af845e83135e067a193248de74b281dad0345a80d5717ff9720f7ab287
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\1cd05170-7d97-4478-b16b-b2e713f7ae0d\index-dir\the-real-index~RFe613c6c.TMP
Filesize48B
MD5f110f56a11accb6c38698664f6e07031
SHA1d7ac7208aae47a675c3bea02febd50bd00d248d4
SHA256df8878641ba177153b891d661fc0d7a837a9e87a22a0621da1f22ba352bc5d82
SHA512e91191936750b2a670ee6d4f357a61801c6c9f5985225d2009727cfc3d85f02e3012fc546385b2fd8f3c950464f2ca8f40170bca1b5d7676babe32f51344096f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\7638e172-84e7-4c98-9828-66c8e3b07a33\index-dir\the-real-index
Filesize144B
MD58d2f652a77a2abfd07297da1ea914ab8
SHA156488c94e94b31bbc09cffa99a0901512765f6f4
SHA256a25dff4c03830d1fbf17ec110ed8eb8f81871b4eaee900b461e2d2fbedebc5e5
SHA5126b891f6d9a849d5e4f7c4022f42217053b22472836e35633ffbe2afa08c5285986030ff1b1480969583f6ea74eb816f4809b56b66b79e17feefcdfba40aec008
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\7638e172-84e7-4c98-9828-66c8e3b07a33\index-dir\the-real-index~RFe6136a0.TMP
Filesize48B
MD567e17e5dd66b87af4d9df0cbc47e2323
SHA1b0495c3aa146ef641b0dcbd9a2f295526485b88e
SHA256e01f8b81e2a2c1d34ab70c90072be522580badd18c4fb1f3c30b129d18536b63
SHA51229a688d0d981fd7d2bc49a07315acd2278e419785fcc539d50083f0a12fdba66bcf8ce1e00b26398dd630e61f0092fd2590d5e1b91a505255326aea3d1c98258
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\90b0f7c7-7fa0-4788-a13e-58cb3626b602\index-dir\the-real-index
Filesize1KB
MD5587f464d6306cdbe92d6ae069db75485
SHA1409dc6b648ff46dc87a70a524bd7d03ded58f5c4
SHA25608ff8de163b62ced124620b12492e028c58d9003008f0f4552fde5b3d38c9e1f
SHA51290e2af4aad3908e361321134b743ee5910d829a49583073ee5e07723166a2ee73b5a2fac201cbb6774eba9fc75871e888d1909b270c6232bc6e287419b536996
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\90b0f7c7-7fa0-4788-a13e-58cb3626b602\index-dir\the-real-index
Filesize1KB
MD516c272bdae735477e978f7edd5c146af
SHA1ef2d984c583d29909ed205cde4a7ad9d8bbb8238
SHA256b45525cd92495429e2f10d1649f02629a330a42c484d003f5fc747e4b2ec6db0
SHA51298b0c7c36df6ff80fb714ae981b43356073fc086521335994f353ff58bb79e61898846dc5d386cbcc25e6e168b14885f7c90fc286d8edbcf67ffffa86cf22066
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\90b0f7c7-7fa0-4788-a13e-58cb3626b602\index-dir\the-real-index~RFe60a116.TMP
Filesize48B
MD53c1060d423b0cbff4782f23a3d8e8223
SHA11e64647eaebdc5c08f7dfec3d17707b8a43d587d
SHA256d8c4232d535db41e3228d2997b041e28530d1ed9ef307cb3cc15118cc055db66
SHA5128f37a013d1a854e62a9c9f7289e9de8a705ee7966319759f46cc1d9065648ec6f56d5219db328968127b5cadddef61701a0a31f597af01ba10921de68ab5d0b7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\e76dcccf-e3e3-4ef9-ab5d-24d697f26089\index-dir\the-real-index
Filesize504B
MD5fe8e71f8cb1087cd90644912f4f79ab4
SHA1474887a0db25c8ea5a4ce480c72ea118429d96bb
SHA256d20f178d271677c5700a6ff4c07bdd044fbc210984f875aeae60274c9eaf8346
SHA512ddacf3e50831a4a1ddb46b03a2ed2eb885fdf985597e5cec98400bfb67d67264c5ecc57c0af6de2f1959c7d41d24a0c77027ec8e70acd3a2e99fd803f8869ae1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\e76dcccf-e3e3-4ef9-ab5d-24d697f26089\index-dir\the-real-index~RFe613e02.TMP
Filesize48B
MD5c5f0500bbdf4de4de1b841820f3bf526
SHA1672a4c51822f4bcaa19dc01db257b9890da120a9
SHA256900071f459835e2d51b0de12d54b985234b5f754e6917145a22eb37d85be2c39
SHA51204fc75fde6904bbe273581660a6115a8e5f73156d00e33637055463c4ff88186c908e7f9b3ec50b3d01b63eeb808759048799ef3c598af42b355fa141a51c646
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize237B
MD5646e31d6ed25cc2194b408ed19f7a5ae
SHA140e79e476a43a8d4da916f0920d1f1de634e9d02
SHA25630d1db9d2c6e584a05931f6ff41a823d3f732a184026f35f87d33e211746da4f
SHA512df5daf13545a075cf1b2087738ccae4c87f42b35336f356e9010579bdb2ae83f609e4cdc8d80b71603212f868471f95fa4dcdd642a530447704e1d1b8d79ab0e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize428B
MD5353f428ee973814f107d73cbe35e9c20
SHA1116f18bc65b20549005e967ee41b7184b2c2a673
SHA256f672a98a067492811f48d9ffac362cd4ad5637ec77c2a6c7a64a2eeb60e46786
SHA51226a4f63823f18bf1330b230b815e5ae8f9c727802dc4f0507805957dac54dc5d0f1221379a8b1e2c98241ce6d477aab4d9568efbb3df10089466aec442131f30
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize364B
MD578d17468f6595397acb0437f5642badb
SHA1c8262cd9155e81b387703d00a13545a8685fe15a
SHA256ad6364f131fff11274584f5e4fac70bde4137eb0043820adbb80b483eceb73da
SHA512e5536d36f33c3e24907e4ca19604579d6ef9faef83cb8c7be26c9ae62aab4a7a69954b6c810ecb60d30e9accd9aaed97a3b66816a6d336816baeef4709b0d754
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize305B
MD577a9006ea311583b31fa76c23be4bf67
SHA1f6a3c6ec6e8827e4d37575baf0ff6b14b10eb2af
SHA2563659acebb914ca2d0625df049ca38393550d5cde1b1a01d47fa3bcc8ed216c3c
SHA5128e4cab19614ff8c867da62cdc2ce35e01717ace62d6915a9b91c1c1d4536dc05d67417eac79d6a30aaac8fceb725d4326fe2a6827150655cd91371d9494c7438
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize423B
MD5c426329cff4c6754936800982a12e795
SHA13f9c05dbc49c588d7ff0b59f3ccc0c441aaa8e40
SHA256a8e4581ac8c54c01dc64ddaf889dd2d8259a10131a44e81cc03053338c14b58e
SHA51240db10bb0d08c9b6611ec45c0315fb7ce6561ce7ca7d8de9cc2f04c92eb9397eea6b7dbe3191c5cee1ed837bf7033e9611c6aa34c3e3b5047bc8d9b848143bf1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize234B
MD52dbcafbb62c20d96b81bbfa9d26fe63d
SHA14923514d93ca910c35eb2a0cbed4a7a72b53afc0
SHA2564d6f6f6b89bdc9f8d9010033c3549601ce0ca6aea8e3c7bd95119eceedc337d5
SHA512241e89c04d1a84864341899207822ff9540161d9748dc1beb27bc59c89d883b80087e0f64d6a933875ef479d79b78ee60de19b19ee26d2da775c9819b4f9f011
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt~RFe604a0d.TMP
Filesize142B
MD51bf86a6029f72e79047d08263a37f3d1
SHA1ae8e78a8908ecb6c210f489e34e852cd92762598
SHA256788bcdbc0ffa1fad6ab364c3a5d1c0405aa8e089927d9bd18160d781d968754e
SHA5127e087cfc3d2e76f550af34cd694fd5df3be72df77052a3e581a57f080d2bc688395717341d0746a65e0476dcc00b5848a4d6329dff5aee4697aebaab9b914f5e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
Filesize75KB
MD5420e257ba0c919d23e89b2fabebf478a
SHA1b1ecd8db56c40dc0026aedf19734f16033e60f19
SHA2564689f0cf1b09695b2fa34e3039ec5972499d6d164ef38ba29094984b5b4fcc07
SHA51261959a19560fd9c88c8a1bb6faad4723857676d0bdbd1771d678742bfd3fb1c6339d9a3f108ff91dea1829cb7ab2f0ab41e8ee4433350911e997ce7740be8855
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_1
Filesize79KB
MD5588e357ef3aa38d8e9a55f14d7f859e1
SHA1f2f09d6d787920aa512d313919620c2bd24e90f1
SHA2562fec5a10c3f0006274a8f340a27dcdc31720cfd9a3a8693d6d0ae10ae1754f29
SHA5126a2bc10f21d04fb8d6644c836515ba46c1e0f7531b7087c442ad86ad59a9971d630c5eb85b2faf05412555b4e0c5cdfb749255ca676ebff09c8ac5bb00223750
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5833b026bea24272ba5d28295905e1793
SHA138fc6b3e296039984c9f2fc3755640b133290747
SHA25624e8c31fb8cf6a4a144369e97ed328feef6c5a70a4033bca7e8dcca375d36c20
SHA512a51cf342512b9137ef65b397d646dcd2e0cba292107ed9da1b3368d0798bf4ded7391bbbcf10771897c431ac886e2e2fa506c52bdb79ad7052ac70e2e7c1ef29
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe60980e.TMP
Filesize48B
MD5b6cf2fa9155090504ec9e1f216ff992f
SHA169aa283ce6f906207abf4cef8da09fca1851eac8
SHA25674917570bbb6a7ffe449cc96b2bd8cf3a0513c075b1c2d2d31dc0b5dadd5d515
SHA5120849749708b38f007d84f6278fe5f2b892607e4a454c97967bdac13a0b7013b3fd3be37cc8747b69dd0208bc37613dc51582a640628ce7a535b4be5af44f8f12
-
Filesize
283KB
MD52759f9556d8dc8d900fb72613111a993
SHA11fd5d7b306640e4d947811916d6608b538cefb66
SHA256f93bb777e9bd8abaf64e3e654fc7ee086de2870409ac9d81f591699fc9f9c225
SHA5126cd44db737d27691653e6627f263155af239c1a73c1a9b1cf1394f4ddd115e64cfc6889848e036a38f0c9fa8c2499775071d3c58b7c777c352d484dfbc6b68fd
-
Filesize
263KB
MD56233ab880ad23ad587aa35e1e0dc93aa
SHA110c77114bf916640b723772d463fb11cd43dc611
SHA256f1f768a7370cf1794779bc027aad0c92241f7ae368ad9047f1fc61dc9cf49104
SHA512fb8d9485ad15225af048f6fd568b6991c23f31bf07a4455e56768d9acb0880bdb64358599bb3625c2e02fb3cfe560cee2a57c88b90b751cd5192389422f5f402
-
Filesize
257KB
MD59b3e7c992ad9e75d4e6844a99956e644
SHA1ddd562b464b7eda33a4f4815d2d2e34247fbbf82
SHA2561926768bc1a1f9a6c35c6778e6ce7fe0a339050de03f53265dc6fc076983b5f1
SHA512d24d384b9daad96a7583b3287c685ec4c6d9b5545b8d78c8e3083447f5abe5c523e20d85f3cefc37d88596b8f020b2e654a5b07a23bd792c64f8011020bdb655
-
Filesize
263KB
MD5cb01bab893ab093d3df3464d570ad5fb
SHA158122fb1a1751b1f9ae06151ca3814af9097cbb9
SHA256dbd167dccdce1f78007bcce353abbb6a8a557add6ed503fc1d4f5ffbd85c7197
SHA51269ffaeff29401e0d0161943cc1c15570542dcb2ba3b940043a3780696a5e5a3d5b9951d2d8a0cc945b5e94091f90ef78b0f048ead2de20dc063689fb8217d4a0
-
Filesize
91KB
MD58106786b611e2ea775df8bf4348fd09c
SHA1f4afb41f64dc061696bfc10059f86156c1e03e7b
SHA256d59572132ebd52f843c631f7e6914e5ebe344b77f54d06bd9b4e626045e77d0d
SHA512ed0efbb2cef681c47b33bec5b090b80313d3390477505a82d89e46672ddd311b6ba7534af3d669144f8cd5b05fe81c0958e1101107d389d78b8923369da0a7a7
-
Filesize
88KB
MD584bab262cd3310ce8967e9dd77fc2df2
SHA1036a044af6b8a5c09cb25cf30882a0b1a08a5ec9
SHA2566934a440884031812705c7ef9dc03dc856c0da91027d3968c8d2016be55d3e51
SHA5127185c023b2ee7cbe000d36a28783c6f77be21227aa59cf1de75dd007a01093afd9811a934a50eb0a1c91597a504ffd2a32adc989e8cdaee9146a76018b8a8756
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\28fdf7d7-5a3a-485c-a583-6a8d58810fbb.tmp
Filesize7KB
MD5e817f06ec77463cacc675586398605f3
SHA11035d65feea3f6ebc1777ae86839377dbc33e2ae
SHA2561b4580750385e035a33bef6a2240422348cd09d15259aac7b5b04591b0ada2a4
SHA512b2771cff42b6d47ef74b030e9abacb0e1c214b5f5479ff4945d6ca9985b7822be6189546a869d2f0c92d1f0529eb84b8be5c05be96f4b669087d8e9fcea8d418
-
Filesize
86KB
MD521b99db6353764fcff850ed4de1489ee
SHA1e1771dc14a7d394e89c3a222993ce56c86f44236
SHA2560791bfd5c9dad4b28433efe5937084a816644a47560926dae6831452468c718b
SHA512c92d27c11455e82d60302a0c206e711400f1a74f91473ff1a710453d4a23aa7e4f5632e349c12e4d6b3572a03f0171495bf4782c4ec67101c705b570ed76de4e
-
Filesize
48KB
MD521af9bc981d404957c6344aaff4b3e28
SHA1e5569bc0876884ded0d9594432cc261effc66d47
SHA256e9515acb1b0c8f7c1008358ed424d6563cae681f0e87c53547d0cb7b9f51b051
SHA512fb42427a114a3cb5739c30f6235c4fe3102876b2063772665c82ecce483955d357dead930e6da185f2b27fb0e72b9837ee272c3271efa5b7e80f98edf4cfaae8
-
Filesize
5.4MB
MD5cfefb36838560b726b44c5eb64bc55f6
SHA128b9646a5d6e9aecf4b6cdf6bb97fe30f18900f3
SHA256eb02f21fab1f3bd916d086a5129c7d9aa39027cab9b61e93866e0bfb0724d85a
SHA512732173841815647fe8d3fa758669afebcf9e754c93ed1722b4d4119d04f6a5297ca6177ee1c777b3302ff6f72a810a037b2d344c66ba6086af791ed8a50c9519
-
Filesize
51KB
MD5588ee33c26fe83cb97ca65e3c66b2e87
SHA1842429b803132c3e7827af42fe4dc7a66e736b37
SHA256bbc4044fe46acd7ab69d8a4e3db46e7e3ca713b05fa8ecb096ebe9e133bba760
SHA5126f7500b12fc7a9f57c00711af2bc8a7c62973f9a8e37012b88a0726d06063add02077420bc280e7163302d5f3a005ac8796aee97042c40954144d84c26adbd04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5f2169bf89fe35e868e1edba46ccea5f9
SHA1f9eee5204839b68235a61cb010bd151cb974c3f3
SHA2564f65348e36ead8c3bc3db00fd007d7ca11dfe7d64113517d585c2b4028c4a515
SHA5121d433c2d4be701fcaa65182c170ab0cf8a41c916e06c9c684cd24fce136c2fb7b60495d10e1405a8804fdb4716fd9809087b0a8699e809ea175787b21f4b248e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD581188be54924e9d6d22e1682fb2cfb05
SHA1048cfc477466df97bd8bfc74b3bf8942997bcab7
SHA2561246119f6157f11f8dcbdc80c65bf907cd1346fe0dee3bc771fb88d08cd99cfe
SHA51201bee8c5c1d68614967d29c96fb78ee5db8e4047dadc1bef711771cd58e53d8e47c72c1032f655237dd3a0fc35b73444d30025b3e5f7f449e71f4a11048afc4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD51f3af3bd852bb8258cc533abbe0fdead
SHA1a0e557432d7564c660d74bcc7a299231317f7a2c
SHA256d91cdc8f0673a17d8db5c4623a74162642525fd2f50d85a1a3028a803ae5184b
SHA512d337d264b2310309bed374bbae1b268066cce07e18370dc9b588754ec8a4496463952d6fb1be7b002a687993e993e82c800e3bdb277fe7a6f6ededf1bb655090
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old
Filesize389B
MD5fd6c83e7f726c70468d14a56830dd860
SHA1de10106650ec364d3a6793d1152cbb740a80f55b
SHA256659e71e7dfd0ec3905cec69862f20d3578075ff65c81025857ef2b4390ed99fb
SHA512ad081a9b1bba424cf97a96f3e55ce967c489258aa719fb63d99ebcca2adb0f0197fd47612411b359585dec68bf8af26f33be0d4ece0cab39786ece5b3cee8a6c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old~RFe5f6c21.TMP
Filesize349B
MD58f542c6a59466956f7275b2df10a6ea6
SHA10c2af08bab726f16f43ab5cae2dd562bcab4799c
SHA2568476233a168fb4ca40450abfd36757b9e75eab52921dcb330ba868f372944a24
SHA5123b35612a9e9e65916919b0ab94b22ae018d08fea3d06f871cfedf94d6ffffa8109780be1a78e91d552fedf0d9068acdd9ec2a73e2654770843395fc3bc62aef4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
2KB
MD5cebac8fcb940c6e7a22d2cb741575e48
SHA196fc5da7c1cc81509fd0bc9dd5863ea0e622b48d
SHA2568c81edd176641accf8c99b8818a0e97f7c9f9787243a894c762582688c2087fd
SHA5122f65f6b10a9c1411c77fca7141009c8389145988711a13f8a4b7c840101092b0a97885c329f4d48a320414e2de90d992ec00536a454c6df6e9eec012566dbddd
-
Filesize
9KB
MD5af9eb325c8834dd1fbb30c02332b382c
SHA16d3f13d4d862c06364b6f0ccf81d0b55ec794e42
SHA256ae18108591321cfaa90811f60b9180cb4ca08830b6df74e5b1f8938cd7578b4d
SHA512a8bde388144534ea430a2e23d5d6b1f284efea66919f41da78a81d168ff7052ee965f9bf1bf062074488d1984c6944fac68e7583b40c3b21aa3a4dc82b646837
-
Filesize
9KB
MD5e30cb87471e0c38c360aba2e2f4e02ab
SHA1ae85c85f71ce2de0a65e3bcd608887ddded094ce
SHA2566e5bf6db1788c3285ed6fe3f64d0ce530b5dea0d208ad217d1cf331ee746ffa7
SHA512b3b23ffdbfe914a451a4206f09d7beb596113e00a9195fa0ce436e80e5a792bb04bec788e33160112efb0b90b2e8cc92e8e801f177b5e26fd666def6c82dd674
-
Filesize
5KB
MD56cf98d367d8318e4d1eedbaae062b25c
SHA15ac28a036669575323137d26b6ed01caff4b8ffe
SHA256d74907ba61dcc1d1c047bd05b7661b872a0f6958bd0c7033f2f96d3defca20cc
SHA51233c2a0eeb151e43ed3b62553e00e4e357a5f70b5e097d98f8f025fab4d7d8876f2fe87e16ec15e0acb38795da434d296e0ace95ec0966d98e3ac0387ecc6b427
-
Filesize
6KB
MD5b2833f9305b93105375b4515539de75d
SHA1f2e09c0b378d0c2bca6b04d7b42d9fc0b2745cf3
SHA256c84a90d6a6237fa7a48bcc0a8f993dbae9e7101a225503a405c36f5b6f24a54c
SHA5120940eac02a4e3be767a7c9269a4f7cac65842a08a0ba24d93571f6e7707c7e6a6d5df933273eb3322ae1cff537115365509f0c877a9031c5b671186891829270
-
Filesize
6KB
MD50e78b38dfda1f065b74bc53f4c956719
SHA12073874b0528f74056e7337b6133d760863ebb13
SHA2568d2b00fb89fdce67918b6d645521ca7835cdefb42bffc3d1f1cbec87f1ecb179
SHA512b52d13b148980cd1037be060e6741e504521d7160beee2fa050f60935f391a110c572aff594fbaa1e886aee5969b0e212f8df904a853fb4aa5d0729b0b212d96
-
Filesize
6KB
MD5353e1b5b68117c0d73b72580b4dbfa83
SHA15e30c9e19a57454d12cbac2fe0befefaad06e82d
SHA2563bfd363205ce28d525a48b942b135b4469e6e38bc0d93488ef37687f3068cd1b
SHA512588c6509e5f2d48bd08127934f61e3d4b82cf880cd884fccdfd49c0b77532f7dd65c4ce1e2625d7ca1d23a3a82c1e846351247a532f84f41383612e76546d0ea
-
Filesize
6KB
MD5cec8ca27e03dfee08736ab1a4c5965aa
SHA121355a2675ea5b82a0e68d725b1f9683755efcff
SHA256b0e8e920e087f582c87365a96000a9430bcd8adbd8ea511a987761776151e96c
SHA51214ac028ec02371dfcfde99828a4bb454c4527ed74c582a804036e9471be1eb2160a7d5857a6d7dd129bed23a3352fe21f4bedc5dfb1f46112d308d5f6c3322e6
-
Filesize
6KB
MD5e9da8ce742af13c6b68ed9661d95faa5
SHA1898c39b1e58aa8c5bce413213c2941b74a0be170
SHA256a86ca17fa90e3374c22d342ee6666025b3b6d4fd90fb7d236e62c91029b75cb1
SHA5127f2f1655512148f227a2509b99a27735efa9477bb56ceeb05495709cbaa8ae9869dade378d1ff0455edcf74b02a1d19cefc3f92227d5ab495afe2c175e6d8fe8
-
Filesize
1KB
MD5d4fa0e3d1ae451833d81b48cd45726fe
SHA1e325de0a0d04add3e06406f6db3cc4db16b5428d
SHA2565adc48217a9dff753e70664d8fc38f9c2751abef70183495fbccee1263ba39df
SHA512fcf7545de5bf7d10e77d624d324a2d158ecf8829b52f5a198fe0461f724c3e38f6a0dc545d3b7bcaa29695d9b0a4b09c282931c40e7c82ca636e40793c9a987d
-
Filesize
1KB
MD5e262c80008d7c38557462deea76e661c
SHA12894bcb534f8d0b2de7c2263b69ec78c54d7cd07
SHA256f105714365901db4ce758f6c0f417b0e4f83fbaa3f4356d329f92f2914e9eb4b
SHA512aaed5724e2d5a9b0dfcb3e5e3d80c8fcd4104cbc7cca0bacf4ac4151c28752e3c1d3eb349e41051cf4d5714428be3945265f630d3f2d94b8ad0a4ea29f57a869
-
Filesize
3KB
MD5c6a3aca99810d65dc69629a6ed5d0f9c
SHA14a78eb38a7a486f7e1c23d094b0788fdd4315cdb
SHA256859f8a1fa6837d0dc15b68cb27a021b8dc29f8f4dfbc8f90e2ee883cf52390d3
SHA512014eff8e6f5850942d1ad54c2b5c9131c178c5044e070b1078b2e7997c62ba804d25dc9bd8c5e38678caf420c553298fb8519dc43def46d09130a48338f627c1
-
Filesize
1KB
MD561a3ff72e76e5090c4a607fa71e7d56b
SHA12f5b48cf050ca59c687d82e556b7ae4e67d309e4
SHA256f1aaaa91096a1d6dc50f46772bf70a283e698859ff8398b682427ed356197b58
SHA5124c38745b1cb81c80284b235057e6e9d153c0af9ed23abefb5d79ea94bb7a532bd84dc2b0d424cf80f4ed2f4470792107a664e592c06d3915fcd0855a1a34ebd4
-
Filesize
1KB
MD5e45bc5d6af4e1ccaf27eff38aafb9199
SHA1b70717c15754cf60705baa3df493ec07799b407f
SHA2569acd7d833ddaf21e0270114ff600bd4be6ea528c7bcb4ad44400dd7b2a7d2d14
SHA5125bfba07c7f2cb21974c8922b8f0a6ef6f5d040fc3066b57dd75d82c7bd7cf0dfb7993a3443a85b5a1f311315835ef9c75b0236aa254342ba11eb98cf12222398
-
Filesize
1KB
MD5b0b8ddf954d54495aa8597f731c0d79f
SHA12cd370c6a855809759bd89ac10694b10803e5090
SHA2566f2754f6860a74e36b055385a86f70bd7b75c07a75f6629d4cdcd6c7ebf47bea
SHA5125c2fde3c9d0df9eff3220cf1a7df8a0cd45f5287f34295a417ec3f7c8759be76cf660cc2d8535c9475b9a3e28919980a95cddc2b0ead763271c8acda62239b41
-
Filesize
4KB
MD5d052923898bff24a6035537a87982c8b
SHA1273c29eac58c5a26d2e2978c177c5c272153c9e9
SHA2568b96970eba3f5f0b16a86e7a7e30bcfdbbef187244730160283b1d32f7aad759
SHA51271d82cd1b2d58afaa8a1465d5499f09382fd4e286b534641ab5603248f0f2d15997494c68b18f9abce92a8e76b64f41fdd9e0f70f6b4b837d76d8c538b13e4d8
-
Filesize
4KB
MD550ac69546fc4695cc4588095018d5a2c
SHA1c78c0e086d7287038ee0a6f8d1d1102efc195c98
SHA2561fe74ad2a38ec2c0d9e9ae94698494984f2ac9e902b520692a506a2232fe2e72
SHA51278e37668c5b49147ee05d14cbbf6db2478066b0d4c21a8e4a3984a3376bab914dfbfa64b455ccb7d86c0c8147231c6837e88a6d29b7b8a7726dc3edb021c2e6d
-
Filesize
4KB
MD576ea6fd611367eae146918ea8d1dd033
SHA182e412585741a65a3bdf1fb3f7661ff5a27436b4
SHA256bd3fe826b7d238ee93536681ab54268dcaf03c6c1f2426b1899577c496597161
SHA5126d794d8491a992f86b241b5b159c067bc779f3d150ca3d125f02b294244559e772a57eafc8178114ee9b0715df946854b18a6aefd4b9c43b89d8c020bafd3a0d
-
Filesize
4KB
MD59907c48bd280087f66bd10963edc2644
SHA1338f36eb584e5e25923d2ab41071275be43e016b
SHA256760b876ef1eb88ca480541b770a58e6f7395efbb87e014900f8c56d4b81d06cc
SHA5123398f880435d87562c9c274af71aa4689c94fc89e460d4d272334830206e14c527c17445f0c3c3742f136a260bbce86488fec85f906a164f3e568a64df931df8
-
Filesize
4KB
MD581caaab14e30991ca6428d7b33f8ea34
SHA1c94b900f11b44ee6e1220d25977aba9d0ac411a1
SHA256b85c81945d6e9ea16b5798aeae8e8fb68435a39c715e19055480c402aed80d58
SHA51211cb5ef62a76bdb8d3cee7cf4d36732f7c7a842b1294e3a586715ba63d666da542645f313af3d09f8bc0d1c91896d859de72a5d614a96ddb2707f28b63df4680
-
Filesize
4KB
MD5c908f5c5dea7c6e42aa5d8ff54ec3f0d
SHA18041a85a19ea01a4e0eb7002e6c5dd43ab77b2a1
SHA256666a51a998f9e2d9bcf65c3918eb597474388a39ed6d7f6ccc987581fed4c5b9
SHA5125ace6114996848b4ea50a8c712309836b337a9d6970d24ab63a51a4141ce4d13412fd239a8d3a749fe7e334c42b2edda6ef1d63991178c7645beeafb129ffaab
-
Filesize
4KB
MD54edb7182cd3a16b1bb70d932c5f2d626
SHA1c51280e4c69556c5931e6206f382fbf500961014
SHA25675cb36ae27fe042c4a71b6ba486b07f8904c72dc5e5a77bfd282c6e09f5a73ef
SHA512f49c86c534e02a200f5ccd32cd824b867b49980c1e89d34145876c351cc9b729f5ff7636a73579503dfe155dc0c68ca9ab2307c8f39a3578f9ad3b4ff61ee74f
-
Filesize
4KB
MD5b131e41a1b45daa40d114be5a01d21c5
SHA1804846bc06f7104781c890d2966c84787d25e884
SHA2563bd9e84d6398d7714cf4970c75f2441947517e7e8c206fbed852570f3e6f0f96
SHA51214e0a87d96fc0c25d746c7f6ead4f39fcad5bd09664d25e9a821cf5742bc96c98db76719a2845f880a44d8127eddca5f697683a99067db61eb5163dbcae9dd82
-
Filesize
4KB
MD5afa05d1a749c7e7139e71bcae22472aa
SHA13999bab2058e4cac27947dabb8f1523d532dda9c
SHA25633ad5c5bc70f9313d16dd7a38f9779417e8fcf8e2b16009717a246d01a5b40ec
SHA5122cd870fe04ed8c0526156763466da511faf44ca3d75ec393f36106257292aebbed9e72e8316624149b13b900cd7a890ec5f17caa8fcc7b9c02b54d5f45904618
-
Filesize
4KB
MD5f38934ab1d025e53f2e68e443cd44bf9
SHA16a4be6ad0792817d4423e36e8b37b2cf0534c98d
SHA2562c4241e682fbb9a0b89253d2ec12da874daf710e5b905ddaa6e20959ac374535
SHA5120082e9a6a05233befd3ddf0169044918310ec12e47156b8083ee237e30374c62d35d1afcc4612ce65c8233c2a13b32a8341c3477ba3f63f4079f4678b99b94ce
-
Filesize
4KB
MD52e92153fe5618de986721e6d812383f1
SHA10e7875a9ad2123a4870a65eee0be10cd577424af
SHA2567c593ee9703a29e84dedbf4ccab8e779c0c2599b9cef4eeb1f28cd7cafbf6432
SHA5121e00840aed1b454b206233a07b415d8ae29d388975bcc483aea5b15640a6abd85c852a1901f65883495743c784eefa516802f90cfd20a3cd02f89157e050e161
-
Filesize
4KB
MD56cae11b771e361f360b991958c39f07c
SHA15e3edcea6b1717783fa3040199a025b4830c51f5
SHA2568daf6ea27fccabbe748bcf41a534a4ec1ff8fe157104487baf01504f829105ad
SHA5124f560110f3574ba4dd0ecd83324d96eb14365586e891221c9485999b3b2b519ff0b2566475799c4c353e9072025837308fbc8ebca745e8138cba147b0b617169
-
Filesize
1KB
MD51f04fe9be5a3123e182e501039ce4057
SHA1af62161151c26659c4700c1ba3cd8587f95e6dc7
SHA256d344cef42ecd67248263465d0612f1ca8155d0364901720ec9bf92700ac64d35
SHA51294d342a7fbd63a0dff6e7c4922ee9b939864888136f95fb142164339b4605ebbb4b8ece31537d711f203cded1bdb890831b020cf27ad9199062d4bd0aa2dc4f6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a943d9c5-6344-4e2e-9c79-74814518d662.tmp
Filesize6KB
MD5529793750177b28ea3524d53e0fc4f72
SHA1870a78ad0cc4e36301823a9540e86d08bcb841a6
SHA256951f1106804b2597141d65e3b62f5c8b2c603e6dec79df981f579959b7c0fd82
SHA512bf612ade24d48841a076ec4f5208065e3d7a9b916d4429d0cfd0a95e7b1e9edf5c1a16a50bda11b3aa9573237cf4f89e8f97ac96fe69d74287b88d7873bd2b07
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD597e2dc4db3161e1a05317705c6c096ed
SHA18fab663c13e6efb6837bead4c73919cb23f7243c
SHA256984fcebbd43127a53b352a668791fbe5021d86f924605be5ef5a81cec62ecbfa
SHA512158ae5225bc4c39a7146e508b1bc80aed2ff3150268dff8648538caf9e44c059f85a0310528f38deed2565f9da6ef7529d0fd73bee7086c1da9aeea04ad646a4
-
Filesize
12KB
MD5758cf762b1b9c66c0c925380a9d18521
SHA1843aa696d08edce00202dfceeabb937610bca317
SHA2568d3c953d625761b3313783e6e2c4c88f8517b1907c8dcc844115671a154a8731
SHA512fb349d2fcbb4e4da55de49f7fc9c65d3b91b2ac5802ece39223275bea7f756232752192616d2c26a142350cbacd327a542f003da8b50ffd044af45b3ca440dbd
-
Filesize
12KB
MD518a739c34346088c86c7b2e5422808af
SHA1dfc20c871c457a083b3d459c8cefc607ddbb3289
SHA256a13af5e600c8408a51874d267e1d5818ff7309e6e95d83d9951a24f1c55a68e0
SHA512f69f2f2d946366c8bc9aadd16d42264d64ebe44b0bc0c6a76e73327bb036a09a109880743cb3676ed69a81d6fee9891ef15ed0a2ab8755146b588edf1ed2f54c
-
Filesize
5.7MB
MD5442b78765b051e21bcf04e926b87079e
SHA11a22cf8c593231a6963bf2a624bf105420d4dae9
SHA2564387634feeb838cbf3156a553ff0914b3cbbc3369a1179a3c6fa57c58b755017
SHA512da2fb23108d05193776703addfad8887fa8455e5a1de441fa2a53d1da6142559f19d1a64910d88643b73a23e12fa09b6cb04f3df2aa007edfe0a4adb8175feaa
-
Filesize
280B
MD58ec71a912e70a54403ecb047e86db2cc
SHA1e65b4842923b5292b3b4bb4fff22df6142466dc2
SHA256a9a8af0181b1227b60a26e934658588be47410ebc56551ef6c633c57af8dc5fe
SHA5120d98b4cc72c8b8c5746275f1dea842f2343ea960582985e6a91508438e9f5ca9bc3596c8f521e9d000a07f7e743ab2c8da7dd0abd2c9946ed39be812aba9452e
-
Filesize
280B
MD5703e877552493371f270fc5073d87c12
SHA10a6517b21602899cfc69b68f28f5fd9c863ae85d
SHA256c47165eedc8edbd2d5af8888b36c9dfd713997c387969a409da877ad1eb3eaa2
SHA5127836a61b793068d12485233f2cd1b925e13559ead63674bf3241e157342536e08781bf35c1bc5aef5e875f8c77f214287fbfffd43b76ff488983319ac6f238cd
-
C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD56ba8add769e3d6a578e3c7efe40077e8
SHA11e3095fce5d15e82ba10b94717b1ae4e843bdcfd
SHA256c1ccfcfdca92322f22126b5f71c2e7b0092ce5f00bee01efe895092cca4e853f
SHA512c8a7d8a2312699323335b681215dab37d73d1cd7e031fdc0f97ed3d709c784560c31faa3e94eaa9a94e280f95d378c739e7b45438f736407970d48809360b3a6
-
C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe5c1748.TMP
Filesize48B
MD5fd7eb22caad712c3cd7ce52c701a5aef
SHA1cd8d71a0792adb6530e7220562a281cf363b8157
SHA256b09621a2032212d1ec699e48a2a7d51ae744efb8ca5bca78c775627fcebdf41c
SHA5125de88ce26591df8cf9e8145de1f6aa3e2b95c3d56367a6099808b1e262a357af0652d603059c544eccbbd0b9c7b1848f3c8b2f07f58f00b612e287fad71163d4
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Network\Network Persistent State
Filesize2KB
MD5d27e217643d52991fdfea872b2db6c94
SHA1a9b39b8de518fa45e723f2dabb6479fa906bc89d
SHA256e1f9d22325009b9a3357e9b481a1115d26d97f4644d6cb07f095bf755f5b4d7d
SHA5120f90ee7ebd9bc360d5766d4ed8c71b095cfef19097432a2597c59b273e7c0dd166c67c41fc2db62fa9e866d2bb5c94ac9b8ccb9cf26802020fea5674773dd558
-
C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Network\Network Persistent State~RFe5c1777.TMP
Filesize59B
MD578bfcecb05ed1904edce3b60cb5c7e62
SHA1bf77a7461de9d41d12aa88fba056ba758793d9ce
SHA256c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572
SHA5122420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73
-
C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5eb881f754c284fd0c729ad4da9c3dedc
SHA1d36ed5aada5bc4b5e236802e576504beaa8bb38a
SHA2562b96b913f22102e5774d30696f142bb408b3f3bee0e113b4a63e3698e9f45759
SHA5128ec3cc5aa15cc5669605110cd4bdf68e3b8fb68cf5e905267cd88cc39062baa6f47c6167303653f4b1dade039dd72eb5f76820a854ddc891d9df8c678f5e1fa7
-
C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Preferences~RFe5c1758.TMP
Filesize6KB
MD59fddf5c191c6957fe4646788e1c1cb0c
SHA11a9886aa4a50d87c1d7822745eab3c084616a58c
SHA256487de5e144172ccd1719b934105793386f7b9d5f246c236675b4f95b9634d04f
SHA5125cec8a6dc3e57078e7076535730d468b71f8cab1d1e80ebcb4a3d11d2621d015259abd23237dd1faf414c89a61edcfe960f7985eed4a716225c5423b46287f4d
-
C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5558f815aea6b25885703b65ec35ae307
SHA1569b9580d147562e916947a092427ae7b2ae6061
SHA256829745c6c59b9a00f51be87851b6a6c364038222a4b540cc6dca83cbb4106213
SHA512f8fedc4c592673040ee375791532d1a74002ff129b831475c9438415207fe22e4d0ec5d3fa908bd02be9a4256964bfc9805b5aebb6e8ba2571508c34e3df5fb2
-
Filesize
2KB
MD5eda1a83708898ee51e09a3523a33c0b5
SHA1e1a338fd1fb44b376ee6c2a02649ab8cb836a265
SHA256d72cb04d594497c36661a88c59ff4ee12678f53536fce47e3669b65308ecabe3
SHA5121ba1f6ff590bdcab633515b34dd2f728b343be54ae1c64c18a3cc9c3ee912927cbf8ac13cb848e48d16ebc3137f99b8f9d2638f397a41f1e8425f9dc9933f350
-
Filesize
3KB
MD582c4ee1c6cb69264806978c66cd628a6
SHA1a1c2aaf3c2d324d1470ab3df7d27a15dddc50c57
SHA256a02f19051d2c415d14ec1bea62b8b19dbaaa1e828f661340086174e33f981483
SHA5125f29285ee68efbc3c630fbf555d9b57397cd2539e8b1748c09935dbb4e743f57f819f37fe76a4b730fde75bf5e6ef8883aaf6d0d115f7f2bf8201ca8f13d6f08
-
Filesize
16KB
MD50e5effbfa22b2c6c786b8e2b8c782548
SHA1380e36fc658c273efc59304813845b2ac327650d
SHA2563c74efe1c2e1f4e91befd3660e9dc64e808cba130392a9e347bf5537751e8058
SHA5120080fb205f7af8b4386369a8f8bac7977c71e9ac091772b9e744862e0e1987eb813a5f893f65ca2dace0246bfcfd1f17188f4068c131c32361ba00f10c1346c7
-
Filesize
1KB
MD5c010a1563e9aff89f9a26df5eab630c6
SHA14cca5d7e49e7a84043c6c0d40cf1db47f8314d98
SHA256557b90aff75e5c9a923a7e3c2fb038e5bc391569c6c598b87c069f6f625601b0
SHA512ffb72ddfe3270dd3ced7fa105be28866884dda6067e296c52ed7379f6ab24c9e28c4856ff1f39cbfdf91087e019b727f3ae8b885c5377ba99c959206a60d2d14
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c