Analysis
-
max time kernel
388s -
max time network
392s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/07/2024, 03:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1258666032768356383/1265308732326416424/Solara_roblox.zip?ex=66a84a56&is=66a6f8d6&hm=f372eca84ee22550dbaea8631837e463cacbe326393e8b160d52efa952dae52f&
Resource
win11-20240709-en
General
-
Target
https://cdn.discordapp.com/attachments/1258666032768356383/1265308732326416424/Solara_roblox.zip?ex=66a84a56&is=66a6f8d6&hm=f372eca84ee22550dbaea8631837e463cacbe326393e8b160d52efa952dae52f&
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4668 created 2580 4668 BitLockerToGo.exe 41 -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2576 powershell.exe 840 powershell.exe 2540 powershell.exe 4916 powershell.exe 2576 powershell.exe 840 powershell.exe 2540 powershell.exe 4916 powershell.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 31 IoCs
pid Process 3200 MicrosoftEdgeWebview2Setup.exe 4172 MicrosoftEdgeUpdate.exe 236 MicrosoftEdgeUpdate.exe 1116 MicrosoftEdgeUpdate.exe 4956 MicrosoftEdgeUpdateComRegisterShell64.exe 3516 MicrosoftEdgeUpdateComRegisterShell64.exe 3148 MicrosoftEdgeUpdateComRegisterShell64.exe 3160 MicrosoftEdgeUpdate.exe 4044 MicrosoftEdgeUpdate.exe 1272 MicrosoftEdgeUpdate.exe 2192 MicrosoftEdgeUpdate.exe 3044 MicrosoftEdge_X64_126.0.2592.113.exe 8 setup.exe 3516 setup.exe 4136 MicrosoftEdgeUpdate.exe 1904 msedgewebview2.exe 3356 msedgewebview2.exe 2540 msedgewebview2.exe 1084 msedgewebview2.exe 2152 msedgewebview2.exe 1884 msedgewebview2.exe 2644 driver1.exe 5356 msedgewebview2.exe 5376 msedgewebview2.exe 128 msedgewebview2.exe 5480 msedgewebview2.exe 5540 msedgewebview2.exe 1404 msedgewebview2.exe 6120 MicrosoftEdgeUpdate.exe 6136 driver1.exe 3372 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 60 IoCs
pid Process 4172 MicrosoftEdgeUpdate.exe 236 MicrosoftEdgeUpdate.exe 1116 MicrosoftEdgeUpdate.exe 4956 MicrosoftEdgeUpdateComRegisterShell64.exe 1116 MicrosoftEdgeUpdate.exe 3516 MicrosoftEdgeUpdateComRegisterShell64.exe 1116 MicrosoftEdgeUpdate.exe 3148 MicrosoftEdgeUpdateComRegisterShell64.exe 1116 MicrosoftEdgeUpdate.exe 3160 MicrosoftEdgeUpdate.exe 4044 MicrosoftEdgeUpdate.exe 1272 MicrosoftEdgeUpdate.exe 1272 MicrosoftEdgeUpdate.exe 4044 MicrosoftEdgeUpdate.exe 2192 MicrosoftEdgeUpdate.exe 4136 MicrosoftEdgeUpdate.exe 1320 setup.exe 1904 msedgewebview2.exe 3356 msedgewebview2.exe 1904 msedgewebview2.exe 1904 msedgewebview2.exe 1904 msedgewebview2.exe 2540 msedgewebview2.exe 1084 msedgewebview2.exe 2152 msedgewebview2.exe 2540 msedgewebview2.exe 1084 msedgewebview2.exe 2152 msedgewebview2.exe 2540 msedgewebview2.exe 2540 msedgewebview2.exe 2540 msedgewebview2.exe 1884 msedgewebview2.exe 2540 msedgewebview2.exe 1884 msedgewebview2.exe 1884 msedgewebview2.exe 1904 msedgewebview2.exe 5244 setup.exe 5356 msedgewebview2.exe 5376 msedgewebview2.exe 5356 msedgewebview2.exe 5356 msedgewebview2.exe 5356 msedgewebview2.exe 128 msedgewebview2.exe 5480 msedgewebview2.exe 5540 msedgewebview2.exe 128 msedgewebview2.exe 5480 msedgewebview2.exe 5540 msedgewebview2.exe 128 msedgewebview2.exe 128 msedgewebview2.exe 128 msedgewebview2.exe 128 msedgewebview2.exe 1404 msedgewebview2.exe 1404 msedgewebview2.exe 1404 msedgewebview2.exe 5356 msedgewebview2.exe 6120 MicrosoftEdgeUpdate.exe 3372 MicrosoftEdgeUpdate.exe 3372 MicrosoftEdgeUpdate.exe 6120 MicrosoftEdgeUpdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 setup.exe -
Checks system information in the registry 2 TTPs 16 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 468 tasklist.exe 3408 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 4668 2644 driver1.exe 149 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\nl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\bg.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\identity_proxy\win11\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\sl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\vcruntime140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\eventlog_provider.dll setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF5F4.tmp\msedgeupdateres_fa.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\fa.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Trust Protection Lists\Sigma\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\mspdf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\BHO\ie_to_edge_stub.exe setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF5F4.tmp\MicrosoftEdgeUpdateBroker.exe MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\lb.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Sigma\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\mr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\pt-BR.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\ru.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\vcruntime140_1.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\resources.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\en-GB.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\it.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\sr-Latn-RS.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\ffmpeg.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Trust Protection Lists\Sigma\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\as.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Sigma\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Mu\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\ne.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\fi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\show_third_party_software_licenses.bat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Trust Protection Lists\Mu\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\PdfPreview\PdfPreviewHandler.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\sr-Cyrl-BA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\bs.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\ca.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\MEIPreload\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\msedge.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\concrt140.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source8_1759699720\msedge_7z.data setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\lt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\VisualElements\SmallLogoCanary.png setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF5F4.tmp\msedgeupdateres_az.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF5F4.tmp\msedgeupdateres_fr-CA.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\af.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\en-US.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Mu\Fingerprinting setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Installer\setup.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\microsoft_shell_integration.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Trust Protection Lists\Sigma\Advertising setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF5F4.tmp\msedgeupdateres_te.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF5F4.tmp\msedgeupdateres_th.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\msedge_proxy.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\bn-IN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Sigma\Cryptomining setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF5F4.tmp\msedgeupdateres_ur.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\msedge.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\EBWebView\x64\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\edge_feedback\mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\sr-Cyrl-BA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\VisualElements\SmallLogoCanary.png setup.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 6024 4668 WerFault.exe 149 6056 4668 WerFault.exe 149 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2192 MicrosoftEdgeUpdate.exe 4136 MicrosoftEdgeUpdate.exe 3160 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Detects videocard installed 1 TTPs 2 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1708 wmic.exe 5748 wmic.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 56 Go-http-client/1.1 HTTP User-Agent header 58 Go-http-client/1.1 HTTP User-Agent header 77 Go-http-client/1.1 -
Modifies data under HKEY_USERS 44 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133666964473233024" msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc\CLSID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc.1.0\CLSID\ = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc\CLSID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ = "ICredentialDialog" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ = "IProcessLauncher" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\ProgID\ = "MicrosoftEdgeUpdate.ProcessLauncher.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass\CurVer MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\CurVer\ = "MicrosoftEdgeUpdate.CoreClass.1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ = "IPolicyStatus5" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ = "IAppWeb" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine.1.0\ = "Microsoft Edge Update CredentialDialog" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine.1.0 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ = "IAppVersion" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\CLSID\ = "{8F09CD6C-5964-4573-82E3-EBFF7702865B}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ = "IAppVersionWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachine" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.193.5\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ = "IAppCommandWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9DA54E8E-61A7-4FEB-A84E-CE76BBDB5175} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{513C065E-085A-40C1-B47D-D2F56F9AA0D1}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\CLSID\ = "{77857D02-7A25-4B67-9266-3E122A8F39E4}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0\CLSID\ = "{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Solara_roblox.zip:Zone.Identifier msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1644 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 1336 msedge.exe 1336 msedge.exe 2776 identity_helper.exe 2776 identity_helper.exe 4792 msedge.exe 4792 msedge.exe 4836 msedge.exe 4836 msedge.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 1320 setup.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 4172 MicrosoftEdgeUpdate.exe 4172 MicrosoftEdgeUpdate.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3612 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1904 msedgewebview2.exe 1336 msedge.exe 5356 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3612 taskmgr.exe Token: SeSystemProfilePrivilege 3612 taskmgr.exe Token: SeCreateGlobalPrivilege 3612 taskmgr.exe Token: SeDebugPrivilege 4172 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4172 MicrosoftEdgeUpdate.exe Token: SeIncreaseQuotaPrivilege 1708 wmic.exe Token: SeSecurityPrivilege 1708 wmic.exe Token: SeTakeOwnershipPrivilege 1708 wmic.exe Token: SeLoadDriverPrivilege 1708 wmic.exe Token: SeSystemProfilePrivilege 1708 wmic.exe Token: SeSystemtimePrivilege 1708 wmic.exe Token: SeProfSingleProcessPrivilege 1708 wmic.exe Token: SeIncBasePriorityPrivilege 1708 wmic.exe Token: SeCreatePagefilePrivilege 1708 wmic.exe Token: SeBackupPrivilege 1708 wmic.exe Token: SeRestorePrivilege 1708 wmic.exe Token: SeShutdownPrivilege 1708 wmic.exe Token: SeDebugPrivilege 1708 wmic.exe Token: SeSystemEnvironmentPrivilege 1708 wmic.exe Token: SeRemoteShutdownPrivilege 1708 wmic.exe Token: SeUndockPrivilege 1708 wmic.exe Token: SeManageVolumePrivilege 1708 wmic.exe Token: 33 1708 wmic.exe Token: 34 1708 wmic.exe Token: 35 1708 wmic.exe Token: 36 1708 wmic.exe Token: SeIncreaseQuotaPrivilege 1708 wmic.exe Token: SeSecurityPrivilege 1708 wmic.exe Token: SeTakeOwnershipPrivilege 1708 wmic.exe Token: SeLoadDriverPrivilege 1708 wmic.exe Token: SeSystemProfilePrivilege 1708 wmic.exe Token: SeSystemtimePrivilege 1708 wmic.exe Token: SeProfSingleProcessPrivilege 1708 wmic.exe Token: SeIncBasePriorityPrivilege 1708 wmic.exe Token: SeCreatePagefilePrivilege 1708 wmic.exe Token: SeBackupPrivilege 1708 wmic.exe Token: SeRestorePrivilege 1708 wmic.exe Token: SeShutdownPrivilege 1708 wmic.exe Token: SeDebugPrivilege 1708 wmic.exe Token: SeSystemEnvironmentPrivilege 1708 wmic.exe Token: SeRemoteShutdownPrivilege 1708 wmic.exe Token: SeUndockPrivilege 1708 wmic.exe Token: SeManageVolumePrivilege 1708 wmic.exe Token: 33 1708 wmic.exe Token: 34 1708 wmic.exe Token: 35 1708 wmic.exe Token: 36 1708 wmic.exe Token: SeDebugPrivilege 468 tasklist.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 840 powershell.exe Token: SeIncreaseQuotaPrivilege 2268 wmic.exe Token: SeSecurityPrivilege 2268 wmic.exe Token: SeTakeOwnershipPrivilege 2268 wmic.exe Token: SeLoadDriverPrivilege 2268 wmic.exe Token: SeSystemProfilePrivilege 2268 wmic.exe Token: SeSystemtimePrivilege 2268 wmic.exe Token: SeProfSingleProcessPrivilege 2268 wmic.exe Token: SeIncBasePriorityPrivilege 2268 wmic.exe Token: SeCreatePagefilePrivilege 2268 wmic.exe Token: SeBackupPrivilege 2268 wmic.exe Token: SeRestorePrivilege 2268 wmic.exe Token: SeShutdownPrivilege 2268 wmic.exe Token: SeDebugPrivilege 2268 wmic.exe Token: SeSystemEnvironmentPrivilege 2268 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe 3612 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2276 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1896 1336 msedge.exe 80 PID 1336 wrote to memory of 1896 1336 msedge.exe 80 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 4960 1336 msedge.exe 82 PID 1336 wrote to memory of 2116 1336 msedge.exe 83 PID 1336 wrote to memory of 2116 1336 msedge.exe 83 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 PID 1336 wrote to memory of 4924 1336 msedge.exe 84 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2580
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1258666032768356383/1265308732326416424/Solara_roblox.zip?ex=66a84a56&is=66a6f8d6&hm=f372eca84ee22550dbaea8631837e463cacbe326393e8b160d52efa952dae52f&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xdc,0x110,0x7ffa287a3cb8,0x7ffa287a3cc8,0x7ffa287a3cd82⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1964 /prefetch:22⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3700 /prefetch:22⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,16068448409123287133,11239316296038823562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2432
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2276
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3612
-
C:\Users\Admin\Downloads\Solara_roblox\setup.exe"C:\Users\Admin\Downloads\Solara_roblox\setup.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeC:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Program Files (x86)\Microsoft\Temp\EUF5F4.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUF5F4.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:236
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1116 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4956
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3516
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3148
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezExNkMwRjZFLTE1MDItNEFFQi05RDYzLTU2NTJGNTM3NjlENX0iIHVzZXJpZD0ie0MzMDZBMzk4LTM2RkItNDBDOS1CNzZGLUMyMTU1QTg2QkU3RX0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9IntBNTBERTQ2MC0yM0NELTRFNEMtOEM4Ny1FMDVCRTYxRThDOEJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE0My41NyIgbmV4dHZlcnNpb249IjEuMy4xOTMuNSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTYzNDc4ODM0NyIgaW5zdGFsbF90aW1lX21zPSIxMTA4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3160
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{116C0F6E-1502-4AEB-9D63-5652F53769D5}"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4044
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=1320.4312.169209531942818376622⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:1904 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x180,0x184,0x188,0x15c,0xa8,0x7ffa13e70148,0x7ffa13e70154,0x7ffa13e701603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3356
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1764,i,18045140497947185989,4705146267784018613,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1756 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2540
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2004,i,18045140497947185989,4705146267784018613,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2012 /prefetch:113⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2232,i,18045140497947185989,4705146267784018613,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:133⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3432,i,18045140497947185989,4705146267784018613,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\Solara_roblox\setup.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\Solara_roblox\setup.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM2⤵
- Scheduled Task/Job: Scheduled Task
PID:1644
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2644 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 4724⤵
- Program crash
PID:6024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 4884⤵
- Program crash
PID:6056
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1272 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezExNkMwRjZFLTE1MDItNEFFQi05RDYzLTU2NTJGNTM3NjlENX0iIHVzZXJpZD0ie0MzMDZBMzk4LTM2RkItNDBDOS1CNzZGLUMyMTU1QTg2QkU3RX0iIGluc3RhbGxzb3VyY2U9ImxpbWl0ZWQiIHJlcXVlc3RpZD0iezc0RUZENTM5LUUxRjctNEYyNy1CMjE1LTRCNzNGNDc2NjZFQ30iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgbG9naWNhbF9jcHVzPSI4IiBwaHlzbWVtb3J5PSI4IiBkaXNrX3R5cGU9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxMTQzMjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU2NDE0MTcxMzIiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2192
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{44C8A743-7402-48F0-A0CF-416E8367F998}\MicrosoftEdge_X64_126.0.2592.113.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{44C8A743-7402-48F0-A0CF-416E8367F998}\MicrosoftEdge_X64_126.0.2592.113.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:3044 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{44C8A743-7402-48F0-A0CF-416E8367F998}\EDGEMITMP_8A365.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{44C8A743-7402-48F0-A0CF-416E8367F998}\EDGEMITMP_8A365.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{44C8A743-7402-48F0-A0CF-416E8367F998}\MicrosoftEdge_X64_126.0.2592.113.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:8 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{44C8A743-7402-48F0-A0CF-416E8367F998}\EDGEMITMP_8A365.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{44C8A743-7402-48F0-A0CF-416E8367F998}\EDGEMITMP_8A365.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{44C8A743-7402-48F0-A0CF-416E8367F998}\EDGEMITMP_8A365.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.113 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff6ebc0aa40,0x7ff6ebc0aa4c,0x7ff6ebc0aa584⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3516
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezExNkMwRjZFLTE1MDItNEFFQi05RDYzLTU2NTJGNTM3NjlENX0iIHVzZXJpZD0ie0MzMDZBMzk4LTM2RkItNDBDOS1CNzZGLUMyMTU1QTg2QkU3RX0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9IntCQTI3MDFCNS1CRDUyLTQ0M0ItOUExMS01QUZBRTBGMTQ5OEZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtoVmZEak1kRkc2RmdLczBOejZlbXJZQ1NnNlRRdkRQb21vbFJheVFYQks0PSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMjYuMC4yNTkyLjExMyIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTY2MTU2NjEyNyIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU2NjE3MTcyMTIiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2OTI4MTMyNzIwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuZi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy8wMWEwMmQwZS05ZDhkLTQ3YTMtOGMzNi05YmYzOGRhYmUyMWE_UDE9MTcyMjgyNzQ0OSZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1qMkZuaSUyYnc5aiUyYld5SFNNMTRBTlBBQk11OEZJNjlzeVVOZzBGTEdIOFpQRlV0QUNPSVR0M2MlMmJWJTJiZCUyYllSdlN3NTJmUzRWRUYlMmI3JTJiT3plaHhDN21Hb0ZBJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMTczMTQ4NjE2IiB0b3RhbD0iMTczMTQ4NjE2IiBkb3dubG9hZF90aW1lX21zPSIxMTcwMzYiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2OTI4NzE2NDY4IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4136
-
-
C:\Windows\System32\5cvuvo.exe"C:\Windows\System32\5cvuvo.exe"1⤵PID:2496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\jawshtml.html1⤵PID:1244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa287a3cb8,0x7ffa287a3cc8,0x7ffa287a3cd82⤵PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4668 -ip 46681⤵PID:5992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4668 -ip 46681⤵PID:6040
-
C:\Users\Admin\Downloads\Solara_roblox\setup.exe"C:\Users\Admin\Downloads\Solara_roblox\setup.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
PID:5244 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5244.5348.178499924088956953732⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:5356 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x164,0x168,0x16c,0x140,0x19c,0x7ffa13e70148,0x7ffa13e70154,0x7ffa13e701603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5376
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1756,i,604709415594524524,2561976328770125421,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1716 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:128
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1844,i,604709415594524524,2561976328770125421,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1996 /prefetch:113⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5480
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1352,i,604709415594524524,2561976328770125421,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:133⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5540
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3352,i,604709415594524524,2561976328770125421,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3456 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1404
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
PID:5748
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:3408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\Solara_roblox\setup.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
PID:2540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\Solara_roblox\setup.exe3⤵
- Command and Scripting Interpreter: PowerShell
PID:4916
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵PID:5904
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
PID:6136
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6120
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
PID:3372
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
6System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD54dda37fd043902a07a4d46dd8b5bc4aa
SHA1aeecafae4cca3b4a1e592d93b045de19d09a328e
SHA256806500bb5e7a3e4a2a84d4d08e97d1872dc7ee8f8c255e3c6c2d39437c9779ac
SHA512903280cf47888fcd491b5aa70ffc4de60458fe8fce6e164a02118308cbd36ef0d2e6ecd418d19242d605f9c516598fe723908e28baf702c4c65a284fabc60111
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
181KB
MD55679308b2e276bd371798ac8d579b1f9
SHA1eb01158489726d54ff605a884d77931df40098e4
SHA256c9aef2d24f1c77a366b327b869e4103ed8276ea83b2b40942718cc134a1e122f
SHA5129eb5ef48b47444909b10bf7d96d55c47c02814524df6a479e448e9ff50b9a462ac03c99f57258d0ed8fe3665fb286dde0d9be5a47019fb4d9c68da2b2589e898
-
Filesize
200KB
MD5090901ebefc233cc46d016af98be6d53
SHA13c78e621f9921642dbbd0502b56538d4b037d0cd
SHA2567864bb95eb14e0ae1c249759cb44ad746e448007563b7430911755cf17ea5a77
SHA5125e415dc06689f65155a7ea13c013088808a65afff12fef664178b2ea37e48b4736261564d72e02b898ced58bfb5b3a1fcdd2c7136c0d841868ec7f4f1c32e883
-
Filesize
214KB
MD58428e306e866fe7972f05b6be814c1cf
SHA184ea90405d8d797a6deba68fd6a8efae5a461ce1
SHA256855e2f2fab4968261704cab9bae294fb7ec8b9c26e4d1708e29e26c454c7b0af
SHA512bd40fc5fb4eeca9e1671d0a99a7ccd1d1ab3f84abf62e996827a60e471adecf655b5ed146cdaefcb82d29c563e4eeba7c1b2da243218cbca55009064dcad1f21
-
Filesize
260KB
MD564f7ff56af334d91a50068271bed5043
SHA1108209fde87705b03d56759fd41486d22a3e24df
SHA256a98505367c850b6ef6d2df68d24d83643767a6fab8f0dd22cc60509b3363ce51
SHA512b70c1d2a26f59e94b31beb3151f69d7eb9de8841399b618730d94263cc5402f391cd5cfc6621c8666e5e073e6f8c340d6fd3511f1cb1cbbf6ee75312598f56d7
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD5d1175f877ab160902113b3a2250d0d78
SHA17fc668cd9ed31d093f7c88dc4803ce3f3f833796
SHA2565ccf3eedf6f1f57d386cef188f070c72583d9a96ff674ce91e8776ced8e989b5
SHA512ba1fa4f61c3ed3766e6bd0ae95e36d7505774c463ff81b989e64acaf878cfd59fa41109c696ed16a122e68edc2e0c9f96afd9cfbe92bd7351583719b028c1604
-
Filesize
29KB
MD53cd709bc031a8d68c10aaa086406a385
SHA1673fbf3172ec1cee21688423ad49ec3848639d02
SHA25654dc23402365407bff46318ac0c8cb60c165988f4159a654b5d6013e289f888e
SHA51204e51aeed7c535616f1db7f92841bcda2bc22f85eb06a7ffc5b626f9f69be0219a042e8ae4a486a2f753b7f65901a082b81f5ba72113d9df9ef123b32367d7d6
-
Filesize
24KB
MD515abb596e500038ffdf8a1d7d853d979
SHA16f8239859ff806c6ad682639ff43cedb6799e6a6
SHA25619509364513e1849ddc46824c8b3bbc354bfc4b540158e28e18abb10b8537dda
SHA512c4642146979700898ad3adeb0160c8e9d7bb56c1e224a778d400764750c9d9cbd7c4ee52bec0853cc0e577884515bd40a1b0fd643cc0b66b56d472e0bbb1c23e
-
Filesize
26KB
MD561c48f913b2502e56168cdf475d4766a
SHA12bf4c5ffbfa6d5c5eaf84de074f3ad7555b56d5d
SHA2568fd703a50d9cb19e9249cf4a4409da71104c6a16475b9725306cd13c260cefd1
SHA512d8ba17df865bff6e2785986d9a8310ec7b0e530e389bf7baa719e95b7effa84b58c7102d5f9711fbaebdd2bbcb3cd66760f9eeed92c1aeef06b85d3724028d2f
-
Filesize
29KB
MD52ba6aaea03cf5f98f63a400a9ca127ab
SHA1807c98ab6fe2f45fa43a8817f0adf8abeec75641
SHA256509cb950d7f5d8f99adff84e6e381001f14571529571419fd5452b48e24c7291
SHA512d4b91512b586dbc1cd0c63aaa7bf82900ba80de2b3e265b0200f0a4e2bf0c0a3916675fb72f9bc0b4eaa5d9cc07ade94c8210ad2156fea6d3d2416a5cbf98c24
-
Filesize
29KB
MD5d624c5abfca9e775c6d27b636ca460c4
SHA18726c57cf5887367c8aa32a1de5298521d5fe273
SHA2567023866e9644a1edb50f0f388bc3f2aeaab561822e6b7d75ec5c66b151f126c0
SHA51292d0d5605336c329359f7c4aa7eeaf972f21877ac61f377e7a2f3c6d66f5d6882be649b765e4122043212381034b4131d44ae996dfc1df4a2e248babcb076c30
-
Filesize
29KB
MD56ff52c5cdc434e4513c4d4b8ec23e02d
SHA156b7b73e3cf2cf13fa509593f7c5aebb73639b83
SHA256414269530f9ecb045e2049266ee0b58df99ac37de75e0e127899eb3218371555
SHA512adc3b5593a69dcd0a894ed6bc1160fdbb0d0e9e96e83ca4430ef28e9115d6023f54f3e3fac3cba1ff4497e486991dc4e7e40c7b75ce7796a5044f1ccc5411371
-
Filesize
29KB
MD5c52c76a02dbfbadd6d409fcc9df8dd16
SHA1d406010ac12ed41e6cdc75eaa2daa231a1d6df6a
SHA25691843e7eb2f1a9e14f51f2b552d8390cf7846b4406b97ca98b105beb40fc461a
SHA51228b24bbe03f79a7e4ad51e0e15a664cd783b527255ff0952d43086071e494e7e45ae50d8c378f69abb22942eda2e8dcf8421e2922dcff9ff9cb851745750d2ee
-
Filesize
29KB
MD5eea17b09a2a3420ee57db365d5a7afae
SHA1dc43580f87f67a28c6fa0b056f41c2c0c98a054e
SHA256b86d6df0b608cbab18ea53c31a9a17c09c86e90e8592f3269af0517c9756c07d
SHA51253a199b1bd82ddde65fd6c9bb007867bfa3b2c39e07817a7aff39b7596f00a76bc5dc23687c7fb41b75b00b30ddfdb38a76c740c38bfe41dc21e1fa2d698469f
-
Filesize
28KB
MD51a3815be8fc2a375042e271da63aaa8d
SHA1a831ce72e5fe3c9477dee3defc1e8f1d3a11aaa1
SHA256e753e2315e26bc7b8334077846dc91a85fd89f1e483b305af8aaac5b596585db
SHA5129642fdc3cb49c6d0e4b1c4e1d636007234b126f48da1fe77f586cb8f9403bdc786b54d4bcdbc6175214b7d06a1879f2c809d3fb7e1b920ab36b29a12afe92fb4
-
Filesize
30KB
MD5253afd1816718afa7fd3af5b7ecf430d
SHA136e9d69eb57331a676b0cb71492ab35486b68d95
SHA25653325e46247a616a84442abbc914b8fa08b67800ab55d5625e43a58b19d44767
SHA512649b292b80dde95c195b968b51dd168f6f5513b179a35832b5e759795f04e6e6f326a34f6f7db37d12b8c322ccae197455565491c2484b8237c82e1bb2e77ad6
-
Filesize
29KB
MD57653243e1a6fbb6c643dbc5b32701c74
SHA1fc537eccc1da0775d145b21db9474ef2996e383d
SHA2569df1383dfa81c5064acd9130555dbaf2e7413b6e2bc72b1d2340a6013387061c
SHA512d7834c02a3891afbba040c943ed4255041a6c241d76ac138ad0c04baf589aaa355067395c606e910ef6b91d64042bf9f5c39bd01320d9eaf4ef850a24c17d1d8
-
Filesize
28KB
MD5a2c7099965d93899ff0373786c8aad20
SHA1cfb9420e99cc61fb859ccb5d6da9c03332777591
SHA2561343867f317fe3fc5a2328d427737d41964188aba50a9739fd0ec98319fec192
SHA512d2d1cd41bc425a1aa4c491d65ba9c4ced9dcb600f1d60af76151216f8eda310049002e5ca360d1df8f59d6334ad87b950c67a20a6d1c7f8a2ea322c9980b6a8f
-
Filesize
28KB
MD58fc86afdc203086ba9be1286e597881c
SHA16515d925fbfb655465061d8ee9d8914cc4f50f63
SHA256e8dfc22e5a028ad5d423634bf4ed96b90841fda6ff69c35469509f9a988a3269
SHA512cbfcdea1b4cb5f404553ada87de1240a3746306563f5f200582a21be656b43c0a0e5dcf25cd5ac49bbbe72abcf8147e62aa8a5e0a810bd6fbc7a1eab3e6029eb
-
Filesize
29KB
MD5414adfaec51543500e86dec02ee0f88c
SHA10ad5efb3e8b6213a11e71187023193fafc4c3c26
SHA25632684d2337a351ba37411962710983538341012e6526a9129161507aea0a72bd
SHA512fddc2123237a9357667bbe6b91f93b5a9ba276533b9c16d98adfa01045fca375a7aef5cf83e175c55382a387a16062661a4797da81f39881ab379c7863e2b054
-
Filesize
30KB
MD5d263b293ee07e95487f63e7190fb6125
SHA148020bb9e9f49408c1ce280711aa8f7aaa600fe2
SHA256c4a3198c15489ed873dde5f8a6df708cfc4a6d8722f3f1f63793863098509af3
SHA51269a851e77124e55f3ee4e3fde169f647731a514dfd16a22013a0ea520b9d6eb9f2aacc9c48a2a812eb8285f46db1a27d196c409587f4549f4e122fdb59ffe1b6
-
Filesize
31KB
MD58708b47ba556853c927de474534da5d4
SHA1a60c932bef60bef01e7015d889e325524666aeff
SHA256720074fb92fc405dc7a5305e802e2ecb7d948de58c814b0ebb2c02a0052a6894
SHA51258d7f419b26a95c986009af9e235fbaca67bf6b1883d8c586c802262fd9fbeaff56b051bf8de8e26f2e4ddeb803bbd4f87c84b1e02f5a43b6614231c59ab258a
-
Filesize
27KB
MD5511646c2809c41bcea4431e372bc91fb
SHA15b83f1c9de6bfa6f18ccfecf3190a80af310d681
SHA256719a5c47d3452e3dfda300788aafeba963c588cfea31d1fb1021f846bd6742cc
SHA5120b45cadd82dd534ba9d4556498817c712bd608b645faee74034c8c48cc39c13c0a8530826690a5c5ef42eb36e3f15f3b97e75625eea8902f12c21291df4cd211
-
Filesize
27KB
MD5ec991a4becce773db11c6f4e640abacc
SHA1298b5289e2712ab77cecfb727c9c8d47740f6fd3
SHA256800fc7987f7ac32267e84122eb94d8a21b83c481c2a34b03d832d57debc2b930
SHA5123e6066cb89abafe963337bbdc371b941ac21b69ceaa19f394512c84c0c06ce9d03141a146144d24172ab6e94f5900071b5b3f38c49f3a079c03bec24bd0418ec
-
Filesize
29KB
MD59309baaa10c227af2773000a793a3540
SHA155032c43f7a7eafb19bca097e3de430aad3913a4
SHA256a35fa7145fd3bfbc0d71cfe1bdefcb506cd02f0939dbeca83644978af8f896ac
SHA51221a05fe75d6115a7a49e779c9156ec25880393b30f69fdb80dc0dbe1c3bb401790c8e62525c0e6625b141cecb970b8d650527d73d2d86afa5056177957c44c24
-
Filesize
29KB
MD51c48f6a58fabc2b115dab7dccfae763a
SHA1c60db12b55074013293dd332d2736d251beaeb8e
SHA2560f6775450c40baea4e72d1eb45cff7c1daf2ac1210006bf7afcc91975467c086
SHA512a84a0ffba4f389698941a497ca6e63c6c632d2eeca788bcf970ea35f1083076950b59b9baeecab7ae17d06847f4675f748cc25b904b03f679801dfb3e2755c13
-
Filesize
28KB
MD5d591a3987492132f6ccd7968a8176290
SHA178a79e0e3935dee509938c9a3b095ef486283793
SHA25602380099a6a942004b0b0042f071108f4896884d19ec7c4cc1264200a8e0aa6f
SHA5127487a0e63a17cca85a127c8880e33c30fb192fb83bd05dad67cb4a3b9ad6ba84b594194f7126acbfb22ead2c00d3bb776557a0fa012ee1b7d43d88de2c7eabb1
-
Filesize
28KB
MD567624d2a8017a9c5fbaa22c02fb6d1b4
SHA1b39c26cb632d6e9cbdbe6f0490e80c11a94782e4
SHA256eb0033a91d64a80aaa66bd088692a8d089169524253b6286b5604ea1aaf0bc8f
SHA512f2fb8edb244d781a77c67ab85c40f0521ee80f0349ce897860542b6f32e134043afdccd50cd17e86c234000493f5c3b1b75950d1eb12e4d088b9fc7e012f06d0
-
Filesize
27KB
MD50b3cbfb6bc674960c6da5c47689e45d0
SHA1f91aa435a0bb4fefa3f7568d8f7b0e2022fc95f4
SHA256eca2354e58a321a78bcb21c24beefa050758c08e86218c55c12434c8ce715942
SHA5123a0e819ec96ec05bf0eb7119687be1a408330703a3c888e49a19fc0bb8ee62f45b1c9a9f24d7593e0355177445e566d6cba62d0b7d437b139eb08b274d3bf13e
-
Filesize
28KB
MD573650ec3b5bf0ac418d06ff2cad961c5
SHA15580915cc24402c72c49834cd9bfbd7c845de468
SHA2566817e994def058448407b6320f325f75dea6e2e561ffc747d0486a716d08384d
SHA512c08b069993790440f1baed5fbfc07368e9564d9bf0c16007968569b433b0b18ae6e8184f3073d522e92b6a7b4454ac21998b8f4fe80946273710097c659e2639
-
Filesize
29KB
MD56f2865bdc505a8216aadea20c0a0c6a6
SHA1a93b8db9aa8f2b2887ad43fa050f98584e3db06b
SHA25695b158fd84806d0dadb3d9a90f7b8a78040c1ecee5ff4dd266d407848c9f3a77
SHA512fc9ccad02d6c04e6d2e76b06d5cd60c486b4a2ffcca1cdc638cbeceabfeaf258c8dbcd5ea7fd3f7e2d288577c90565de7005c88638531ff24bfbaf2fba704c69
-
Filesize
30KB
MD593aa56aa0165d137e497c4b77965a6b5
SHA15e1396c24c76dcf8dad5d97e57cfed7372e7b8be
SHA256aaeaff8fae26262cdb2ccf1faf84bd202ff2a90d9fc95575770bc53bccee2c54
SHA512adb8e9aaf493a62a930398682522b8e9411a645d85493ba4e601d6f4eebd48fba982c6df8c5d01a78cc135d03bd3aa912fb71c3c8e26d1d99feb898e0a422a42
-
Filesize
30KB
MD5a4aa60f4891441bd2522d577f14164f9
SHA119f8a517c449b65967a1ae8b1b6a7f492ad0199e
SHA2567768c2b03810cdb491986f349992d32717c4c14df6266d5f70fa89aeb01c5a60
SHA5120a26fc4bddbcb0078f9ad0c5c9417b74f7c30c6a20e1272edbc20a3b0db29ea17dbc3c9224d2f131570444ce4fbf6f20b0b96e720d2b53c882b8735f444091c5
-
Filesize
29KB
MD5302403f155be43251104dadaf07f1c1a
SHA12f4a21b1e7aed5792b269ebe7a81dd29c3a6182f
SHA2563b6dd91cdb5cd4abedff8940c8a9e0f38cb3f8c49084ecbfcd59b788229f3230
SHA512742c2bd0cd9bc7fb75ee1fea45e434fcb40aed839f2854e17267382278269dcca640b3599823b0e4d04350bef0a0450bfad627586ee49f031d1922d73bc74fd9
-
Filesize
30KB
MD547fcec572a8eea3510596c079c431412
SHA1732395d8698191610bfb751e1466a868bca9b839
SHA2564a8c39680f188b75691e80ab5938e34aff83639c06a9722e30555c1cb8a927c7
SHA5121f18528128b6675f51a91c137e328ea06009636ef5c1970a8a4816437f445bdbf96428a3d310b04cfaf61d0a4adea7a4efd4f9bbd4dadb3f320366f39e40fc7e
-
Filesize
29KB
MD5492d2c11ad558129c9c687641bfafb33
SHA1c713926e13f062106937419975defd7e69228b35
SHA2560879c36a3c750ac9bdc4d73ed0ffb23d9c67e6d486291d56d3c5bb60073677c4
SHA51208d0e4664f07f05f3dea2dfa3d64815067b41cd63701b948b43016369a64151ae515f8c877460037b0f5306c8b080756321d2d6195fd392d86d0e9cc61bc1856
-
Filesize
28KB
MD5fae86d2dc9b09f0d8c0192e2bb53d929
SHA1e5d0dc95449d533785367d088ef5a357ebb7dc08
SHA2565d0f9f75e78fa5c0b0bd2406d6c671675492d92d3dc2515314bc79ba3132e540
SHA51201c7ae01172d98fc6cbc92510b2bafdc56f794f290139e3bf87952bc98b27b338e31899dafcd36f965e7240133183c5dfd6cf6085468fa779813121a27d7cbbe
-
Filesize
28KB
MD58d88faed698fbd4895ad6786acdea245
SHA188cea6fe82ac4970a2dafd971277d458b5aef61d
SHA256c1b2203965c8fb10f6faf65d591400a2da7443d0cba36aa8bde147e1ff6aa0a1
SHA5120a6eacb240a75135a7c651e524888462be350116ec19522c079fccca31a26904266e38add42eec5ef1036dcaa05ccdf9faf9d3b91923018d1aefbe8d63d1a27f
-
Filesize
29KB
MD5d9f0084ca7d58e6cbc12b7111b9f4be1
SHA1e96bd472daffd3569551f15eb602a7ce66da8935
SHA2562d45ff287b4dfe4db12cf83a88ddca14b560d991ef28dc6f5078b44d2603fd90
SHA512ba7e017b6cfb11a7e1f4a22c28ac8b4d4dc571a91c32ab6d63a87ef9dec334fee0062c5c764c662b6f8f89b80758a7dc1781858d0455ab3eba455c8d83134418
-
Filesize
29KB
MD5aace1b6afd05113ffe736206e32e8544
SHA148fe1f61e565f99ecf6365ddc6c2c24b2f38db5d
SHA256e395b29108a3a93fcf7411311d4f478f847f0d8337d4a2cefd64ae6bbfd21110
SHA512be7ae77ce69e6ada5a6169a0efb858723428084f9b7818482f2eaf7d5243d24b9c8131ea01e3f94cc9766d7462e5dae0ce5437247907f764ecff011c866bfd81
-
Filesize
28KB
MD5469423bc5ecca0db996ad9fe789fd58e
SHA1dc68d62d25ed917f836036911efd5067f9062c18
SHA256a25d798ed22ad51682aa90f66e5cca638ae095f4141eba6ef7ca45eb1ef217f6
SHA512360717c97b2f582843de19d819a5dda2cb2f8090c6542c0d87ae1a27cbf154cfd0b845d7f816ca236e65ce17013bb8ca640a5af2c9e5fe4fef05e94405491df7
-
Filesize
28KB
MD55dbbd22cda9cd2e19aae769dc7b083b0
SHA153fd1812647e5e413531d8e67e7970d3e22dac03
SHA256973c96fdecc4a157782414eebb1b17a94b146efe1a97b707043953d0ff1d03aa
SHA512774a5873117c98096e8826f7b03a8ddfd2cd7a1f815ee855a591f86f68bfd6bdf537ed49c9d4094fe931aa592da3eeefe0ded3625a9b811aa2a55a129dd7d9ec
-
Filesize
30KB
MD52f7b11cd7db9f173d040519ef0336ac3
SHA195e753d8bf61ef56dba6807bf730a42d390da401
SHA2568f7b44e60f4450655d963cec393fff3fab4f283672a8dbc8109d1ad967671171
SHA512ea60bff57fd53ab2cad475d753066d108c2108e41e7e4abb6b1bca153d04e07dfbba386ba73efe9b8a84032c9bb4b35b3c655280b43ee93637c5b388d1dd187f
-
Filesize
25KB
MD554519f24fcf06916c6386f642ebaf8a5
SHA12a33c7770c49bb3046a2a78a0457d6dcb3a23f02
SHA2561b0adf22a09097ce9ac5d102e0f102e6d3f2238c21b6d38fbec3c269bbf87c44
SHA512704684c706c9a40cdae8a68615a8a9782b29d177bb5c58e8c01e37c139296d6f1d48a446ec211d746aaf341b06a9148e246dd79b0a8a9098de0f66c68ae74eef
-
Filesize
24KB
MD512de274382418dd99d1125101d1d63b6
SHA14a9b0be76a7136f3b64c7bc53724dc2acc798c23
SHA2567e4f333b20f272bd86182fb3fa191e8ac6bc84c301e28886edbcb92e6e5e1eb2
SHA5129b05f97ca079d30560b09ca22efdb314dc7e36cf601d672a260f4c064d7841776891374a18d8ba1fcb4238fb854187b95c2d5643f428277e076b734ff477267c
-
Filesize
16KB
MD5fc2b57ad098d0fa66cc792da1b7dbbc5
SHA18de7eccf773f093f110fc95cdd37833b6163ceb5
SHA256dbe6fd79910735e8f67248449873311a6357e45e688f388794f8b907ceb547fb
SHA5120835ee1257562e6b7fa31a6940d9a59b5fe1aff2c9045a20b063df18a8aa625914853f56719262d1cc03ba0dff9568c430449febac61f786124f2a6061072666
-
Filesize
152B
MD54656c526f71d2c1122865ef7c6af3ff5
SHA161684265064c225f323d304931ff7764f5700ac2
SHA2567172417b8464d5c2f52edfc867f4d83e475b58fd316b1916cdde30ed5bdde80e
SHA512c3e4fc0baa216ef561a448e42378af01a50e0ebd9b5fe554c9af0ea3362b9ca2f4a1b99cfab66c18df085250dd7a5ca1b01ab256e28156d657c579f5518aa56a
-
Filesize
152B
MD5bc5eae38782879246edf98418132e890
SHA146aa7cc473f743c270ed2dc21841ddc6fc468c30
SHA256b9dd7185c7678a25210a40f5a8cac3d048f7774042d93380bbbd1abb94d810d7
SHA51273680b22df232f30faa64f485a4c2f340ba236b5918915866f84053f06532b0a722c4ee8038af3689ac04db41277c7852f7a11a0a15833ef66bcc046ee28afb7
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
256B
MD55c3eb131e25d5c24fe6a5574ce36463c
SHA1ab9bcad034ebf1357d309865947585d9442027e4
SHA2567d625ddb932016d5d016641a2c70e26042477840ea13a793fe52c890416f1417
SHA5125eee06fcb159f28e6dc3f423a1177158dad6c411231aa011c84a36c82cf8537f78793463728d82df8fb5d26ef96d2b04dfcf2f226f3cb4963061a7e40df136f2
-
Filesize
5KB
MD5f97fc6dfc1ab6df6161a033ff27e23dd
SHA15cccdb9f457509f8db680d1f2641a8268fe4e6e1
SHA256a1e679bb3dea66741465edd3d621f58b6be29e61692ee91bee6bf2321b61b049
SHA5123efa88682a49b5cfbf629515c2e033ae496d4b207906f4924803e7304a1919a637ef48aeb4c8ba4a59e141af0a6799cbea029a976702a1369437e657467d9e18
-
Filesize
5KB
MD518d6cbe54ef347d76952b0f03a9fe9f2
SHA1a3456fc42bdb79c52fb08f34c208cd35d7271ed0
SHA256cb4b39ed517dab15b61fbbec749da0c373b3f888baeeb4f7b311f651ad92c2f5
SHA5125b51d987278ee81de52c4c9557350050154464bd5d2895a17c99d979f75d793f8c7bb3a0f31e5a19b9d05065470fc2c1bd3c25f879887ae760568d12e2fbc003
-
Filesize
5KB
MD50c01db9ec93031663b63d72474396f9f
SHA11c5c3853434b679fffb1cccc92335880b400835c
SHA2565a8d71cb0842aafabc5696e9ef71b7f2f1c46f85c076ded849633e879c74aef6
SHA512278c1b83010054366579ca4e2f238e00c553eff9e926fe3c691cef36c875e373f2d16e989b2de5487b7f4b41a7c6e9c7ee50d64e2d94f768a990761a82fe03ec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ee7312d11b12e8f44c591bdef9bb6df3
SHA13deb7a18dd02f70996e6866e37b1ad04548c11ba
SHA256c3e026b5a999765a45c9d8156a450b7e11b2f45c8b4235d04bed5bbfde87075d
SHA51205d32ab4a58690243349210deb6f1c8f1fd4a95819099d5e030e74d0617bd94fe1e1640d33650557b94e16bd24fcbcec6110ec1e3fc44a60b31ca186bf345bf8
-
Filesize
11KB
MD5334b6b1675143d9682abf80542c7aef8
SHA174065cbc152a7986ee342c1536af475c79d28576
SHA25611d0def6c38e78f8de284080968be7869841105dea19002d3dcce50af9cc5ed6
SHA51258f5c25e68cdbd804933154d1401fbb44ad0567a4d0119c20b8c25e8ea499a080904bf1bfbf8df3b3ab77bb51385c4a4d300e2794da54804cdcc83318ed989eb
-
Filesize
11KB
MD5d6c97b44557faae012ccdae380c829a5
SHA1c4a8f31ba8dfef2056b43e551e870ad01cf3fd7e
SHA2564457c8850702e68001757504ac98e6c5363703c8e130a96dadd57e1d0cba37cf
SHA512c7543955d592fe5e41a884fcc2291146e99c8d4b42476f509c19772b4258ad72fa50a06721ca8c1355cddee41505ce17546ef9fe0ecb0e48926c2d1f512f8b4a
-
Filesize
11KB
MD5022b717d2e197a9076aec1849a4fc973
SHA18fea20684c3c98eee90fe5b34ab15eefbc0044f3
SHA2568656281ed3b82eddb196fc1372e4d644d685c1ca6ec67e8799b26793200462e5
SHA51281e421e9d31473140b105755110ebc69599a9c7037a3b442299a6851801b86e87e6c3594bfc83abb6e1a2859351d5aef2a027adcbbc37d11c0084a329aacd27b
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize11KB
MD5fa818effcde20598c3b9ec9eebc345dc
SHA1a26401fd9c0b51b32e036e18f3b6ae3a14240227
SHA256065e354a76c8f6f6db86558fe1376dd6bd479104bd75f95b4022b2be16fc69ec
SHA512df9686a22117e1f1c8fdcc29526fe7301323a37afcd67dd83d3183546bf02849cade68f5af8eef59f415f00076d890b1f5055b94ea96ce395d416499644d0943
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize11KB
MD58020758ff3cf639a521875cc245bfd0e
SHA1bfc0166e6af458547b4244508d43a220efa5a3fe
SHA25624f730d417a70787fc39eb336d653986ca69dec5c89f58f8f6806c0e91fcc8b8
SHA5129ae95be01a567917738cef3a26d13f364550db72718f0ce6e7a46309428ba31182cac353bf8aab1cdcf3fe200cea334a7d6ce4a06e8ff99fa182db9ddca090b1
-
Filesize
1.6MB
MD52aeb55b75f68b4ea3f949cae0ceba066
SHA1daf6fe3b0cb87b4e0ad28d650fc9a190ad192b1c
SHA25622484fdf3008a593e7ca188863d423b8b2a345391120ed296ce8b156cfa983ab
SHA5123b6a6d6c87b8d9ab06fac72fa38067df4c7d4385d37d391d7ad58a623215681fc0366621ce3ce5c08af25e11cc468b18844ea5f7c8ccb71473c956c29d20188c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
280B
MD5822e6c09ec96dca2ae8f245c27e96e2b
SHA15c80b07b5f975676875a6b80d9807dae89c67b59
SHA256d4ddce47e6094533d11ed8050b0bfd8a37ab31c5c72af6ec2f84f80a77b33d04
SHA512e09a331decd706c92fe705482530209a0474ac35a7137b4dbe5468082010e196412f60257c036b95ab15f16d007f505275c1ed48e305b1dc7305dfc09ed13702
-
Filesize
280B
MD53406dc02c1833a1ac622dbaf45fc61e9
SHA18e355e97c84a40a1f82a0d8435b60df0b3e6d075
SHA25663bb34bc7c961fd93edee76f50ef1cafbe6f5275e825304f069fb43066cb5f49
SHA51289f5e8ea990d2beade933402047c8084646453bded5e3f4006f24d21a11dc0a65d46591315858129a23dc01e6eb207ff8e8a82f33f5889a03c8cc9445a080e11
-
Filesize
280B
MD51a697d7ef6c9d6fd56caf64377a41fc2
SHA15f6bb619ac176411dac827248f29cccc1ea8f038
SHA256fe8cb12236dbcceadddd5cf56e0de56daa8167f3f8de01d6179412f52c5226d3
SHA512f849c16ebb7abf22a7b9518d5a1ef3e77a4f0a8dfb1bd2c73a7b1d3ff5b37203ee6f254f666d39521f3fec910b63ab8bfdb23c2d46e8f534172d3032054be5b6
-
Filesize
96B
MD5aade720f3bd126658a026c462c837bf6
SHA1fbe44d4988f672c89cd4b5c95c710af107834f3c
SHA256de7addc4058121b8ca47418a89f032118e2906e540825a45240602585dad0953
SHA5122731f35e6978212fcb2818cd991595b89e79970acbbadba5fe30791f4d7c3527b56884916fa878befda28256d18b50c7a0cb03bdd0b26c182d0021416528bdf1
-
C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe5c5480.TMP
Filesize48B
MD52da363cbf9d1764ead7cc6217d252bee
SHA1a71fcf58fd25e1c5600bf23871806c4b4b039ada
SHA2561d67a7b9ac2e48f05fd87ca3904e1878acaf2e459e2c2fc5f2457f8041dbc240
SHA512954681c2bc2053a59fab2d3f3b888bd8e701f570d2bfa2e494c5bee967cca0bffb53a9642ce22f444cb18934a284f29bf20c30e28f4f85aa9abfd6e28d9f54c1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Network\Network Persistent State~RFe5c93fa.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
188B
MD55b379da8b26390e8122091a4e0efb20d
SHA1408fe15af369b9edba083376f504324e5322b8c0
SHA2562c567d2a25f09cd230cd94702355df29917bee4aef1d2c20cc0624e64674b87f
SHA5129611438e7e3b251654cee28773d750ed041d3ebf53599e09212fb0f2b4ade42481182a41e98dfda444b8fd09786d0e83d1eb041fd0a1bc1a1e7cc3cd7c065fb2
-
C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Network\b93d234a-7765-445f-866b-50f95e28f99c.tmp
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
6KB
MD5d9aa04eb8e4a93cb662a6cb1759917e6
SHA1e6dc9b225baf868c22d043b7a265fa48690fed09
SHA256bb76c2ddbc29acd1faa9f0dd703747a9175b43068e2ff79326474326eac54680
SHA5126b8275502eb035f91f5abc51b6c5426d4b773b2c5e416b7755a5c071fdb40c2473151cd8ce1e08c947d0c28aaab2edd1fc55253a9fd6492744ab0131e4fe32d6
-
Filesize
6KB
MD55c0ef5e3f0d7a4ed285abc9a84927803
SHA16f168f0f9664129f8d5687cc78494e3d94f2bd7e
SHA2564888da81e2ba02efb782a0c163670300a96c0d975af185f2798a6927fb0e8eda
SHA512ea1d9910269f4bdde798c670c22864390b368f3718a3074b53ff56f838a0faf5795b3fe19d4db2b88e180033497efc680456837ff748008d7fc0e476fc451fac
-
Filesize
6KB
MD5a7a523e5f6ff8ddbfd25a16c4d37ab36
SHA13335523140a193d60dbf0b85e4020e62fc127b06
SHA256cbbb33bcf8e0d4258ae2752338364f40efa080bfe5fb9d7c76a39fdfbf4f97b0
SHA5121f4805b71412c8974c6077f648fa12d1943fb084d03b5f54c693af11d5f7170c0bb3323c0d7894cc7684167ccf2679209c1a5ecdc0127e8e6a753a1f594e1d14
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
16KB
MD5c79188ed554b716784a9a9197a78b4cd
SHA18045c46341429de82de0c165bbb40780c2dc8535
SHA256f1ded02576907f10b55a3c2f3934a525235deb0f3ec2c9916dc31fa25e63a64b
SHA5126835ec9dc223da4d78ae9c4f932674f72d800d4dec56c0d1a5cc6ea4d8e319c6003ec1730a4d295ef8f8aa7a4358654521d6ac140a54681f1eb19958cb2f57f0
-
Filesize
16KB
MD515e849be1bb5252e61a8232a0d3d3e00
SHA1c37995d7482819a9443beca009089564ab4f1fb5
SHA2560894470cc6f6f592c117258a07f2ba9f1a5ebce0527e5403757644cac39da14e
SHA5127559da0de632a5399af42bf1ba51029edfdb40b556575910d24d65b5992bad3e206fa97374aaa58bc3df62943546e4649bf8b84fad1c01750dd2d67e38cf084d
-
Filesize
1KB
MD5f4ab27ce4e16c2a1273927d1082472e0
SHA1aa9ca65ebe879d253bae0610e4a42c18f7baf8ca
SHA256b73f9ef24c802929f26d24060bf6bb453f622bb2aaf0aa57d54be793ace100c5
SHA5125d178308dff4a689309c398f5fc4280e48ef0b1f806e09ad1dfc9e119130cf16a229cb79dbada9046ee05e79530e165d94bf051dd8cd307e11a6561ce437a217
-
Filesize
2KB
MD51324d5fc862aade3f586abf5292a0aa3
SHA1434a7e13ab0f4670de2a6eb4534204ff481ec999
SHA256ce622ab6966270dddd976cf71041b5688771a087a657707fcd148a48883c064b
SHA512cdef8afb470cb7a78c25f4625f0d9a855ad2697321a9ed78375424ddd74a550718271c88915954ad5383487b398fdf152c9760e6f0dd231bb1fde290e55d5337
-
Filesize
3KB
MD5980fd1d62a6f390b1b2f4ecf2eca4c3a
SHA1be1e9ef91bd87b42a59eb28e471a3e59a6774db3
SHA256ebb29e3722e0848699ac1d298fdbd311aa32cbb3a36726360171140e05f64843
SHA512773f532237e5d6ee856e2f0d859cdd0e5b88c2c909e54cfc98790527aa1d1f36e992127f5c058f8d5705d20d5ed415a817bb946f980aeeaddc893b510753f08a
-
Filesize
1KB
MD531db1e3db745eadf17e5bbb1889c735f
SHA1f8819b931d680efb2b84d74712a068fa1944d369
SHA25613623e36ce4f5bb64cd6af38f587254ef10b657a5534781466b75ffaef959141
SHA512d6526b84014f93603abbb89474d02b19908423dc544c6d589a0639bbaf26288c97aa34601081ca59232ffe51b9dd36d590264dc26741b0d80aa78d3d8f20389e
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
15.2MB
MD5325eaa719d119aa8a559410b7af339fd
SHA13fcad09ac80ab0e9c056eab70b55887ea4245df3
SHA2563f767ffe96383bc3850ccecde867a3d4395b647947c9a3f004fbbc4894302136
SHA512d76e0fd995621f9267aa5dd25e23bdcd2247fd3732f268f8afc2e382f703e009e97fbfa1022f3d69aa851a1e261267614d923ae2a311fe1177ea3b4036f77e35
-
Filesize
280B
MD53d53983c9f994626436fe4414edbb323
SHA1171ca7abef17452977c7a8a2e29fab8cb6fd0134
SHA256c58aafbe2ebe75c6f4dbea253a512688618db9fe594f1924c519237b86a67b15
SHA512f93c16f02cb20947d524b153d9a3e9b7df34adc07a32b45ecc63d41a54aee2cbda143d9b6fda897f363d40a0f1663ec7ba8b4f3a39bfa432c176a1d188f23ca6