Analysis
-
max time kernel
1168s -
max time network
1136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 18:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1268355581115240490/1268419029970714789/Dark_Textures_Ricu.zip?ex=66b63e06&is=66b4ec86&hm=fd8e2c8c00ef3ac029aa922a1e0e6eb1acc3cbad9a643e54cbb7dcdac8b9d24a&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1268355581115240490/1268419029970714789/Dark_Textures_Ricu.zip?ex=66b63e06&is=66b4ec86&hm=fd8e2c8c00ef3ac029aa922a1e0e6eb1acc3cbad9a643e54cbb7dcdac8b9d24a&
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\127.0.2651.86\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Bloxstrap.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Bloxstrap.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Bloxstrap.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Bloxstrap-v2.7.0.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Bloxstrap.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 48 IoCs
pid Process 2376 Bloxstrap-v2.7.0.exe 624 MicrosoftEdgeWebview2Setup.exe 5740 MicrosoftEdgeUpdate.exe 5716 MicrosoftEdgeUpdate.exe 5392 MicrosoftEdgeUpdate.exe 5776 MicrosoftEdgeUpdateComRegisterShell64.exe 5436 MicrosoftEdgeUpdateComRegisterShell64.exe 5468 MicrosoftEdgeUpdateComRegisterShell64.exe 5824 MicrosoftEdgeUpdate.exe 5680 MicrosoftEdgeUpdate.exe 5788 MicrosoftEdgeUpdate.exe 5660 MicrosoftEdgeUpdate.exe 4920 MicrosoftEdge_X64_127.0.2651.86.exe 4940 setup.exe 4456 setup.exe 6332 MicrosoftEdgeUpdate.exe 6428 RobloxPlayerBeta.exe 5744 Bloxstrap.exe 1164 RobloxPlayerBeta.exe 6724 Bloxstrap.exe 6328 MicrosoftEdgeUpdate.exe 1212 Bloxstrap.exe 6092 RobloxPlayerBeta.exe 2928 MicrosoftEdgeUpdate.exe 4912 MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe 4384 MicrosoftEdgeUpdate.exe 2532 MicrosoftEdgeUpdate.exe 6528 MicrosoftEdgeUpdate.exe 7004 MicrosoftEdgeUpdate.exe 5492 MicrosoftEdgeUpdateComRegisterShell64.exe 6320 MicrosoftEdgeUpdateComRegisterShell64.exe 6808 MicrosoftEdgeUpdateComRegisterShell64.exe 5316 MicrosoftEdgeUpdate.exe 5292 Bloxstrap.exe 840 RobloxPlayerBeta.exe 2208 MicrosoftEdgeUpdate.exe 5896 MicrosoftEdgeUpdate.exe 5948 MicrosoftEdgeUpdate.exe 1372 MicrosoftEdge_X64_127.0.2651.86.exe 5096 setup.exe 5864 setup.exe 6204 setup.exe 6440 setup.exe 780 setup.exe 3764 setup.exe 6252 setup.exe 5880 setup.exe 5056 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 41 IoCs
pid Process 5740 MicrosoftEdgeUpdate.exe 5716 MicrosoftEdgeUpdate.exe 5392 MicrosoftEdgeUpdate.exe 5776 MicrosoftEdgeUpdateComRegisterShell64.exe 5392 MicrosoftEdgeUpdate.exe 5436 MicrosoftEdgeUpdateComRegisterShell64.exe 5392 MicrosoftEdgeUpdate.exe 5468 MicrosoftEdgeUpdateComRegisterShell64.exe 5392 MicrosoftEdgeUpdate.exe 5824 MicrosoftEdgeUpdate.exe 5680 MicrosoftEdgeUpdate.exe 5788 MicrosoftEdgeUpdate.exe 5788 MicrosoftEdgeUpdate.exe 5680 MicrosoftEdgeUpdate.exe 5660 MicrosoftEdgeUpdate.exe 6332 MicrosoftEdgeUpdate.exe 6428 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 6328 MicrosoftEdgeUpdate.exe 6092 RobloxPlayerBeta.exe 2928 MicrosoftEdgeUpdate.exe 2928 MicrosoftEdgeUpdate.exe 6328 MicrosoftEdgeUpdate.exe 4384 MicrosoftEdgeUpdate.exe 2532 MicrosoftEdgeUpdate.exe 6528 MicrosoftEdgeUpdate.exe 7004 MicrosoftEdgeUpdate.exe 5492 MicrosoftEdgeUpdateComRegisterShell64.exe 7004 MicrosoftEdgeUpdate.exe 6320 MicrosoftEdgeUpdateComRegisterShell64.exe 7004 MicrosoftEdgeUpdate.exe 6808 MicrosoftEdgeUpdateComRegisterShell64.exe 7004 MicrosoftEdgeUpdate.exe 5316 MicrosoftEdgeUpdate.exe 840 RobloxPlayerBeta.exe 2208 MicrosoftEdgeUpdate.exe 5896 MicrosoftEdgeUpdate.exe 5896 MicrosoftEdgeUpdate.exe 2208 MicrosoftEdgeUpdate.exe 5948 MicrosoftEdgeUpdate.exe 5056 MicrosoftEdgeUpdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe -
Checks system information in the registry 2 TTPs 26 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 4 IoCs
pid Process 6428 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 840 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 840 RobloxPlayerBeta.exe 840 RobloxPlayerBeta.exe 840 RobloxPlayerBeta.exe 840 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\Locales\ug.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Extensions\external_extensions.json setup.exe File created C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\msedgeupdateres_fa.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\pa.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Locales\hu.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\msedgeupdateres_hi.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\icudtl.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Trust Protection Lists\Sigma\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Installer\setup.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Locales\id.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_proxy\win11\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4EF.tmp\msedgeupdateres_en-GB.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\dxil.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Locales\eu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\da.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\km.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Trust Protection Lists\Sigma\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Locales\pt-PT.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\wdag.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\sl.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4EF.tmp\msedgeupdateres_ro.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4EF.tmp\msedgeupdateres_tr.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\icudtl.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\ko.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\VisualElements\SmallLogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\cy.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\mt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\fi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\Trust Protection Lists\Sigma\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\VisualElements\SmallLogoCanary.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_proxy\resources.pri setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Locales\ml.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU4EF.tmp\msedgeupdateres_en.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\Trust Protection Lists\Mu\Fingerprinting setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\Locales\sr-Cyrl-BA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\identity_proxy\win10\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\msedgeupdateres_sr-Latn-RS.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\identity_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Trust Protection Lists\Sigma\Staging setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\onnxruntime.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\VisualElements\LogoBeta.png setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\psuser.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\msedgeupdateres_sr-Cyrl-BA.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\copilot_provider_msix\copilot_provider_neutral.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\Locales\nn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\sv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\Trust Protection Lists\Sigma\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\Locales\lv.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\sl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Locales\bs.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\msedgeupdateres_ga.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\msedgeupdateres_mk.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\Locales\es.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\identity_proxy\stable.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\VisualElements\LogoCanary.png setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Installer\msedge_7z.data setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\Locales\te.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\msedgeupdateres_fr-CA.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6332 MicrosoftEdgeUpdate.exe 4384 MicrosoftEdgeUpdate.exe 5316 MicrosoftEdgeUpdate.exe 5948 MicrosoftEdgeUpdate.exe 5056 MicrosoftEdgeUpdate.exe 5824 MicrosoftEdgeUpdate.exe 5660 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\127.0.2651.86\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\127.0.2651.86\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback\CLSID\ = "{E421557C-0628-43FB-BF2B-7C9F8A4D067C}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0E8770A1-043A-4818-BB5C-41862B93EEFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods\ = "23" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ = "IAppVersionWeb" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E3D94CEB-EC11-46BE-8872-7DDCE37FABFA} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\CurVer\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachine.1.0" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\.xhtml setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\CLSID\ = "{8F09CD6C-5964-4573-82E3-EBFF7702865B}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ = "Interface {C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachine" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell\open setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\CLSID\ = "{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}" MicrosoftEdgeUpdate.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RobloxPlayerBeta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e RobloxPlayerBeta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3276 chrome.exe 3276 chrome.exe 4448 chrome.exe 4448 chrome.exe 4448 chrome.exe 4448 chrome.exe 2376 Bloxstrap-v2.7.0.exe 5740 MicrosoftEdgeUpdate.exe 5740 MicrosoftEdgeUpdate.exe 5740 MicrosoftEdgeUpdate.exe 5740 MicrosoftEdgeUpdate.exe 5740 MicrosoftEdgeUpdate.exe 5740 MicrosoftEdgeUpdate.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 6428 RobloxPlayerBeta.exe 6428 RobloxPlayerBeta.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe 2376 Bloxstrap-v2.7.0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5772 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe Token: SeShutdownPrivilege 3276 chrome.exe Token: SeCreatePagefilePrivilege 3276 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 3276 chrome.exe 2376 Bloxstrap-v2.7.0.exe 5744 Bloxstrap.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe 5772 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4396 OpenWith.exe 2488 OpenWith.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 6428 RobloxPlayerBeta.exe 1164 RobloxPlayerBeta.exe 6092 RobloxPlayerBeta.exe 840 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3424 wrote to memory of 3652 3424 chrome.exe 83 PID 3424 wrote to memory of 3652 3424 chrome.exe 83 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 4684 3424 chrome.exe 84 PID 3424 wrote to memory of 968 3424 chrome.exe 85 PID 3424 wrote to memory of 968 3424 chrome.exe 85 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 PID 3424 wrote to memory of 3924 3424 chrome.exe 86 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1268355581115240490/1268419029970714789/Dark_Textures_Ricu.zip?ex=66b63e06&is=66b4ec86&hm=fd8e2c8c00ef3ac029aa922a1e0e6eb1acc3cbad9a643e54cbb7dcdac8b9d24a&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffee38cc40,0x7fffee38cc4c,0x7fffee38cc582⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,279400705821239312,12901682291451520129,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,279400705821239312,12901682291451520129,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2024 /prefetch:32⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,279400705821239312,12901682291451520129,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2248 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,279400705821239312,12901682291451520129,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,279400705821239312,12901682291451520129,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3676,i,279400705821239312,12901682291451520129,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4556,i,279400705821239312,12901682291451520129,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3692
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fffee38cc40,0x7fffee38cc4c,0x7fffee38cc582⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2084,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2236 /prefetch:32⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3292,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4048,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4820,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5172,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3240,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3700 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3320,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3508,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5400,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5324,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5828,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5848,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6004,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6048,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6560,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6600 /prefetch:82⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=3344,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5332,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6672,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5136,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=3164,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2764 /prefetch:12⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6112,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=240 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=3496,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=6720,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=6864,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6740,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6088,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6400 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6012,i,14703347941151473082,7848814538889842751,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1028
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x41c 0x4c81⤵PID:3268
-
C:\Users\Admin\Downloads\Bloxstrap-v2.7.0.exe"C:\Users\Admin\Downloads\Bloxstrap-v2.7.0.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:2376 -
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe" /silent /install2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:624 -
C:\Program Files (x86)\Microsoft\Temp\EU4EF.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU4EF.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5740 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5716
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5392 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5776
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5436
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5468
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MkYxNDI2QzctMTBEQy00RTBCLTlERDEtRjFBQUMwQkRCQkMzfSIgdXNlcmlkPSJ7RTdGOTMwNUItNjJDNC00MENBLTlBRTMtM0MyMzdFMDAzQzc2fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntEQjhCNjQzQy1DMzg1LTRGQ0EtQkEyOC0xQ0I3Qzg5MEMzQjh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE5NS4xNSIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9Ijg5ODg0Mjk4MzYiIGluc3RhbGxfdGltZV9tcz0iNDA2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5824
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{2F1426C7-10DC-4E0B-9DD1-F1AAC0BDBBC3}" /silent4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5680
-
-
-
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\RobloxPlayerBeta.exe" --app -channel production2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:6428
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5788 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MkYxNDI2QzctMTBEQy00RTBCLTlERDEtRjFBQUMwQkRCQkMzfSIgdXNlcmlkPSJ7RTdGOTMwNUItNjJDNC00MENBLTlBRTMtM0MyMzdFMDAzQzc2fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5RjdFMzcyRC02M0IzLTRGMTEtQUI2Qi05MTU0QzEzMkQ5NTh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9Ijg5OTI3MTk4MTciLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5660
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{11CA1FCC-A2F4-4588-AE29-D295F9F388A6}\MicrosoftEdge_X64_127.0.2651.86.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{11CA1FCC-A2F4-4588-AE29-D295F9F388A6}\MicrosoftEdge_X64_127.0.2651.86.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:4920 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{11CA1FCC-A2F4-4588-AE29-D295F9F388A6}\EDGEMITMP_B4D4A.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{11CA1FCC-A2F4-4588-AE29-D295F9F388A6}\EDGEMITMP_B4D4A.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{11CA1FCC-A2F4-4588-AE29-D295F9F388A6}\MicrosoftEdge_X64_127.0.2651.86.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4940 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{11CA1FCC-A2F4-4588-AE29-D295F9F388A6}\EDGEMITMP_B4D4A.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{11CA1FCC-A2F4-4588-AE29-D295F9F388A6}\EDGEMITMP_B4D4A.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{11CA1FCC-A2F4-4588-AE29-D295F9F388A6}\EDGEMITMP_B4D4A.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff6dd3fb7d0,0x7ff6dd3fb7dc,0x7ff6dd3fb7e84⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4456
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MkYxNDI2QzctMTBEQy00RTBCLTlERDEtRjFBQUMwQkRCQkMzfSIgdXNlcmlkPSJ7RTdGOTMwNUItNjJDNC00MENBLTlBRTMtM0MyMzdFMDAzQzc2fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5NDQ4MzUyNC04NjNFLTQzM0MtQUI2NC03NEI1ODQ0QjJBNzV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMTI3LjAuMjY1MS44NiIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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_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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI5Nzg0NjE5ODIxIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMTgwMSIgZG93bmxvYWRfdGltZV9tcz0iMzE4NjAiIGRvd25sb2FkZWQ9IjE3MjU2NzEwNCIgdG90YWw9IjE3MjU2NzEwNCIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iNDM3NTgiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:6332
-
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
PID:5744 -
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\RobloxPlayerBeta.exe" --app -channel production2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:1164
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:5772
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe" -menu1⤵
- Checks computer location settings
- Executes dropped EXE
PID:6724
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
PID:6328
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\RobloxPlayerBeta.exe" --app -channel production2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:6092
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2928 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{395FB008-AF96-4177-BCED-65EAD06299AB}\MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{395FB008-AF96-4177-BCED-65EAD06299AB}\MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe" /update /sessionid "{10A13714-90C5-432C-B3FA-813E23226E44}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU5F6B.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{10A13714-90C5-432C-B3FA-813E23226E44}"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6528
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:7004 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5492
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:6320
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:6808
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTBBMTM3MTQtOTBDNS00MzJDLUIzRkEtODEzRTIzMjI2RTQ0fSIgdXNlcmlkPSJ7RTdGOTMwNUItNjJDNC00MENBLTlBRTMtM0MyMzdFMDAzQzc2fSIgaW5zdGFsbHNvdXJjZT0ic2VsZnVwZGF0ZSIgcmVxdWVzdGlkPSJ7RUM2RjRFQUYtREM1My00QTE0LUIyNDQtQzBBMENGRUQ0MkQyfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjE1IiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iNiIgaW5zdGFsbGRhdGV0aW1lPSIxNzIyNjAxNzAxIj48ZXZlbnQgZXZlbnR0eXBlPSIzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMjQ5ODc2OTk1NyIvPjwvYXBwPjwvcmVxdWVzdD44⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5316
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTBBMTM3MTQtOTBDNS00MzJDLUIzRkEtODEzRTIzMjI2RTQ0fSIgdXNlcmlkPSJ7RTdGOTMwNUItNjJDNC00MENBLTlBRTMtM0MyMzdFMDAzQzc2fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins5NzNGQTQ0Ni03OEJGLTQ4RjItQjNBNy1FRDYwQzA4Qzk1OTF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE3MS4zOSIgbmV4dHZlcnNpb249IjEuMy4xOTUuMTUiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iSXNPbkludGVydmFsQ29tbWFuZHNBbGxvd2VkPSU1QiUyMi10YXJnZXRfZGV2JTIyJTVEIiBpbnN0YWxsYWdlPSI2Ij48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjEyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMjE5MzkwOTg4MyIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMjE5Mzk5OTkwMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMCIgZXJyb3Jjb2RlPSItMjE0NzAyMzgzOCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTI0ODIxMjk4MjgiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIGRvd25sb2FkZXI9ImRvIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy8zMjNmYTdmNy00NDQ1LTQxMzctODJlYy03MTUyODk0OTE4MmE_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-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEyNDgyMTY5OTI3IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEyNDg3MzI5NzgzIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PHBpbmcgcj0iNiIgcmQ9IjY0MjMiIHBpbmdfZnJlc2huZXNzPSJ7RTIzM0I4NDktRjM3Ri00OEQ3LTk5OTYtNTc4NzAxRUMwMjA4fSIvPjwvYXBwPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSI5Mi4wLjkwMi42NyIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJjb25zZW50PWZhbHNlIiBpbnN0YWxsYWdlPSI2IiBsYXN0X2xhdW5jaF90aW1lPSIxMzM2NzA3ODI5OTQ4Mjg4NjAiPjx1cGRhdGVjaGVjay8-PHBpbmcgYWN0aXZlPSIxIiBhPSI2IiByPSI2IiBhZD0iNjQyMyIgcmQ9IjY0MjMiIHBpbmdfZnJlc2huZXNzPSJ7MTZBNzVEQzctOEY0Ri00QUNDLUJFMDgtREVBNThCQkRERDRGfSIvPjwvYXBwPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIxMjcuMC4yNjUxLjg2IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMCIgaW5zdGFsbGRhdGU9IjY0MjYiPjx1cGRhdGVjaGVjay8-PHBpbmcgcj0iLTEiIHJkPSItMSIgcGluZ19mcmVzaG5lc3M9InswRjM1RDBCRC1DRUY5LTQxN0MtODhBMi02NjA1OTBBODE3QkR9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4384
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4396
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2488
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:5292 -
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-6fdcfe060c6440cd\RobloxPlayerBeta.exe" --app -channel production2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:840
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
PID:2584
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2208
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5896 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QUE3RDZFMTktREQ4RS00QzIyLTgyQzUtOTExMkNBODYzRjczfSIgdXNlcmlkPSJ7RTdGOTMwNUItNjJDNC00MENBLTlBRTMtM0MyMzdFMDAzQzc2fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7OTg5NUY4NjYtMUJDNS00MUIyLUFGNjgtQ0JDOEUwNjRBODJCfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O2hWZkRqTWRGRzZGZ0tzME56NmVtcllDU2c2VFF2RFBvbW9sUmF5UVhCSzQ9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MjI2MDI2OTgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM2NzA3NTI3MTM1MjcwNDEiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTE0MzI1IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxNTgyNTExOTgzMyIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5948
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\MicrosoftEdge_X64_127.0.2651.86.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\MicrosoftEdge_X64_127.0.2651.86.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
PID:1372 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\MicrosoftEdge_X64_127.0.2651.86.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
PID:5096 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff72808b7d0,0x7ff72808b7dc,0x7ff72808b7e84⤵
- Executes dropped EXE
PID:5864
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:6204 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff72808b7d0,0x7ff72808b7dc,0x7ff72808b7e85⤵
- Executes dropped EXE
PID:6440
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level4⤵
- Executes dropped EXE
PID:780 -
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff645f5b7d0,0x7ff645f5b7dc,0x7ff645f5b7e85⤵
- Executes dropped EXE
PID:6252
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵
- Executes dropped EXE
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff645f5b7d0,0x7ff645f5b7dc,0x7ff645f5b7e85⤵
- Executes dropped EXE
PID:5880
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QUE3RDZFMTktREQ4RS00QzIyLTgyQzUtOTExMkNBODYzRjczfSIgdXNlcmlkPSJ7RTdGOTMwNUItNjJDNC00MENBLTlBRTMtM0MyMzdFMDAzQzc2fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins0ODA2MTQzRi02NTNGLTRDRUItQkQ4My1DOTI2NDg2OUY4Q0V9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE5NS4xNSIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJJc09uSW50ZXJ2YWxDb21tYW5kc0FsbG93ZWQ9JTVCJTIyLXRhcmdldF9kZXYlMjIlNUQiIGluc3RhbGxhZ2U9IjYiIGNvaG9ydD0icnJmQDAuNjIiPjx1cGRhdGVjaGVjay8-PHBpbmcgcmQ9IjY0MjkiIHBpbmdfZnJlc2huZXNzPSJ7NEJDRjFDNUUtNjM5Qy00Njk5LThCOEYtOEVDNzJCMjUwRDdEfSIvPjwvYXBwPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSI5Mi4wLjkwMi42NyIgbmV4dHZlcnNpb249IjEyNy4wLjI2NTEuODYiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iNiIgaXNfcGlubmVkX3N5c3RlbT0idHJ1ZSIgbGFzdF9sYXVuY2hfY291bnQ9IjEiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzY3MDc4Mjk5NDgyODg2MCI-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-PHBpbmcgYWN0aXZlPSIwIiByZD0iNjQyOSIgcGluZ19mcmVzaG5lc3M9Ins5Q0EzRTlDRC0zREE2LTRGMUMtQjdDMC01MDQwQzlBNDJENjV9Ii8-PC9hcHA-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IjEyNy4wLjI2NTEuODYiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZT0iNjQyNiIgY29ob3J0PSJycmZAMC42NSI-PHVwZGF0ZWNoZWNrLz48cGluZyByZD0iNjQyOSIgcGluZ19mcmVzaG5lc3M9Ins4M0NCN0I4Ny03NTgwLTQ0NDAtODRCNC0xQTRBOTAwNDY4RDF9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\DenyEnter.bat" "1⤵PID:4984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\DenyEnter.bat" "1⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD571bf4a76d1762959b49eda173f57656e
SHA12ead7f36b7ef2790d83d10d96b20959bf73d061d
SHA2560121c1dde7daaacfd974fc8545a029e970ad7769af84646feff41b7c8c2de33e
SHA51205ea34097e98e4df5358a2968e4af9c7157c1946b15787d5c3cb1c841d47db6cacda4135a0fc662c2dae0b8ad03bdcfa1015db745c39bb16068df0108bda717e
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.195.15\MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe
Filesize1.6MB
MD590decc230b529e4fd7e5fa709e575e76
SHA1aa48b58cf2293dad5854431448385e583b53652c
SHA25691f0deec7d7319e57477b74a7a5f4d17c15eb2924b53e05a5998d67ecc8201f2
SHA51215c0c5ef077d5aca08c067afbc8865ad267abd7b82049655276724bce7f09c16f52d13d69d1449888d8075e13125ff8f880a0d92adc9b65a5171740a7c72df03
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{69715F62-35A4-4F6E-B840-48DAE3480797}\EDGEMITMP_579FD.tmp\SETUP.EX_
Filesize2.6MB
MD5773e45f33cae3d7e514589b04930d7ba
SHA1ca73da33a39de5309b596eaeb055f3175864c0ae
SHA25616ee960dbf5a6b3c3d465ba2d77c049af4c15e5aea5c6f8b2e44ee7e5a623ed8
SHA512d707474b38e991b8b015a0cc1bddc5dec29622c9f48b43e4b37d4e4d2a74dca70fd71eb792ee8d38c53af43da4e500afa018b27df3dfc9b652b5c1c0a76fff4f
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
280B
MD516bc6e9856e2a50a03fafd8f050f06ae
SHA1a9a43398fe6f45d2b00b256b95af2a55763dc031
SHA256907b8277d12e3dbf0c77316763103737e6f5f302f530f9e07ccb9a16f6d33be5
SHA5121672848e4ce7698e86f9c7d0617e1a42c26e2d9b3500a4df65126bcf6ff2aa0cb436665970a987eaf7b6833fcd28aa0db8bfa31a00b160261cac09e599c4be6f
-
Filesize
181KB
MD5d00f8259db0aba638b1948dfa61c32b0
SHA1b2abdfee3856d43ff9bafa3750ffc83ed176c31a
SHA256e16c4de4796c478ecee42071a588f6caeb057254b5f15eea2b0202be75de0909
SHA5125760b5dfdd56e138b4f902e92495a957c0b1696b3491920f07125e16da8bb719e8a42ff49670f1e993884392c50f5efe8dad69f593077d0f8bcbabd3fbefa3cf
-
Filesize
79B
MD5eab6dcc312473d43c2fa8cc41280d79c
SHA1b4e9ec7e579d06dfcaa5ac616de2751308a153c3
SHA2560a27d3c9100ab7ab6f03c45daeb0f0cd586f3aeb59daf7986e853f9614e954fe
SHA5121ce0fdc237110d644bcc8238f184554f25813ccf7142fd312ce96fbb6659081db677b04485bf66d52100136da6bb9688e48b1287455725c7b4950153aa2a4595
-
Filesize
715B
MD5008f6b65dc7706c89b18c530c547f96d
SHA17d74166addacbfb8703dc219c1ed6153b2413606
SHA2566a49a9c85cb8cfa613e48c53bc65027caad71ab43b049f388b2bb79b0b32ba5f
SHA51236bb80d61e408617f7c51e46be893a443f9cf896784fa2f054e45242330c77052a9fa7fcced1aa0ba0fca70df1c6289c3300d198e0f7ec2bf1aa6eee515c71ee
-
Filesize
269B
MD5a2db65618f88a69bd2468c1c4c8f49e4
SHA18f162dd5949a9b57c450be4e085e0c3dd867f13e
SHA25657f2a2493bc3bbf99a968c511c001921706d036f6a370ab68ea91e69d1db8a13
SHA51296eea82d79d1d6433e757997e5d62608ed49c41b9f81778b482e0c0931b69c8191dddeb0744d658404167824f09af2359f133fb14a3309642254f7eb5c125d36
-
Filesize
6KB
MD59404c52d6f311da02d65d4320bfebb59
SHA10b5b5c2e7c631894953d5828fec06bdf6adba55f
SHA256c9775e361392877d1d521d0450a5368ee92d37dc542bc5e514373c9d5003f317
SHA51222aa1acbcdcf56f571170d9c32fd0d025c50936387203a7827dbb925f352d2bc082a8a79db61c2d1f1795ad979e93367c80205d9141b73d806ae08fa089837c4
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
40B
MD5ebd1e0c475994371b3998462615f0d05
SHA114e355cb59a4e518018b776164c6d0217aca50e8
SHA2566982055c717bbdaed4aeec95fd9209e1f933093cf5419bc09194366ee80b0541
SHA5127aa0bc09e0f291418fe3b6683c2e6e83781a2d96af1d36fd47162a132cfb1fe0051135fe401c6f953c85948974aa79343fb88a0d40ed31be7c60249ae21a3a32
-
Filesize
44KB
MD5532a86d6d3f3e450c080dd5f5a2ce5a4
SHA1a4ff7cd95d0eb23fe2aa969c568a827de21e7c70
SHA256877dadb762ddf29554aa06854afcd6d9520843b509e33fbe5821d99460efaa6a
SHA5122e4985009aeff83498897924478fa14d39f5eaafe6cac7d833657172c1ca16068ab47016ed94e139a15155478aaecd13343b5f3822883fe230cda0a2ad365187
-
Filesize
264KB
MD5f8ec0e032b6f9cdb868e083bfec5d338
SHA1a2cf06702b4b60227675082dcba5b9e1ea0c9366
SHA2560612c9aaf3eeadb3e45484f166d5234c6162d273b51471bef517dbf061833662
SHA512246a2a4b58320614139ff0d74d32958e1c698bd6fec5a0c45304d7610360378e3d38df95da0bed2d51b2c89fded041020bd0fb60f8dc9656318a7075d4d9a8a5
-
Filesize
4.0MB
MD5bbb612a19aca1a7442ad6cc0cc378aaf
SHA1304bcb4009d3d8a50e7948f33398199ae741fde6
SHA2566288b08839c801ed7798ffb70af30ad7357100395ba8f4878c315df9d636d467
SHA512f9da13c461f606463f94aa9d33702f8d3f4910a7e32c35c72cc1c8681a67ed99eea674c4c6e774901c26421ac60d03d30feb0859cf502940c7a33e5505b53236
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
Filesize
20KB
MD5631c4ff7d6e4024e5bdf8eb9fc2a2bcb
SHA1c59d67b2bb027b438d05bd7c3ad9214393ef51c6
SHA25627ccc7fad443790d6f9dc6fbb217fc2bc6e12f6a88e010e76d58cc33e1e99c82
SHA51212517b3522fcc96cfafc031903de605609f91232a965d92473be5c1e7fc9ad4b1a46fa38c554e0613f0b1cfb02fd0a14122eaf77a0bbf3a06bd5868d31d0160e
-
Filesize
40KB
MD51bf839e1e24e1bddf9184e59326670d0
SHA1cdada869a40596a83ea5955442e9950f3fc549cc
SHA256e8d2d6de527ee5cdd21a3979c8785e22937289bff4415c9eda6d22106ea761a0
SHA5120ac5b5da243d4439a2b9c45521e08d72e926de072854d8b8119dbd7cc16dbfd08f5744c2163838b7ff8579ace112dcf2ab0fcfc7a49a526ae2c12d31ddce34ef
-
Filesize
205KB
MD5ea895abd6c456186dbb4f418e5927ebe
SHA17af2caa56b4ea7b1e122ab1d6d19d835c24b1114
SHA25607a7958b243470635959b896dd9cd26ae2aaea346b243ba5a5da7b3849ab90ad
SHA5120170bedc9d66df8f29b219ef8e22f8e63c0f44e6afbcecbdca809d57ba4e4abb04f9d44d16ebec6093b4c87d5d902d6ea111b7776ed93362f77cbd5f7f81100d
-
Filesize
195KB
MD516312a0a30ecab531c4591a2e5152e1d
SHA1028088557a3f5227d49cb1c6ca6bb2a7f9db7e0b
SHA2563246d08fe51ca791e385c7697e0f9e146e44b9ad003471c01585c232953322ca
SHA512c6ae751b938583fe8cd77f41db34f4fdf6c12abf004ad3c8cdd4eaebac0a839e0927cd60d2f35ed8440e82cdf5d576a731a0ae0c0343accbf2f73569c3972055
-
Filesize
85KB
MD5f70f392cf5c3499f5ac13271ccb5233f
SHA1c00c2c6eabec1158319128315dd80e18636651bd
SHA256d50aa6bf76bdacae214758d4cb0dc5a461c5eae7893043987a9fb14dcfd8f34c
SHA512cf90d320992e084aa85914a7ed5f47e07fd90ce6fe62ab2f250951218c64493fb30660db227ea4b96e5eab8c56951b707f28139cf47d8b6a8066963d70d51098
-
Filesize
100KB
MD5ca2572699bcf79ab4f22f9f2f34fae60
SHA1d2dc2b3328599d8d03d0b3252eafd928bb95e643
SHA256cfe2b9f8fdbbb735327093371712d384a30e9ee7d2e935a9a359c14390bac995
SHA5125e3bfbc0f930eedd46e8c39520d154974b340c8325ed716a1033eeb2e229e06a2476ea65826efc451346fd6da91392734c7f0a447a86226b6a36746dfb0a132e
-
Filesize
47KB
MD58e433c0592f77beb6dc527d7b90be120
SHA1d7402416753ae1bb4cbd4b10d33a0c10517838bd
SHA256f052ee44c3728dfd23aba8a4567150bc314d23903026fbb6ad089422c2df56af
SHA5125e90f48b923bb95aeb49691d03dade8825c119b2fa28977ea170c41548900f4e0165e2869f97c7a9380d7ff8ff331a1da855500e5f7b0dfd2b9abd77a386bbf3
-
Filesize
100KB
MD5f76517e0dd0167d247558e978b331399
SHA16034a5eac706f2757d11c7eafd81eacd70b195a8
SHA256f50e86df76937bc849e6696c6f46ce96a913f454851307b179242fd95305da7d
SHA512d09a9fabdbe6adce82b2e612ad6a7165db0a1dc3ca15a1c3aafce5cc2f8f67aa08a5c0745539941677f2f681a0a86c0670269d402750b662d4f6e544b5c71621
-
Filesize
43KB
MD55638526fb224ad0a4f724285780de90a
SHA108dd197445f17f985697554cb2a60047488e6f01
SHA2567ef26b78b23f2fc011d6c174f0b72a35448ba8bf99ac24a1fef89a9b358a2e34
SHA51219097aeebd31ffdb9c797ca88005316cfd9fb9b0a6279ed8ead782e8631761b5f5e7eb582182d9715309d8cf2f3869c942e3841fe8ee7fd383a8e0fc7cc6372d
-
Filesize
24KB
MD5ad2d84f24fa0db65a6eb402e88d3cf01
SHA1fe50ac6c19bf3b36dde827b10f46c71513dddae7
SHA256688c0bc13deb1d30fbc17d66729eb3cfa6982e2461f0e70be0e34acf1c44b18e
SHA512783a48be02eeeed1a2e94fc056eb8d139ccd9647900118d7cf8321efe499127b9dcee9c9b3476d1a4a86a6dbdfc3a24b36adc96a6f4e39d9f6536d232cf8c7bf
-
Filesize
303B
MD56b878cfc9204b32697a25cdde6941902
SHA1b2972077ac6f951e7655ac97f94b5c37d65beecd
SHA256f569b5ff4930d45226f8d61d1e9d92c2cf032a77b3f31f855b4c7f1526e23ea2
SHA512045c369e777d34443a8f029b4108343368c281c99130ab80f4dca634e162b070d97d47bbfd611bf4e79483426877eb3bdaa1d2c498712ca1624a0ff30ec1de52
-
Filesize
2KB
MD52968f106f29156c9368393214318d94d
SHA1959cc474035f359e00c1fb201c8b727e8e1022bd
SHA256cd0b3972685991bb881db7df10aacdb8f1b623e94cb7bfc45fd231372ef60be5
SHA5126eadde0a785f5f23386debe57a575ef6c560179b2fd14b2de9b6556ef7a7a7075c5dee14c1f8b7f42217af4b76f3db17160e0f127295fb9602c7578d73fc1dd8
-
Filesize
270B
MD5907503fc75ae9078a469c601aec16e69
SHA1621c4d9324660557f0cac801ec882eb14aaee2ac
SHA256311fecf249ff87096d6b025d7c799fdb75c222ca3ee65a07b89f64573bd7a473
SHA5122e8a4e70e50956d093da04abcd2dc53149bffb365724e83c1e0ced4a5d4ce17a4178682a4a29eadfb663f0a3a1cc0086fd72d459b5162154cf62b8c7c7b1868b
-
Filesize
248KB
MD54c71a6ca061b721ef790451529018691
SHA13ee04c6166dba6a1199eee635d33e16d287e1180
SHA2562f1fe9cda24d2b3193e955b12d42c54405c5ca4f6e81e21868b3985ca4f4e8ba
SHA512ed599ff8dfc9c842829ff41661458c44ae26f769e17e93556836cac4ddb600b317f04a5321e75fc0ed9123a115cb2478320c54499159bf0561d2bbd2b47bfb34
-
Filesize
272B
MD5befb12557c64a336c58663a81bae6d7a
SHA16deaaefabdc6a28ed099732506a76ff749fe043c
SHA256bdc6de2452ed4eeb233788a61706481659a4281c445201a8cea535a5ea34db72
SHA5126b3a27b90e0d95e8507cfa647fde4d0d93d962974b55d12d43850c8faaf9eebd42ae8bc5fc67102b5fb758097b7d28530f2dc2438e8de71bba24d6f1f8c4a3cf
-
Filesize
5KB
MD56e808fee1b01c63805ae6a3e3c65a508
SHA14e3797687b0bf9d319272b73dd29aa2836f57769
SHA2566457896784ef85cd70a4ab8c3b0b96134576e52630498bb19ef2c5430cc94584
SHA512b576d7301d70ddb2a53a51f50a4d715111ebb986f2f474a55f7bedb5e51f708722ddac66e7c76dfcacae92a2744531b4150fcea919e4a6287821e53cd3bd56c2
-
Filesize
4KB
MD5259f40599c3e25aa5a77c1fbde1a21bd
SHA1e318e38b2b6f4b90c18f4bdba017e38beb199203
SHA256a180fa46fb5d0046d79098fb63a23b79ca074e0eac6a7b279b252edaff81e1a3
SHA512bfbee6d6ab9a26ab5a314f516d05cdf59a4208b6774420fb4e9ccfab64913ffef0191c19bb935e720cce644e320ff97d8737cfa7b49d0f8ca5c235b6875d9d38
-
Filesize
363KB
MD5a2486ffc4df27e8c67d374477cfcfa5a
SHA1df9ea21ddd1536653e01543439053f6ba8227b55
SHA256991e98b426d3bb86d2644c16b3140de736c7291df24da075c5995f98383c74e2
SHA5120f6dfefc8cbac1e586c0644ae9049ada28e92ddc99afdf77aaaa6d773cdd3bfa2e7e91210eac10edebb2e691ced98db3f20857145a23c187f01fae272bdeaa5a
-
Filesize
35KB
MD5bb894407f90d9e60049544cad9dbd061
SHA1ae576d1740ff73dbea5d3ad68de3bea3a6c99318
SHA256b537a53d1f6476ea4de40375fc1712c630587e686bb9b7f3ef2755b1a2a5eccd
SHA512fdcacd66a21e044f3e4324ee77737c8c5901a5e2caff2b26d249ec49ce51e9ffabebedb168688faf6007206870228e11b6f1373054355aa9dd5d47675676119b
-
Filesize
283B
MD503973c224dbc87a26a9b4a2b22dfd7f9
SHA1ab6a84d97ceb45ff1a29dba924a8f1d954f93a6e
SHA256f5c3f25d90a01ce0811f0bd1b5da69890673dff28609dec6952c1b3914d0183b
SHA5128c1c618074f5497b47b09105c0cfcf5918d3718a5b37d10402dc6f4b015fec2b022b90c2065b986fd3ca7b96bbd97ed136970609fb22d0bca1dd14d8f33cb207
-
Filesize
780KB
MD5ede04107205620e1b87bfe170843b98c
SHA110c8ea95c9a2431d7a8d13fefb274c1b681e9096
SHA256b4b79d13e2340a0b652e067ba13b40bb2777e6826302bd40ced106289bbaf116
SHA5121dec694e3d0c3e5c11c25913531d9d8ac8add21c001cbf35de474ccbfe3fb7dd018f36b57f108fb2af37ee909dec92160168dd783b00b018aa39ca52d345b525
-
Filesize
302B
MD58f0d839cc1f8a074bd6ddacaa2067889
SHA14b3d07e9fc18bdd85181f60a932707616462eace
SHA25678fd0ce49ec4e9ad1700bbc269a4e566678fa7a61188a2c07fcf5e662cce359d
SHA51247aa47b01e054827a42526c3b45911bb0af680aa79d19e8df9b0e25ce1031457954d9002b54599485d686038147cbaadf0c4dcc9a0e119bf3e0656b1dbb51772
-
Filesize
6KB
MD5dffc1f574f39324d34907f6bd3620c1d
SHA18f43a73bc22e7e4aca490d343132524ad5734bdc
SHA256c370860c1929b82f94cd757dafeb4c2aa5f518c20e0abf34d9b9ea901e01be02
SHA512e686db9ef09ee4d795c74929a35a9ca45cb2faad875a416a455f748304592c1bac92eaea2895c8357a7bfdffc2ba4f530f11a34661adef6e7efc3d94fcd034db
-
Filesize
698KB
MD57ec61797e15c0d1ec6cdda301fb0b4b9
SHA15e27f85277b48378df4b5cbcdb0405bea1b8a496
SHA25658f6494566fee7a35bb5ea99a097485a3641f7923cf6c356917b2f35ae2b76fc
SHA512d63df45c4960f6de38a00d3e3bf13a734fa071d6df34225270a505b9f519da5f1698c699e025bc94e5308e3080a6724fdd5a240f68985ff76326adf84cb51366
-
Filesize
2KB
MD58d3f959df51e15c8b59b7b26fea399ea
SHA149d692e9901c395f598fd9b75c3c189102b8386d
SHA256937713bf75d19d453c2501501418bb7f92dcdf18e1fb5e356a2e82974c462fe4
SHA512708f584a88efa11e3ad8bbde1c57444fd25bb1c96494b2025629f3d5df179871b8a441a92d8ac41db232350c298f43ac8605b6b937cee57911c3fa6cdb4bc781
-
Filesize
54KB
MD5a6448740df224b1cf6473e49e586400a
SHA15b6f0c0f2a50a0066fdb2b9b33ac73cfce5f1eff
SHA256cb37ec7b901e505345bfcc4c92622a1e655dfb1a6bb2f5de906278edf0ddd579
SHA512ca2afa81699c81a4742590e3dd0b59816dde7c6a8bd3505ee962a87e30342a7e1afe817c51b2cba673fbfc3b86864e912d7c3050c247582175015a39a50ac77a
-
Filesize
5KB
MD5d7e242e6a984715c30a1c85081c2c670
SHA1992388f25fba865e45d90292935751f2be9c5d64
SHA25692afbd6c8529217bf40601d3ba32c42df36a3b2a62564c75ba415674e9594a43
SHA5120028b813dcda2226b0289f73429e9700c37d494f5d610329a82992c2f3e87aaa13587f2750d5087128d3b842aafa6a806a09afd5ab6571c3057af9b48db1842c
-
Filesize
266B
MD5664438ae38fda0766e1bebaec4f4d771
SHA147605f8d7074a09081659f8a5f68a27980a0ad5d
SHA256a5595da6ba8cc54bb383c62906559c119664ad16957ede575efdfbacd4336b2e
SHA5122f5c86bff28be3d47ccf1504d530f38d9cff714dc8aa71befbb43284fb20391b458ff578c076e13555616959f88f76fa30dca74cba317df3529cffcdd8f20504
-
Filesize
216B
MD5c087c1f16efbb2c0358eac568796db08
SHA1727bc2075c9708c3124adccfe95d6e457f064806
SHA2564a07f582618c11212f10839408e003ce1b2388af4e64fd544602a65509ebcbb0
SHA5120df439fe2236bd1221a8162916dee51d75c8b98d4a999c3b3ef6473b519434921cfbe650e817ef0c9a9c15b75f284bc9bedce34a6a779e49eda5db504c846bf9
-
Filesize
216B
MD5cc2a29d18375d3b6b4635dfa9478dc56
SHA1b75eac597453afddf45057eae3485897397aa1db
SHA256b1d0edd326eeba2de648df8ee49d56b717fd447c2ea6b645bb467443e85ea128
SHA512b978a468901d44028bca8bc0b383d96df037cbf85c07ef177109d7a11b66f7aa98b6139f065f41dde8e22a17b1f40e462a4b32a51946901fabde9acbc3bb3255
-
Filesize
1KB
MD5d388790a19bdf16e3408ffa62b65d67e
SHA150d10eb51def63a482bff1dfa4312e5ffc5d83e9
SHA25618cc92089e104c8c33e6c54b96a88e13fac75a816d3f63840c3927853e769a8f
SHA512aff5cea7aa53ed009f6dc56bbc903225ad5acdf2079b57b03864236f7999d060df13956704af425bed15876ca3890b09a70716e40030494cc87e061eb0c41d7d
-
Filesize
216B
MD531f419dd5588f779e53cde2d7bfbea6d
SHA19fd5322c486767e32055a5966b9c5398223b4116
SHA2568a7112508a06f798a6e2ba651a2173604a1e85bb5ef1b8b04f4ecefc054d155f
SHA5123df0bae2364bea17250a0a030b12a7692a217f86c29a9a6207fe4286fdcbc700bdfed7fea55439479c21d61b4119aeeb8c47a86d67651b6d4da0cfa3bf62750b
-
Filesize
317B
MD5cf2fe4779495526bf000afe8d11efe5e
SHA141e113c5a50dadf5d31193aa5cb9002961568244
SHA25629ce835007c8223845cdda7ab45675dbf901aefc0ea8641b51bfce2fed815157
SHA51235f694b5dc211d1efb3aa849d093bd82cc71ba4549a587277ac19cfd8792e8856fb81076784a4b7f2fff9ab99d2255dca16301dfd012d3c34ec359c73d4cfde7
-
Filesize
327B
MD5a81198cde707cdbbf94152248edec090
SHA104befff388c794f0060f504c71ec6643f5098fba
SHA2561e64883538e8bf1fb4d0eba878bf4b56131810bdd823ae92b9eaaebb6365c610
SHA512fb52abf2f81297ec9fd9853bfd6431902fd72c795c409b2fefe350e9d2121115b9df084e5311b8baa04ead4069b3acf35f43951df98c6af6409f5a8bea119777
-
Filesize
160KB
MD5c20fbdc95e9f829a06d56feb07c7435e
SHA19a73735fce1e7d5f50aca77b6ce686d31b0fe1fd
SHA256bfbdf5e1666ab0d13ffa5f3a4844e41c682a14c8ce9240cc78c14ed1355326fb
SHA512b4f9c01685df9908d8a0d18dba90868f65bca56a080b89c10a48da462850887de8f1e2a6d006f0068f7ea89c5cceeaab6175f93527d10e7c0c8d3f57db5ed358
-
Filesize
56KB
MD5ffc79ad283431de6509b59a5bc4e7df8
SHA17284868d6c42f22383f8354a38f80c053691c70b
SHA256fd5b99061e7e8db543d2705247f1369f778c7532af636d1a95f6015e05656dfe
SHA512d0ea8b36f496593d74d29c77ddc9564c09742c81ec05213ab9e862687dea10ce952ffeec87423e2ebfbcefb500ee048c2d64d729c0d0f42c4ec4e9f7990a528c
-
Filesize
329B
MD597944e34d6249b4284588149b230125b
SHA1167c5ffca7d734d9add5ad685226519939210166
SHA2563f60c5065c70baf0b75f824704bb67dd7d5b8cfcf4d508e978dce0ff7e554534
SHA5127d77c546485c9c3cce005c3db1734859ee925d6addf8e56adfa04460debb5f0102ded8561a344dbcbeb8990d30e9dbc6f3f833be188d5e918b32b0cac835c60b
-
Filesize
20KB
MD5a57cdd0fa18f2f906e72c772670a71a5
SHA158c27106e6806b5489de27c961cc1ad427731187
SHA256ee50e6aba448bb2d471d59a8777dc73369a9f553ffc8b314e7fda018d2656721
SHA512fd1ad29cbac9a6ebf6b79402ecbf9af6c030a915a715accc028f5a387f6fdc2180973d721753ff975e6afdf2e99f834b8271514370382ad2bfb85fe497ceb1db
-
Filesize
2KB
MD59c6852f8a00065ce816c69dfd61ddce4
SHA1c8df1d7c75ba697d239950f32ade383ece260de9
SHA256e3c0dd1af089c3770eb167d0c208e846e4bdcca8b7bfd8beaffc78664930d134
SHA5127deaa887e0e9ea3d7409b42e640e1f5d2e9b7bb9e09e1489765f481c3af2afad0a1061e83b46e501a1d838544cbaf20d5cb2eb3a6a3bd4b1b95fd76ffc384aa6
-
Filesize
12KB
MD5dfcfd63b67186ce87f862c69eb1f7290
SHA10fa7716082a03dcb5bab4946cdedcb9b62f38e7b
SHA25635ac7e8b16d6a15089359cc6a53e225a1c077e65024958bb636bc99a7e96206c
SHA5129073c608144c04dfe4def483bbfdbd38b46fed0e167979fe56062866c413b9dad09328af5a95b6c95ababbbb15a5af401297e58fee7fbff86c7cdf20e56489bb
-
Filesize
2KB
MD515edc71013f52522c9bee16b930dfc0d
SHA159e89aa2a7394f71e7c87a527867f1e5c9430dc0
SHA25672955f760bfe6c1ba1a7356f17aa16e243c199360b05f8100f6df9c3ad1549cd
SHA5129819cd00fdc5dc77352211bc426e55ab6dc8edba8b6c55a9a1fc538a209a4cec2005eb15ee3ef153dd417532ecefef533f906912904cdc775a1aeaa10ea2f014
-
Filesize
10KB
MD5d7594a13076a62c4125c8010e965cf94
SHA1f05a15f1424d6d602d8921b22551e0f7a475d01a
SHA25646f68edb7694bc352e8f684da2b6c5259a60d3afd8914d795969a9239ce9c77c
SHA51246cfb853be941262032127f9f0fac0558c72d131946c21fa8ac2f256d3dabf6d67ffdc024eb0eede1ec7a7445af6cb641bdcdc91174a72dffacdfba347836958
-
Filesize
1KB
MD59edf40e4d8aad92d43a66540106ddaed
SHA181fe5af12b6caacf67a1f1ca3ab6b22e38986087
SHA256b38b2406298c05eba5829ff25a416409bf56f5d1a034422e00d129de7699ae9f
SHA512694a94e447e3355d1767ab02913677e6ceb52eababc032dc535a29ce1a4a1eb93965679284bf14bf2a87c063e08c57cf214ef5d03219d262ab08a22ed9e7b7c6
-
Filesize
36KB
MD5cd235a0e035214b08a83f9bca0139cd8
SHA11adf2ccf9d62c78239d1dac4f76a74be695332ae
SHA2569e1d560970e586ab534fda9213d2dfd722cb6f21ef57ffd94886196f9e8dca06
SHA512a517eec73265f9369e984a661aa4ca5e75ca3826c016067cf9e83c0a214e0d9a673f65d0cb978522a5a7f89bd45f82b8c9feec0e6b1b638cab8518c13117b3e8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5d17c398e63bb4611176399f6f801ad68
SHA1aa0d476263389d9ff091905c59411a6f78fd4da3
SHA25634a388475b8a5e096e8d39272c623b19680846da98f4db9bb962e17854dc7916
SHA5127717e5b6f0c29eec0484e4629c96e09709ecbd0c82ef2c0405d7203075d8ecf2ef3ef28cbb4f7bf082eaf6d19497364456365724b03faeb2c05e326b3bbfa18a
-
Filesize
1KB
MD528b07db8103405bebf9615bbb6616122
SHA1e84c45a0894a0ac1fcd58894e08a1c1a6ad372e0
SHA256d5816f0a32238a96721889b6a34985aa787e8be1e6734f1176973f26c0ddad92
SHA5120caccfcbf0d95ab47d50c83dd5dde838f4d4b059b2e8db6c53beed194f35669cc115812eb4ebd5fb1e41b740e7d9a1baa0c93b7ab58f46c2853ecebebefa1df0
-
Filesize
1KB
MD5ca7b9afe21f4e0b53509461a867cfd01
SHA184b92408e41dc57c205a4033d088ae753228f1b2
SHA256de783d8b9598ce1e247246c5cfe5628cfeb69027c48c735b1c9e9f8550461d51
SHA5124414fb072de43652e02b75f814c25bab670b6543acd651636db236e008604e7b4ffa24bf363e6d96666d264ef56763d826e9127855b6d13ddce4447f712ac129
-
Filesize
1KB
MD5e8071c971a014e1ca45b988f8af38bab
SHA1f2a09effaea323e02da2155c2b7248105a35d151
SHA2562692bc798dce6aafb2f890f472345c049e60c87c8eeb57329fcf2234f6b24c32
SHA5129227844a6b4cf58aa3c8b91b5ef313d161bd65b768398cc55ec7a6df3847d31422fd2a2a77d4d3d4a604ecb37a0cb78bd6f6885f4a66901d5641b7a9651ba685
-
Filesize
524B
MD5fae22c3bdb360b6a5e0753543ceb2ab7
SHA1eaf45b064b08fb4e576c57575127d204dcbb58b4
SHA256ec06cabd47fa8a5d9581ba636d32d8d95d00a885163519e547b5f176960ed33c
SHA512140609855acb53c4e4e5fcb22104d08be7f66310089ca914a23205e17a805efb6861a46d5eeac6a046ee162fae7dc1d4a15d91633a50bd267ddd9b8fc00b3903
-
Filesize
1KB
MD5b61e4302dded49816f701b824b6e7890
SHA11b5efcd580f455a59b7ad4c5ebf7a52f0da6e086
SHA2569e4e3a105bef486b86b7c3696a44c08ddc42a57c19b961ab7072252f3ada67ae
SHA5121d1164ea314027d0a08478f789f29f6c1759f66a51cb51878770ee4729a19790658fbed1dde8856553d3ab9a78915cd3dc297887d232084a2634df74458e57fe
-
Filesize
11KB
MD541727eabe7dd54fb46450c842e1be329
SHA15086a7fda090a2532ea388b4b8bf124ac68811aa
SHA2569ba45eb6683dbcb34177781a5cc0c94de208f50a8664569a6de6149e6bb5c1c1
SHA5124fc0f5e4df2315d37c87d0a1fa19fe84f07c5288189ee56944511af1804dfefa44c9f8715fee1164642c13fc0ac2b69515d4e2f4297d14e630e410a94c3dbf5a
-
Filesize
9KB
MD5963218950019f5bc5a1e0fcd66e5a4c1
SHA19a15b9d606c6e4097db0375b94d5cae9a03fbcd0
SHA25682dac812831a2ab0401c87344b14e53c2968634fd9aa988084f6fbf00b2e378e
SHA5128288b75d085037a3075485e0c0d2b5f0a5039cd8f587e485671986a1e8e262c51421ccf2ad28fa0fc38e845d522f76f573761aa2eb679183a1ecfc64afc94baf
-
Filesize
11KB
MD572ab244cee8474e3cce9a8a6ec326377
SHA13be58db198da110b8ad83e21005f4303fe0ba425
SHA2569a6be24cff08fd3b7f2df6848bde24719e0f963483d92182c091a421d5cbc71e
SHA5120f904fdad807c199545c2555318dfa6a264cea98b61262b9a80287817586741a6e4be4a7ac3f035a3a051f025a544e729f0fd369f4d286bf5f69f20f6fb1f39c
-
Filesize
11KB
MD5c26056203676038884f67c87a652c8c8
SHA1231378c09bd4f17e108bd8cc4bef4bdc1f4ec02a
SHA25618753c5d570b7c467427f3591490cc40e719954ff29dc4c61529183ce7e75bb0
SHA5122fba701b2415513f3a9eac76d79c0ed2a9ae8a32b4bea98b5e9a2251b30246f90b005faa5a87d215b7410d3424e737ab8db8d028f8153e95ff8df23dd33c86e5
-
Filesize
8KB
MD5af721933b71534b2dba4474fc874460a
SHA1862c8f735d4071a4114d545ed9e83bd2d61b57f4
SHA256d337a486fd56fd149c894a1277fbddc255cd338ebdf2cf362dc6547a9420c9b7
SHA512e74a94e1e4f8504fea16bead6e0548ac464b17fe74edf0c14f8cdab63094183587264c88cec1d28d91d97da619ccb3c64d41967eca3e5557e858e156a5e5b43b
-
Filesize
11KB
MD5411e7670c012c8d60d3752d204a163de
SHA180ff4953cbe4623008c1fbb8c33694a130973d5f
SHA2564cb34ad81a4f343b059564a0c418b16d4c64b3ba13bb6a0d0a9949aee4fac4f9
SHA51264a7c87250f177ff431a23d93550f25ff667b6f7e7dbbf68636ec75e0227959b9101213675757fa9ec0a99ea8f1824917919b9f775ce6e7b160a65e5e14151d6
-
Filesize
11KB
MD57ddd5f315f3242c8ec8b19dbaa2b2c99
SHA1db7983e9ed76c4c2f43c661609f7e00951d0254e
SHA2568d09e31f18bcc2f99ec1c51aef65e93fce36e13abd6dedac3d0c76a0c6248585
SHA51280917e9fdee0ce2fdf32ca73ba45247bcdbc0af776fc9df9e86381854b58519f1ab3e694d5541ac576d27272664fe0a658635c742dddc5d4b74d13fafadad7c5
-
Filesize
11KB
MD512518bb8dc9fe63cd0222b42489ce3d4
SHA15672bdea04c491e58728f17353b5d908a7a8469f
SHA25696ac8467ea871199521e4a08d008998e8fe0500b3c0af44b8001f86454093fa1
SHA512e680b096ff821c6dfbbb407aa8d0de4a9217a74eb8f5c19e0074cef7d6395a1cb77f705ef45097c52098fbed139dcb508a31becde3a13e7de6ba26bd9cc1da12
-
Filesize
9KB
MD51f5334e8cb719a70931d487595d233a8
SHA1220cdf63bf172e7499316a1a9967c224b6ced34c
SHA2564312723cd7a5efbe92e771f79f9efcf5fee64ec39c1870db66d1731ba218349a
SHA512f9d58f3c6406e3e0402657b231e6bddb90456e67f97263af31aa8aabebdbec82a33ce9e9dfb6ca580bdf193f4d2ced00a85a60a7f778eb11b45d6dddf6fc3759
-
Filesize
9KB
MD5a1af3f7d7dc00bb6bc7eb4e14ee5d179
SHA1751aecdbc748b53f4a97462fef4fef5e4d1eb40f
SHA25602817e76a18d2c2e650b8f95efa146a4b35a47313ba35a039d48568ad4fe9e36
SHA512cc1a2ad9f9cb9682c26fc88b1964ad65856e393e1182ea5b81f86180c62885dcef1031c6710c83a437f79bf4746d2a37c1e29ba32acd23af01bdd98c4307cd79
-
Filesize
9KB
MD5063c5691d867db77a0bbe4dc5cb6d236
SHA101788f11a3f10777b28ed8ba379b253a802e9bcc
SHA256dd33d7bf5cfcdc06b1c38804ba0831838b38c588c2d1223a23733d3eabf21970
SHA512b1f3916e7d9d498b6a2abcdb820b5667a0ed1b5580f6a3be02915e50021be09e8bf99af10bbfb7dcb2d29503f57c42345756a403310e0c1ce9e456a7698c9e2f
-
Filesize
9KB
MD5d9040cec5442c7b609bfbfb0af4b8b01
SHA11c3df9f790e931e0cc8b4519df1f473cbfbfcbea
SHA256b77ed06e829399e9af22b2a6912ca8a7c9cdf80ea66fb975450acd0c067d11ce
SHA512480416ef1209f2436a2d3f2636ea42bb250abb060fd9d1f82019a88b38a5303b2fa977b121fedfcbca9526d579148375ee211bf21396510ea62a553c58278d67
-
Filesize
10KB
MD53dd377e90fd8e4001aa79089177e4698
SHA1deeab3447ea6b0ca221645c47bb8d3006c21c3d0
SHA2566b577bec87e626e6ba6a2d607c8755233871156d88efa6573d140ba29354a56a
SHA512cee88f11b67615f2f347a9ab4060e8d9d262d2e01263294ae69c5a563fd08cc3d165d9aadef1aec46b7156b51906fe597bf76b0c94c6035eb355e328b1e958c8
-
Filesize
10KB
MD541e3fefd7f9cfaa81976b1bbec680e1a
SHA10125c796bf9d67d5f7da55beff30bd7fe9a7e160
SHA2564d3f3d77cee32d462fe9807f8a654e3a57849466b97fda9c9a7d8f72cf26f0da
SHA5126b7fcff0bfb8dc54cb8e8550ab26745b0edba46cf1a0e303a712a3c4122e9ce583cab54aad1b449fac41eb3ddee2ee49cbe91c8da8346801e9f53fe3d2dfc011
-
Filesize
11KB
MD5a0c82b7bb4d775da74b0e96e8d44d85a
SHA1de9263b527a3df70861d052fb9d7fa9027fac8d7
SHA256b0b670e49ba51086e1814f478b7ed1b8670676685386f410a500c83c77f26265
SHA51268d6f31cc4679a2eb76a4a397d51f2c53f02cf0ccb542ced86546ca0d8c724243638584a1ebb13bddfc0d536e30a914d1c3f5379c47a351a5c2009f136b183b5
-
Filesize
11KB
MD584c6fcf8fbd96b50b9f9e9e2550d551e
SHA1a2b092df32da90394df5c464d9b6bd2897fb1ad7
SHA256c06763e9c30f481f4df2bee7a46119dd620ea4c28324213f1e9038189ff7eded
SHA5126141f7ab4e0aa362cc315d41f35cf029c9ae0c9094659319143e3680daedfad766c1c83b24f9b3f17fe8d76dbc6429b49754dc57fcc1da7c39beda22e405b108
-
Filesize
11KB
MD5150d6640d8fadcf410287cb4b27eaa00
SHA1d08d3e56a1021909909eb34ff365d4bef353dcdb
SHA25667b08e52c17cbaaafb941109d476b6e55493d744751dced06e4b3076ec1e3c32
SHA512c44786467ebc92f5cd4573b287bb3bcfe57687ca8f07f9a1a4186ef72e7c7070b4e82899852211c24df7580bfa61cb5f7e28a66211fa75257c22304a98e9bd52
-
Filesize
11KB
MD560bd03978cdbeab1f553dda584fc23d9
SHA11a263add32e133ad9c178cb0332b1102dc441df1
SHA2564d2b7c6bbbcc61b599c9d2906d12934b25d59743c3fce2ba1be532f4a0f4f940
SHA512c53bf3f562240d275f786c7606ea9d719fc3ec35b8b220322398a898b9b4bd74a8cffb895d05a62618ce9693f61c45c71c432f7de386198c948032070ba8c3dd
-
Filesize
11KB
MD52ae51bdcacb5eaa17fd45c0bc15d901e
SHA1aa3218dd338237a0a53608911d0a78e9d354a7c7
SHA25613377198daf24c55ef6f7a5724f4daf320028b69a3db383e19ade19b88ce75f0
SHA5127712b56ec0c1cfa64242c11e1357c2df8b79f4660bd80f68d0aa725e19ec61690f687c17d37076ef0b3131473e5dc1d3a6318fc54954ffe5fa35aa456714f3c7
-
Filesize
11KB
MD591b15b43c4c9eb17a79c75952a8da329
SHA1398b92ac2d1e9ffa3bf34f5f80e512be7a36f332
SHA2567709d7061195c6fc47043041879cddc87ec3034201e53c4276761a3646ed5207
SHA5120c9ae2bfe9105895a52038aa4ebeaf432370407d14b07175e07de003691cc20bbad4382c0adec5ec6e57832640d85d1b724b3468c1a4e028eaed28a4aa234d46
-
Filesize
11KB
MD53c2e3a04f4303cc95126a0455ee0788f
SHA1b22dbf149271e182aa76b65207e7e9d1e0fa4316
SHA2567cbe908aabc59db107d57f4b79fdf4a6ab0dfa1960710b0ae02878d4666de78f
SHA51220b6717ca963a5dc3c81a44e7025a6afa5ebcc10400b4ca05d0329992e29c896af36a8d19067b8a70ded4e2242c6e9f09c53e8eb9d74f68add8ccbdb0b4aec0c
-
Filesize
11KB
MD559716fd76b31bd45efd1db59666e27e9
SHA1ddf0d4ce3e0fed07d0fcb373d5a4c071cfc88ae3
SHA2568c6adda4943befd69b3d56ff72b3d7a1f4bf008925845fc36cf3ba63367510a7
SHA512c8b23d25e5bc594c0a169ada8c7d96263b5e03fa050eae16660c53d9a3c16a0c554ca5bab1cfc3a5a7d27955404637d33d8a5daf524531784032c9f7680cbc9f
-
Filesize
11KB
MD583067c83a88599df64e17a9c799a3c70
SHA1c798cad4758f0cd1478e25eb81b057432d9eb11c
SHA256fdd92afb516ddbec871e429573aeefebb298349501c57a44ab8d8afb22f55894
SHA512aa5124319d3bdb48b523a900f05edd9b230cc75089e31643d6568d7e9c3b622aa8221ecee006343e0424f56ceb12594b60184030b53ff9687bd2e7fc7db3d7d1
-
Filesize
9KB
MD5b5c7b9bdf55e8fb0900cba5aed3123ca
SHA12de2aeba18ff7dca83724248031936349486b444
SHA25660e213606af35e8965e5cace0baea349cadc6645b1e2034b5b1fbb06162a68af
SHA5123eac132ac8fc190098ce423c3aa4b8506d24b6e3c11e88a632e8595a8981da69da938326d0a5b1eaac7ca2d50ebcb85ddbe777fb0524efb198f4a108eed31fd7
-
Filesize
9KB
MD5d5eb7e1c1195a5cc13c2d4aed0b7c2d4
SHA10a1bc1c16887bbf481956beac3607165e97c08fa
SHA25616272b350dfc10ad26321081a7e8c41225633283ba060ecd0987f789108cecb2
SHA512068366d8716810aa16ff09f8b33c69bf8fb30e4120da6a6dd932b586ce84694828517c789c41f1517dea673d16572230fd0f01a91dc585b53fe6dbde37f835f5
-
Filesize
11KB
MD5b95da4cac98ad79713b0de29247f1bbf
SHA144d50e7bbed6edbf0d3d8f514f1bdc8be2e0de63
SHA256b115164aa2444d8ca03c6ba375dd455c2fc24004a5410e724bca84fcb8088d91
SHA5121452ec22469ff03adff99e6e4ccec16f16bbf569f642b833afbed213c15f00a4707bc196c945f41040f8be9b01241ed4229c36a75e3297a935c67957f2cbf8b6
-
Filesize
11KB
MD513b374259d74cbeabeb70b0e32af93ca
SHA1b93ea8ef516591fa796b05c3888faf6823af101c
SHA256ed9af4a31653f3911bde61602edb9127d93bfa7539eb56be5c4400f59b378c07
SHA5121209247f88f9fdbbebb2755319f44bef6680e178fe0329437f8b08c6f6d62e3a92b5b8bf5860763e06d6e80159ef043f167351dfbc526cc83204e3f656495fda
-
Filesize
11KB
MD57d9def84547fae2d44851a39b4e3b686
SHA1d95a43adc0d68bb78ada5d0c8b20210bc988db82
SHA25668d6b82ea12957530fc68f846912afa05041536f81f3a85e5b04f1ae235c346b
SHA5129d7931c6c9933ce3a1006ddb2227f30f99c0768946bf4bb239f21edddbd58ec6b5d25a24bad6d175f2653165f9a2184720be0c6372fab397487bd10396d46ee8
-
Filesize
11KB
MD5873deb39cc7b8e1a50d5863e752f2aa8
SHA1306eb00551bdc4c77d97faedee3c756a9efda966
SHA25637b594d7dbb016a0d80a777c26ff6c27b7b3e6e73637a820a5dcb90a28b406c3
SHA512d705a91752bf7dd050074dae1644f30055d43e869f013964a006ae7e8719778aec760b6bc04065477042e97259c992fb486d1f46d61e0bc8b5de1ae754220687
-
Filesize
11KB
MD58ddadb78628e0c335768c0dac3af43bc
SHA1b8bf27e88d7ea1816e36fa7928687d087b3756b2
SHA256e204568c43f1e6c6fbcfb05ebcafdb1e14dc6619c1c7e9ad9f9298ea4a19ec05
SHA512dbcf4193775cad70d1cebbbf0aa7a893acf319a1e6bc3f95b9be5dd1f0d7ed4ef3de5b22466e9162ebd8e368c3977828aa93289573f0fea16064f32f7f9e7734
-
Filesize
11KB
MD59ea590519b35cb0bad4ee41eafe1b7ec
SHA15391621a5c3455f63b6c0b30fdd868e980fcf804
SHA256a7d4baa8f2f81a600afe8e1cdd28303ff0a8ce500840c65285cd0d2368d581c1
SHA51298e17d0a1be8eba30a4859daed4b4a311171f675e9ecf884cdc20b41164f0a6231764d597dd5c489ca5f8aae6fd4f5ad8ac0994af63279cfc633a0b5ebd75708
-
Filesize
11KB
MD59ab313c7a9668e59a800517e9b34a193
SHA19e91ad63d36708e687ac965ded55d4e78c4a5f08
SHA2563eb29bbf6e01cca868c652596b2fce6f5cd74e84229cdf932c3660bb8a04dd53
SHA512107ffadf973f27806bb7048b5eb29e180e305d5070f567d728bfdca79d1bc100d8e57f293e006bf124483b7ac310862e64a38e42906209c3352773d53203cee4
-
Filesize
11KB
MD59e23f56a2da75be500693286aa6b9195
SHA17a0cefbfd76359b08aec42d2f97b77eca886d48f
SHA2563d39316c45200e09a602e7edc495b99b17558e10d054aff1465ba66b4c869071
SHA51263f6e6d5e958832c041f706ab2ab747b8ff889506d4119693a305ca32ff4aad89d52dc3314c29c1df65246031e6ea398e529622a85deb9433dea7a5898ba9e38
-
Filesize
11KB
MD5685329805a0cbce5624af240560761a4
SHA18a44d18494b143aa7649da77208dda1dcac7885e
SHA25665f5a5076b9cb26a1c1b61f58c3f79d43d11314b07bc3d2ac94aad2909717cab
SHA5124a25d38e228b3f2636e7bea937b89d9210522256ddce49f10573943537ea1571ab362e7ba7b274c395e959ac037d84d4d07078ed5b0598820806cbd51ca82eb4
-
Filesize
11KB
MD53974bca93e17e6b1c4b4d2de9d961df0
SHA15453fb2acc11e1b466f1a6fae09018e23c658385
SHA2569e55f18e6ce1ebbd9a5bbcaa1679025d1d1b6d57ce47d5bb74143c5d61b19219
SHA512eee59ea3a0619a8b8533ab6ab7a2a6f526b200a08cfd6984e83acd2f17aa63f7732540f15a9676f3b81c073072203e6af12a0f2a4e217d47f0185bbc12ff88b2
-
Filesize
11KB
MD5e736f4cdce68a290b411d195fc56e042
SHA14dc8a4a2d5f57f3d11dc2fac75d63e0095e60aa6
SHA25650855ad7aede0c3fc5be46382e94db12341157e508ef0ee10abf2fd757d71f5b
SHA512232a38b84c1cd8b6488e75a1e7b57c6a1aeed8aeb05be6f266f0291d20e962b1141483cbeb3ed417332fc2f8dbd9211c12367d2b9852b92ef3982a37cb0732e1
-
Filesize
10KB
MD50dd8d5446377607792a758f61c44d323
SHA1b3ab5e1c964740c964c306e50d0c53fc0b496863
SHA256a89ca776a5f3662efe4daa9f4c41b8417021576e5ccdc88d9edeb0b2d1bd4e61
SHA51286c82f7c7fb088efd0cc332b2d7d5dc9079b55bac3175e13d92bf4a2c9fced9cae1ec0ec2d04f313762185607f90900b62b63a6503814de8afcc371c815fa1c9
-
Filesize
11KB
MD5b27030c10a4e68f906ec7434923cd6d8
SHA15d88183af41d28f9b5ff0b93638ea5988a4053f2
SHA256921f978314ed8504a685d449bf2d040ecd186d2c0fbc0d2a73e542ca56b55379
SHA512ac446f7a4e33367d73b6c34586a5adb3c340e87e184b115493fa73dfc00acb783ca38394788667e51159323d8da55450e2d7e71fc3fc71c6f44505fde0bd4921
-
Filesize
11KB
MD559f4fae0d5f2eadfcf848672a2446ab1
SHA13450829d43c46b223920b012988fa2e711760f1e
SHA2569ed21d88f672406858761911293adeffe8a9a7e24bbd9376827831c51c28463a
SHA512a6da430630c4cf55081fca6b5f08456774f242d5371756949ea4b0c20138a8c4e3c8403acf0fea797fc6e4646b2d85a1ea01c47238a39de7a1006f4ac07b1930
-
Filesize
11KB
MD5857dc4db7bba1e9f5cd980950d48f582
SHA145ce68c14ec6110ade47b85feef3b28a69aa394a
SHA256d66e1f7a51073a758921801287d5ecd76b39d14e85628e4225323246b74eec43
SHA5123cea8cc1bb6f39ab7c3292973b3d96c3a5c3268b12bbc3801b6f24c3cf1a2618930531a65323aaa31bfc55f1adcd9b254b7c7f8bb57ff66ea78707ba4bea296e
-
Filesize
9KB
MD517d42fb8d38f2d751d0e4dd750c26540
SHA11c63417857a7496f1d1ba0a60f69020d77fe253d
SHA25682673123bead321099d87c4dc19412f4f99918c541b96c5f6225b651b0ea3c90
SHA5125b048137ec34edda690522a9bb88e540dfd80050d8b31ae1e20e06c76de76d284dc42bd5bf05a7b05de4e2b9e90a57f2512d3d9b5491db7bede67fc9cd7cbff4
-
Filesize
11KB
MD533c2a0c81d093774b822e70be4c9f1fe
SHA149c42d1faa3ac1e039aa2af945f50cd5fedab4fb
SHA2569285984ad5c8aa84fe98760b7ab20704a31228be89d7fbed5fd8afeecbd8987f
SHA512b3045c3f8cf80b5e7b3018cf3ed9d61df6b3b0ba0a11cc6fe0e6c1b322217c0d65860da4e42bfd9c9be3cd8fbf21d454fbd442873af3ac6a0b122d641a5fda37
-
Filesize
8KB
MD5a8e15aef33f4a43831c5a6f956903368
SHA1c7df32a9f34441c2b115a85ee617f50e9164bc61
SHA256ef0f33944f87ce69c6df1ddb83482005a415d4df8e3adb5633db745001f11a78
SHA5127a3ca44493c26a8f696e07ccf9231a0a788ccc18fb187d490a21c8aa1eed4b9797b463b87143663016d743fa11a8e676b55c51ebd6359335cdb1982aad5b68d2
-
Filesize
11KB
MD567bc8a50f6c5c7c2383a1b511af0bfe6
SHA162fc04550c28345d1aae274fe0671b6038ed7fcb
SHA256b3bb455e785224fdecafcab93e3e04358391066d2fa7b30ca4cbfcc4bdd54e8a
SHA512b07c0fa0029e44b9bc380f7a317b5b27069d242ae95355cf8e3d7c64816faedc3643067dd372089164cbffa9b530ae0fc3514622116d8381bb5c2b31cd750fc8
-
Filesize
15KB
MD53e32992c1a11e3087bf5ad24befe1397
SHA1dca73d631c0d3183b40db2e7610a360d5df0003a
SHA256b5b4ab42bb56896b3b2e29ed0434c0986650d6a710ea98bd701a087ababad717
SHA51246e9bc2394e3c395dc26de0c3c8d5e81c845b4c617b1e72b946eb870daab94cb7379c1902da6fdd6da6e95c150b092b979661477fc9d5f4cccee6225e5a19207
-
Filesize
333B
MD5f9bb3bfea75cdcad29f5a4a6e7aed726
SHA1b409ef0b54658f9c6e22206a47da7ebab8341cb3
SHA256d70c2dd1197ceb8fec0eeb8c5dc55b8cf4132a3977515816b4569dd809a333ca
SHA512426227b8cdaef676c4b35c0d7efd6a731d37edb8a108fecc87d57e2985272257770abd4176f4ccfd6c8254a743b7d242e3084de2e795def9a39df5970d683b6e
-
Filesize
327B
MD5a66efaa590a0d16b1874a35836ba0a4b
SHA1bb750c61e162420271f89a90f2b58f43587680e1
SHA256b9ab1ed7609e2254b7d4fb655b57b21b2be601646c4ff0b207c411e8bdd9e654
SHA5122b1ea0c798b69b360ab1546d14fccf7d5f9cb224b31bc8430cdb956c8cc570a086e4cfa10e6a843292deb862f4161dfc9b9abbc44afe397ff0ec9563646ff7a5
-
Filesize
317B
MD52029edbd56b70c018927af7a8cc18975
SHA140094fed32a39b1b8b83c662d955cda07d7399f7
SHA2569706701f14af3ed5447498f0797f96bec73df902799990912680c26782981a97
SHA512a1d9fc85b3d048e040126d5a56f5120ef52695d820b3ebc720954ab2e84fabe9470f4fb39481847c71d7793191d849ecfa32aefb4a311796d965a75c3fd0d430
-
Filesize
450B
MD5ba86f4338cca4a9c74e3dc3b6a092dba
SHA154e8fbde9e7d6af2d5704c679184d5dd51506abd
SHA256cf839e4f21a97cd0fbf30d9991ec6afa29ebab437a4ac931c53001f5f7984503
SHA512ff0de88369b1e617cc1712c147895994aab26068c9aaae148547577ee225c187de5d95669f57a4a62d498b731f1b491f60d0bf4c3d2e307ba19e9fbe93e4ed5a
-
Filesize
348B
MD507a5b028d571b2ba6d9110e6d992fb34
SHA121b955aa2cfdea9b0b7e46848d24467408762d8c
SHA2568234783d651580a4b13001b3706cf9ff1fb35b7f6c971ca638e327e13fea3d26
SHA512ff4109ff3e25559918bb36ea1eeda3d85b5998801505afe4cf9eceb8eb3ee5cb0354be8738b5e958f8da72b8d099baa784bcf1325201277dcd119857fb6d7aeb
-
Filesize
321B
MD5e3482c1ad2ee11f53d15e3fe977ce986
SHA179466c299c74336fc62b4752e04bf6095c410803
SHA25645145c7ee82ffc2aeb9d2c024d5c9d4a079488d7f64ebe2e3677b96e280bd5ea
SHA512644bf903b465647e4044ea331edd0b222eed1bb6c6474a0c713372c9c4afb4c2a20bc17161a79d850b66d74edee5e199306bbdee36e383189bd0693bf04c6aa8
-
Filesize
40KB
MD59c94d58885220027520ae1389a3e8387
SHA12547cb7e41c5ec88f137859cd0868a9e87a0a9a5
SHA256fc3b5e37b630ea43fa54769f3faec757490f8dbf2ad565b00841be4e1f0a08fa
SHA512f19669691e22eb0db500b7c79a7dfc05088ad9576763621ecaaa6a8a95f0ef8909ad0a8b1a32960d3110683d41dd3d8d17c1fdba95f95260ad661706d332aac5
-
Filesize
8KB
MD54dea3fc2cfe6475fff8c3c1967e29832
SHA1d05691755ca045cfee42d06e74d52cbf55e22861
SHA25695da17bf93422270e65c5c367229696ec5b524fafe80b9a60ad4dadb8f7ab636
SHA512a00c4be881f27a1f8a1517a0a3955ad349dae6d6e011cb3958d3d1e9cbd96082753978896975b0d15bff6d3056485a831f2246a78bed3d75997a18946aea0328
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b859c566-2ff9-44b2-aedc-ea5e9d370a90.tmp
Filesize11KB
MD5c78f6d19619e8b9f0c319d5adcc2363a
SHA139334ac1363e3d92eb7c845caba190e21a0d6076
SHA256a65caae9b1f1ead4ce7533bb04602536dfab3714ff73ab041d32c80ab1137ff8
SHA5124c10e4384c5cba3e12527f1ef2d21566affb876dea77e7c4bdbfc9ab73d92048acd62857ac3935dba28b0eced435c8a53373180f61b54a3c35eee9f0a3df544c
-
Filesize
19KB
MD54416513546a3f1d3244a9d3c2bb3cd7b
SHA17bc0aadc329eee1d86a3b1551c096bd9b159ebd5
SHA256e1c6a2b666a3bf5bb0d5d663f64cfcb228b1ebbc904cd64dd94468bab6c1fd9b
SHA5123120c4dd910b892faad376231fbe446f43fcca45d6c6e3275e92a3834b47039d1726d0a96d35126365b888b6065fc76db49196a0d676bd82c13ab5e78ba62121
-
Filesize
317B
MD58368ecb19f77e6ea15ad82a24633fd0b
SHA11139a7e5c6c8f193a525de8d7aac251d73c96f82
SHA256aa861bcc4874e114bd98ebe495a4d0d60f5d3eda3a4c87902715aedaa62659cc
SHA5122ef7aa335cfec8cfe2945a472edcd6c55e3a8dc3670f5f492e7be44e36c26cb90f4693de8bd253b512baf45251d6d177536b7bd5ae3cba565f81a48a5591875b
-
Filesize
1KB
MD56e1e6d1b31be1f055fe32d3b19c84313
SHA1488d381974b196307fbd461e17f07dda9af34a75
SHA2568f8bc80b477324d52c788d2b852bd6abd57f45bb2027d0a7424f9196d4703738
SHA512171ce36d712faaca42feb203da063f21d2b1e05ed22b67fb1cff310b70127442a2e6d7a53efd1c9a56b76d885a0568b0dfe2f520499885c0e0b54968672a6444
-
Filesize
335B
MD54dd6b87c9ddc4914bf8d8d7fccf156bc
SHA14b70fbd99197b007f1cbec0673fe7e0b3a487c2d
SHA25641f83d291e1ea9cf950781084b8e3a0925ee82d951f1c14b823a3b025688e5f6
SHA512bc445fd7379d94c35b8d1227f9d8cb8278fbf64db31348d5eb91fcfacea84917508cb93fb53b8e564ee794884bd54d6054c973358d00816f53938156cbded9ca
-
Filesize
44KB
MD527b4448e6fb0eef24e60e86ee4cbbc29
SHA1f64155577d36554e4540a9df51d0f19ca5eec9cb
SHA2564b876e0b29942ffc1da6f333e925e0c16e5b2dcbae3cda118f3ce12db6a528a2
SHA51254d5955504f5b8b1ef253c335839fa4e12760b1ef8bea330d519129698f0244a372589ddf47625789938e87a912dfbe1807046d6b274b690c9ddb82fc1791ad1
-
Filesize
264KB
MD5dcfb78ecf22e39a9110cd4006c5e4d08
SHA19b6da84c575da0cac0b1c98a6ebe5d536ecd6e62
SHA25602dd2fcedcf64440ee4a5fac21792800c383541b085f6db5fab502ce0657b34a
SHA512f12705d70631ac6ba3f287501b842d09a502b6235657153f9fe74da9f4c1293af56dba1fc2dea66e2f5270ae40ebfdbeef7603c3d6a85574bb386c6f867f8ac5
-
Filesize
4.0MB
MD574d0ad11c3f3cb9be591392dbe1a3ed6
SHA120a81ce61c799551627e80553674068ff6f8c85a
SHA25618951e9a586ab9f3614b1a156b9a843d5438c401cf0fc6edea698b7b27fe61ba
SHA5120f3a8e3f6f25cab1a8b04d010921a637209473720e6784cc70dabf76f46fbb25a57538e4084ece1696f0161e13581dcf69523c4798d508cf99904ade0b8c977a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
193KB
MD584f36a97a4187d4b533c81c6518e199d
SHA1d4152722d82344e06d093a80843fb2ecdc2f4ef9
SHA2561bcf336a413c21d0471315312a5a6ddbbde35bea50928828f360ea15b4db1bef
SHA5124a6574231c99ea43cf6f9d48e904299eefa701ec283ba697aca3ae4ae458bdf9c2fddbdbc0edb401af10d1003356c983257325a379409b0228c4d2229e47c808
-
Filesize
193KB
MD59ee74916f355a8ac4200af10c51761a1
SHA1a1044084ee999bc627b284af887bd2afc25639a1
SHA25635b151be1504ea852c59c7085111205f784737a3a16baf667968c91b70da843a
SHA5124203d133f6942651af49b91b844bd949ac7570ed63aab3c67d32c51e7f46e5a6ee165bfe90d9e5484950609b73d7bba42cc33575d77ca7b772cd46c7364144d8
-
Filesize
193KB
MD5e659bdfc68589f5980f3cd918f49ce92
SHA1b824aa3858a8a36976b39d5079b96eb4876e0f5d
SHA256c62eca3fbef988e2726663e8cff8e67bb568cc2f9cca74ee5143d340151812e3
SHA51248a4c72f3d3c346e24acfe7207d5dc2464db24b4d2983aaa15817ce5850edf0740333d4bf100ff08c307a7d899d207ba7113d24f41ae06733d54fede70153b85
-
Filesize
99KB
MD523a878dd347fa606f6ebc1741f2ca73d
SHA1d0a81c3a8fc5959a632c13a453d30689b09fd0ed
SHA25690793c644deb5ad0664208346fd49fb210e16427325c3fee6216f83521fc133b
SHA512397429138bcba8479e300418c7792454f5a1eeb892d76569a779045da9f091dd2ab67ef5dd0de2562540c7eefb18d7ac7e2900068d8b25cb9f9f9f09d978ed9c
-
Filesize
193KB
MD5a47755982ecdc972c39e822fef599a98
SHA12cc9ac5eeaba8f1cc695418129b9ba691a438339
SHA256c186610c49a9cd67886e3bf967c80521ab8d53295cb2cfc3165d9c6c9cf2c070
SHA512347d3d9b4aa1ebe419f94580148ca4db0854722dc7d57dfedef8111d06c6d6e996ca6514f4373985dfb7fc3da351b0f7e7b5c6299b2d5614f2a888bb29342e27
-
Filesize
193KB
MD57bb3f456902667c4b621f1a978f11641
SHA13b2f7df0f1cca42110a1d64f9e724a99fd91e766
SHA2566a47596691865882d5deeaea85c0d4a41e288cb0c1699f44950f43f55282f4cf
SHA5123fe0379e39c3d5d36b1bf9cf2300a9fe0e500290ff0d1090dc39bb3e5170fecbc6979b47209574c8c9d5b7dfb3e20da912ff533272bec119bce503ddfae8e9e6
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
48KB
MD55a1706ef2fb06594e5ec3a3f15fb89e2
SHA1983042bba239018b3dced4b56491a90d38ba084a
SHA25687d62d8837ef9e6ab288f75f207ffa761e90a626a115a0b811ae6357bb7a59dd
SHA512c56a8b94d62b12af6bd86f392faa7c3b9f257bd2fad69c5fa2d5e6345640fe4576fac629ed070b65ebce237759d30da0c0a62a8a21a0b5ef6b09581d91d0aa16
-
Filesize
4KB
MD54387416c5a003ae350a26942e73582df
SHA1a39dd760e14cc14431c9bd0490a59beed2341c6f
SHA256f994af843bc7a7e7a7449b308ae1663b3c7cda58dd494b9330c6a47928d9d191
SHA512f39c2095ebb3dc315346f188d4388e3090a04658ef35ed27085420621289f7e9fb2f7b87126e0aec0574ca76d1968b394ad7574705c17f35fdce56eccf3f155d
-
Filesize
14.2MB
MD5b291ac9add97f876d94b694af9c1fedb
SHA14724c8fcf6be73006f6a3f8db0ab6121c6acb1f4
SHA25607140d5e27e5a044392f1c5690d4b2755b17ee80e42bf44237bebf30d8de4470
SHA512079e3164b2f3fe4db59d5e2bfb0422dd5a783ad0e7f5c0bfc1250da1c3de7acbd57ae850633eb98ed419082c3fc2f4c397fd4fe6b39ebd39e885a138bf9a865d
-
Filesize
10.1MB
MD52c752edef5b0aa0962a3e01c4c82a2fa
SHA19c3afd1c63f2b0dbdc2dc487709471222d2cb81e
SHA256891846bf656253ca1cdd28584a28681e9604e2a03d74cd6b99313e3bff11daf8
SHA51204d25fe7d40c8c320ffc545a038ad6ea458df6a8a552b0e0393b369a03b9bf273c72f30169bd54e8eb10757c04bdddf3859c601c1eb9e1a12fe4d15658906dfe