Analysis
-
max time kernel
494s -
max time network
496s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/08/2024, 11:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1251225750002991179/1271712268597465128/SG9uZXlwb3Q.exe?ex=66b855d8&is=66b70458&hm=f69f97b8c88d57444f1a7b3ec3d418175889247659e81ea7137d1831f91c09bf&
Resource
win11-20240802-en
Errors
General
-
Target
https://cdn.discordapp.com/attachments/1251225750002991179/1271712268597465128/SG9uZXlwb3Q.exe?ex=66b855d8&is=66b70458&hm=f69f97b8c88d57444f1a7b3ec3d418175889247659e81ea7137d1831f91c09bf&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 25 IoCs
pid Process 1900 SG9uZXlwb3Q.exe 3420 RobloxPlayerInstaller.exe 928 MicrosoftEdgeWebview2Setup.exe 692 MicrosoftEdgeUpdate.exe 3936 MicrosoftEdgeUpdate.exe 5048 MicrosoftEdgeUpdate.exe 2584 MicrosoftEdgeUpdateComRegisterShell64.exe 2144 MicrosoftEdgeUpdateComRegisterShell64.exe 4604 MicrosoftEdgeUpdateComRegisterShell64.exe 4880 MicrosoftEdgeUpdate.exe 1784 MicrosoftEdgeUpdate.exe 3112 MicrosoftEdgeUpdate.exe 1788 MicrosoftEdgeUpdate.exe 1164 RobloxPlayerInstaller (1).exe 4016 RobloxPlayerInstaller.exe 232 RobloxPlayerInstaller (1).exe 4504 RobloxPlayerInstaller (1).exe 1240 MicrosoftEdgeUpdate.exe 2516 RobloxPlayerInstaller.exe 4928 RobloxStudioInstaller.exe 2332 RobloxStudioInstaller.exe 1932 RobloxPlayerInstaller.exe 2832 MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe 2584 MicrosoftEdgeUpdate.exe 2568 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 19 IoCs
pid Process 692 MicrosoftEdgeUpdate.exe 3936 MicrosoftEdgeUpdate.exe 5048 MicrosoftEdgeUpdate.exe 2584 MicrosoftEdgeUpdateComRegisterShell64.exe 5048 MicrosoftEdgeUpdate.exe 2144 MicrosoftEdgeUpdateComRegisterShell64.exe 5048 MicrosoftEdgeUpdate.exe 4604 MicrosoftEdgeUpdateComRegisterShell64.exe 5048 MicrosoftEdgeUpdate.exe 4880 MicrosoftEdgeUpdate.exe 1784 MicrosoftEdgeUpdate.exe 3112 MicrosoftEdgeUpdate.exe 3112 MicrosoftEdgeUpdate.exe 1784 MicrosoftEdgeUpdate.exe 1788 MicrosoftEdgeUpdate.exe 1240 MicrosoftEdgeUpdate.exe 1240 MicrosoftEdgeUpdate.exe 2584 MicrosoftEdgeUpdate.exe 2568 MicrosoftEdgeUpdate.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxStudioInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller (1).exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller (1).exe -
Checks system information in the registry 2 TTPs 12 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\TopBar\leaderboardOn.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\TrustAndSafety\Reducers\report.spec.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\PlayerScripts\StarterPlayerScripts\PlayerModule.module\CameraModule\CameraUtils.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Packages\_Index\RoactNavigation\RoactNavigation\getChildrenNavigationCache.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\avatar\scripts\humanoidHealthRegenScript.rbxmx RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\ExtraContent\textures\ui\LuaChat\9-slice\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\StudioToolbox\AssetConfig\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\GameSettings\CheckedBoxDark.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Lua\Toggles\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Shared\InsertableObjects\Dark\Standard\[email protected] RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\Cursors\KeyboardMouse\IBeamCursor.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\ExtraContent\textures\ui\Controls\DesignSystem\ButtonA.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Shared\Ribbon\Dark\Medium\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\Common\httpRequest.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\InGameMenu\WhiteSquare.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\Lobby\Buttons\scroll_up.png RobloxPlayerInstaller (1).exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Shared\Ribbon\Light\Medium\RibbonLock.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\InspectAndBuy\Components\DetailsButtons.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\ButtonLeftDown.png RobloxPlayerInstaller (1).exe File created C:\Program Files (x86)\Microsoft\Temp\EU6C16.tmp\msedgeupdateres_el.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Packages\_Index\RoduxNetworking\RoduxNetworking\NetworkStatus\buildActionName.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\BulkPurchaseApp\FocusNavigationUtils.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\Cursors\KeyboardMouse\ArrowCursor.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Shared\InsertableObjects\Light\Standard\AnimationConstraint.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Shared\Navigation\Dark\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\api-ms-win-crt-private-l1-1-0.dll RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\TopicContentsRodux\Dev\JestConfigs.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\FaceControlsEditor\checkbox_unchecked.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\DeveloperFramework\checkbox_indeterminate_light.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\FTUX\init.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Packages\_Index\RecordPlayback\RecordPlayback\RequestWriter.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\InspectMenu\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller (1).exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\textures\ui\VoiceChat\MicLight\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Shared\InsertableObjects\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\SetAlias\LuaSocialLibrariesDeps.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\Backpack\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\Controls\[email protected] RobloxPlayerInstaller (1).exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\TerrainTools\mtrl_cobblestone_2022.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\VoiceChat\SpeakerNew\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\AvatarEditorPrompts\Components\Prompts\CreateOutfitPrompt.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\PublishAssetPrompt\Components\PublishAvatarPrompt\AvatarParts\AvatarPartViewport.spec.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\TrustAndSafety\Actions\BeginReportFlow.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Packages\_Index\DomTestingLibrary\DomTestingLibrary\config-default-ignore.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\InspectAndBuy\Components\DetailsThumbnail.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\Controls\XboxController\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\GameSettings\ScrollBarMiddle_Wide.png RobloxPlayerInstaller (1).exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\AvatarEditorImages\Catalog.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\ExtraContent\textures\ui\LuaApp\graphic\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\ui\LegacyRbxGui\popup_redx.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Shared\InsertableObjects\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Shared\Navigation\Light\Standard\ArrowRight.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\PlayerList\Components\Presentation\StatEntry.spec.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\scripts\CoreScripts\Modules\VR\VRBottomBar\VRBottomBar.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Packages\_Index\LuauPolyfill-12e911c4-0c4b13ff\LuauPolyfill\Array\some.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Packages\_Index\TestEZ\TestEZ\Reporters\TextReporter.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\TextureViewer\select.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\studio_svg_textures\Shared\Ribbon\Light\Medium\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Packages\_Index\GraphQL\GraphQL\jsutils\printPathArray.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\textures\ui\LuaChat\9-slice\input-default.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\content\textures\StudioSharedUI\spawn_withbg_32.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\ExtraContent\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\content\textures\ui\VoiceChat\MicDark\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ea4f8221cbd94062\ExtraContent\LuaPackages\Workspace\Packages\_Workspace\DiscoveryTestHelpers\TopicInfosRodux.lua RobloxStudioInstaller.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 3 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\SG9uZXlwb3Q.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe:Zone.Identifier msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4880 MicrosoftEdgeUpdate.exe 1788 MicrosoftEdgeUpdate.exe 2584 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 21 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller (1).exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller (1).exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller (1).exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxStudioInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxStudioInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxStudioInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe -
Modifies data under HKEY_USERS 56 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "64" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\CLSID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ = "IRegistrationUpdateHook" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ = "IPolicyStatus3" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ = "IAppCommand2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ = "IGoogleUpdateCore" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc\ = "Microsoft Edge Update Update3Web" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ = "IPolicyStatus2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ = "IApp" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\NumMethods\ = "26" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ = "IGoogleUpdate3" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E3D94CEB-EC11-46BE-8872-7DDCE37FABFA}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback\CurVer MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ = "IPolicyStatus2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ = "ICredentialDialog" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine.1.0\CLSID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService\CurVer MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdateComRegisterShell64.exe -
NTFS ADS 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 777722.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 648426.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\SG9uZXlwb3Q.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 652803.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4468 msedge.exe 4468 msedge.exe 2216 identity_helper.exe 2216 identity_helper.exe 804 msedge.exe 804 msedge.exe 540 msedge.exe 540 msedge.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe 1900 SG9uZXlwb3Q.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3932 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 692 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 3932 taskmgr.exe Token: SeSystemProfilePrivilege 3932 taskmgr.exe Token: SeCreateGlobalPrivilege 3932 taskmgr.exe Token: SeDebugPrivilege 1240 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 3112 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2568 MicrosoftEdgeUpdate.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe 3932 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4512 MiniSearchHost.exe 5096 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4124 4468 msedge.exe 81 PID 4468 wrote to memory of 4124 4468 msedge.exe 81 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 2068 4468 msedge.exe 83 PID 4468 wrote to memory of 4524 4468 msedge.exe 84 PID 4468 wrote to memory of 4524 4468 msedge.exe 84 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85 PID 4468 wrote to memory of 1552 4468 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1251225750002991179/1271712268597465128/SG9uZXlwb3Q.exe?ex=66b855d8&is=66b70458&hm=f69f97b8c88d57444f1a7b3ec3d418175889247659e81ea7137d1831f91c09bf&1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe565b3cb8,0x7ffe565b3cc8,0x7ffe565b3cd82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Users\Admin\Downloads\SG9uZXlwb3Q.exe"C:\Users\Admin\Downloads\SG9uZXlwb3Q.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3512 /prefetch:82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2460 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6356 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1700 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:244
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
PID:3420 -
C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:928 -
C:\Program Files (x86)\Microsoft\Temp\EUAEF8.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUAEF8.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:692 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3936
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5048 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2584
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2144
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4604
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Mjk0QkI0MjktMkQ4Mi00RjE2LUJBOUYtRDhBRDFEMjU2NzEwfSIgdXNlcmlkPSJ7RjI0RTc1MTEtODdDMC00OTFELUI5QkMtOUExRjQ5QzdFNTY5fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntDRjA2RjBBOC0wNjg0LTRDNUItOEIxOS0xQ0VCNkI5NDY3MjN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE0My41NyIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU0NTY0Njc0ODYiIGluc3RhbGxfdGltZV9tcz0iODQ3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4880
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{294BB429-2D82-4F16-BA9F-D8AD1D256710}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6596 /prefetch:22⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaService --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7240 /prefetch:82⤵PID:328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6908 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:2232
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1164
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6772 /prefetch:12⤵PID:1028
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2604 /prefetch:12⤵PID:1504
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller (1).exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6624 /prefetch:12⤵PID:2656
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12725881919905740163,1350956469084600673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1724 /prefetch:12⤵PID:2844
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3832
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Mjk0QkI0MjktMkQ4Mi00RjE2LUJBOUYtRDhBRDFEMjU2NzEwfSIgdXNlcmlkPSJ7RjI0RTc1MTEtODdDMC00OTFELUI5QkMtOUExRjQ5QzdFNTY5fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins4RjIxQ0ZBQS1BRjZCLTRBODAtOUVENy0wRDQzNEJCM0ZBQjh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU0NjQwMjk0NDMiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1788
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{17427156-7133-4566-B03E-2DB2149E704D}\MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{17427156-7133-4566-B03E-2DB2149E704D}\MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe" /update /sessionid "{83653659-A7F6-4A6C-A841-698F5254F04D}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Program Files (x86)\Microsoft\Temp\EU6C16.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU6C16.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{83653659-A7F6-4A6C-A841-698F5254F04D}"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7ODM2NTM2NTktQTdGNi00QTZDLUE4NDEtNjk4RjUyNTRGMDREfSIgdXNlcmlkPSJ7RjI0RTc1MTEtODdDMC00OTFELUI5QkMtOUExRjQ5QzdFNTY5fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntFRjZDNzhDMi1GNjJBLTQ5RUEtQTdENy02M0JDOTA0M0Y2NDV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTcxLjM5IiBuZXh0dmVyc2lvbj0iMS4zLjE5NS4xNSIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiPjx1cGRhdGVjaGVjay8-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-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-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjkyMDIyODM1MzYiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48cGluZyByPSItMSIgcmQ9Ii0xIi8-PC9hcHA-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjkwLjAuODE4LjY2IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzY3NzY0Mjg1NzQ3Njc1MCI-PHVwZGF0ZWNoZWNrLz48cGluZyBhY3RpdmU9IjEiIGE9Ii0xIiByPSItMSIgYWQ9Ii0xIiByZD0iLTEiLz48L2FwcD48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iOTAuMC44MTguNjYiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIj48dXBkYXRlY2hlY2svPjxwaW5nIHI9Ii0xIiByZD0iLTEiIHBpbmdfZnJlc2huZXNzPSJ7NzNEQTRGMzAtOTY2RC00N0I4LUI4MUQtNDVGNEQwQUM5QTBBfSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2584
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4512
-
C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe"C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_8638C\RobloxStudioInstaller.exeC:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_8638C\RobloxStudioInstaller.exe -relaunch2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2332
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:3968
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,1⤵PID:2948
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b8855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5096
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.195.15\MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe
Filesize1.6MB
MD590decc230b529e4fd7e5fa709e575e76
SHA1aa48b58cf2293dad5854431448385e583b53652c
SHA25691f0deec7d7319e57477b74a7a5f4d17c15eb2924b53e05a5998d67ecc8201f2
SHA51215c0c5ef077d5aca08c067afbc8865ad267abd7b82049655276724bce7f09c16f52d13d69d1449888d8075e13125ff8f880a0d92adc9b65a5171740a7c72df03
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
Filesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
Filesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
Filesize
24KB
MD5f6c1324070b6c4e2a8f8921652bfbdfa
SHA1988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf
SHA256986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717
SHA51263092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100
-
Filesize
26KB
MD5570efe7aa117a1f98c7a682f8112cb6d
SHA1536e7c49e24e9aa068a021a8f258e3e4e69fa64f
SHA256e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01
SHA5125e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8
-
Filesize
28KB
MD5a8d3210e34bf6f63a35590245c16bc1b
SHA1f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693
SHA2563b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766
SHA5126e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a
-
Filesize
29KB
MD57937c407ebe21170daf0975779f1aa49
SHA14c2a40e76209abd2492dfaaf65ef24de72291346
SHA2565ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9
SHA5128670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7
-
Filesize
29KB
MD58375b1b756b2a74a12def575351e6bbd
SHA1802ec096425dc1cab723d4cf2fd1a868315d3727
SHA256a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105
SHA512aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19
-
Filesize
29KB
MD5a94cf5e8b1708a43393263a33e739edd
SHA11068868bdc271a52aaae6f749028ed3170b09cce
SHA2565b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c
SHA512920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7
-
Filesize
29KB
MD57dc58c4e27eaf84ae9984cff2cc16235
SHA13f53499ddc487658932a8c2bcf562ba32afd3bda
SHA256e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98
SHA512bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc
-
Filesize
28KB
MD5e338dccaa43962697db9f67e0265a3fc
SHA14c6c327efc12d21c4299df7b97bf2c45840e0d83
SHA25699b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04
SHA512e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9
-
Filesize
29KB
MD52929e8d496d95739f207b9f59b13f925
SHA17c1c574194d9e31ca91e2a21a5c671e5e95c734c
SHA2562726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df
SHA512ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957
-
Filesize
30KB
MD539551d8d284c108a17dc5f74a7084bb5
SHA16e43fc5cec4b4b0d44f3b45253c5e0b032e8e884
SHA2568dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07
SHA5126fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2
-
Filesize
28KB
MD516c84ad1222284f40968a851f541d6bb
SHA1bc26d50e15ccaed6a5fbe801943117269b3b8e6b
SHA256e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b
SHA512d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e
-
Filesize
28KB
MD534d991980016595b803d212dc356d765
SHA1e3a35df6488c3463c2a7adf89029e1dd8308f816
SHA256252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e
SHA5128a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed
-
Filesize
28KB
MD5d34380d302b16eab40d5b63cfb4ed0fe
SHA11d3047119e353a55dc215666f2b7b69f0ede775b
SHA256fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f
SHA51245ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538
-
Filesize
30KB
MD5aab01f0d7bdc51b190f27ce58701c1da
SHA11a21aabab0875651efd974100a81cda52c462997
SHA256061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c
SHA5125edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e
-
Filesize
30KB
MD5ac275b6e825c3bd87d96b52eac36c0f6
SHA129e537d81f5d997285b62cd2efea088c3284d18f
SHA256223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0
SHA512bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679
-
Filesize
27KB
MD5d749e093f263244d276b6ffcf4ef4b42
SHA169f024c769632cdbb019943552bac5281d4cbe05
SHA256fd90699e7f29b6028a2e8e6f3ae82d26cdc6942bd39c4f07b221d87c5dbbfe1e
SHA51248d51b006ce0cd903154fa03d17e76591db739c4bfb64243725d21d4aa17db57a852077be00b9a51815d09664d18f9e6ad61d9bc41b3d013ed24aaec8f477ad9
-
Filesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
Filesize
29KB
MD528fefc59008ef0325682a0611f8dba70
SHA1f528803c731c11d8d92c5660cb4125c26bb75265
SHA25655a69ce2d6fc4109d16172ba6d9edb59dbadbc8af6746cc71dc4045aa549022d
SHA5122ec71244303beac7d5ce0905001fe5b0fb996ad1d1c35e63eecd4d9b87751f0633a281554b3f0aa02ee44b8ceaad85a671ef6c34589055797912324e48cc23ed
-
Filesize
28KB
MD59db7f66f9dc417ebba021bc45af5d34b
SHA16815318b05019f521d65f6046cf340ad88e40971
SHA256e652159a75cbab76217ecbb4340020f277175838b316b32cf71e18d83da4a819
SHA512943d8fc0d308c5ccd5ab068fc10e799b92465a22841ce700c636e7ae1c12995d99c0a93ab85c1ae27fefce869eabadbeafee0f2f5f010ad3b35fa4f748b54952
-
Filesize
28KB
MD5b78cba3088ecdc571412955742ea560b
SHA1bc04cf9014cec5b9f240235b5ff0f29dbdb22926
SHA256f0a4cfd96c85f2d98a3c9ecfadd41c0c139fdb20470c8004f4c112dd3d69e085
SHA51204c8ab8e62017df63e411a49fb6218c341672f348cb9950b1f0d2b2a48016036f395b4568da70989f038e8e28efea65ddd284dfd490e93b6731d9e3e0e0813cf
-
Filesize
28KB
MD5a7e1f4f482522a647311735699bec186
SHA13b4b4b6e6a5e0c1981c62b6b33a0ca78f82b7bbd
SHA256e5615c838a71b533b26d308509954907bcc0eb4032cdbaa3db621eede5e6bfa4
SHA51222131600bbac8d9c2dab358e244ec85315a1aaebfc0fb62aaa1493c418c8832c3a6fbf24a6f8cf4704fdc4bc10a66c88839a719116b4a3d85264b7ad93c54d57
-
Filesize
27KB
MD5cbe3454843ce2f36201460e316af1404
SHA10883394c28cb60be8276cb690496318fcabea424
SHA256c66c4024847d353e9985eb9b2f060b2d84f12cc77fb6479df5ffc55dbda97e59
SHA512f39e660f3bfab288871d3ec40135c16d31c6eb1a84136e065b54ff306f6f8016a788c713d4d8e46ad62e459f9073d2307a6ed650919b2dd00577bbfd04e5bd73
-
Filesize
28KB
MD5d45f2d476ed78fa3e30f16e11c1c61ea
SHA18c8c5d5f77cd8764c4ca0c389daee89e658dfd5e
SHA256acf42b90190110ccf30bcfb2626dd999a14e42a72a3983928cba98d44f0a72e2
SHA5122a876e0313a03e75b837d43e9c5bb10fcec385fbb0638faa984ee4bb68b485b04d14c59cd4ed561aaa7f746975e459954e276e73fc3f5f4605ae7f333ce85f1b
-
Filesize
5.5MB
MD59f1edaf7fec140c4fbf752bceb8faee9
SHA1446e908ae656e01c864606d2cef06ed8abd96fb3
SHA256810a386924e8aeb9ad6a432067a96b9af05b2070b4a034b28c6d715d99740666
SHA5122a97bdf30878cabc8460b26baa810fce2f06e649a98937c4112e674ddec24a3cab259b820fd6a382a11cb7d8167b33ebe28ae7e10338a283b299b9c5a4951f0e
-
C:\Program Files (x86)\Roblox\Versions\version-6fdcfe060c6440cd\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
Filesize1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
Filesize
14KB
MD594bfc818625d2bd33bea1aaf8faf9861
SHA19ffa6fe6944e5a18ee20041724b254a2448e8547
SHA256572e813a9101aaa6a44c0b7abdd1237a0c99288171f8c384f6458cb215efb113
SHA512d2b2518440dfb1cfd62cce5394841f3118d32b7a946ba62bfabf2c1a92ffbc8f4992cb7324a05b71ed88addd8f7916c52c6458aa01475ea1c981cc813ab7c606
-
Filesize
152B
MD52ee16858e751901224340cabb25e5704
SHA124e0d2d301f282fb8e492e9df0b36603b28477b2
SHA256e9784fcff01f83f4925f23e3a24bce63314ea503c2091f7309c014895fead33c
SHA512bd9994c2fb4bf097ce7ffea412a2bed97e3af386108ab6aab0df9472a92d4bd94489bb9c36750a92f9818fa3ea6d1756497f5364611e6ebd36de4cd14e9a0fba
-
Filesize
152B
MD5ea667b2dedf919487c556b97119cf88a
SHA10ee7b1da90be47cc31406f4dba755fd083a29762
SHA2569e7e47ebf490ba409eab3be0314fa695bf28f4764f4875c7568a54337f2df70f
SHA512832391afcac34fc6c949dee8120f2a5f83ca68c159ff707751d844b085c7496930f0c8fd8313fd8f10a5f5725138be651953934aa79b087ba3c6dd22eaa49c72
-
Filesize
100KB
MD5fdf09c3c067041ffdefcc9e1bdea9718
SHA1e31cf28187466b23af697eedc92c542589b6c148
SHA256144754d90b3eaad27d8a11c86faadb24da4ddc251bead8e43b9ed515fafb84da
SHA5129e32b294cfc17fd52fbdd62732571f4ee57dc0308d62af476331887d0e2446b483ceac06ba4617cfbb1c347d771c0f7ea12108bc384e93f69b180c7ca1a92268
-
Filesize
42KB
MD523e0bdcfd543e5d368053af8a44aef19
SHA17bf557611fbd43c35ab2cec9ffd8acf73e9dd1fc
SHA2565efb5af320831ae12da2a85e9c67697ede2544bc5596e0d583ab66708d328895
SHA512e441620035907dadb96a60a926fd02365017fa743cfd14244eb194f77fc2c22416beaa12a5ebd8e31d9da5882898eeb415fb3e239564f2ca89732da779b9a993
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD55472f32d36706a71447d2191a57ae1a0
SHA119142f09667cac1c6ae5d68a1803e61d87245b54
SHA256d9bbdfbdfa6da87534d92d4c12ab2b3fcde1bf9e99f932bf3017db11c5aa32fb
SHA512fc132b19193891a8112f486de30f067cbb474c99d5444a23522bd90eeb9871e24eb2b963b1d2fc5a5deadbddcd0edfadd1a2327aec901dec48a6ac441f1873f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD592777a226414077364146580aee0e391
SHA16401020bb07f825a925c0b0daa64d44d5e175baa
SHA256f18e7e11ed74a562f4147d0aac6b255985c16fc2617385cd3ce3eb57ddd24101
SHA512ab85761892485999ec237466e18e8970109cd1aaf837569f04179a17731fd317dee98e15755f5e28ee94ba0b4a8873ba983963353c44bb56831aca7dfb50e020
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD548e2360c11dc9323eee9d9676733516b
SHA119d8513de9c6ffbde1b92faed0c87a0a7acb67c4
SHA25635acafafac07fff41c8537ed49ddbfcd9d6b8c3f755b70410d05f3cedbc75f89
SHA512b5eebe179ec30e7a641fbc825cb7f5a41e5a2a4ff5bc741ad13c8787b91f8fb5671a3497fffae6ba06291e876cee9f978434af2f2fdf95030df62834f57cf268
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5f899e66c0e7dc4fcd39ef03d8ca2d62f
SHA183ae230a644c02cf8a2968ce87c8892725c0a4c2
SHA25666028177c890069641264b0ccfbfc2f63d3892e250839b3b54eab98afaced749
SHA512ce446be33f340c31085713b526a16a4e1d8041a02b63ba2260438b2d4b78ca2236151b376b28dc88c855485e2c953e2aba07ef934fdbf6c2fe64ca191f0b1ed7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old
Filesize750B
MD5da0ec3d0d819e5f5fd0d271afa129cfd
SHA1a909f1e61b549eb2276ffb0a961b9ff681a2b673
SHA256a5fc8b2adb6c75aed0e45cf7396fcebeb8639371aaa1da0a680f84ee43c18644
SHA51256508ed22e039e17d9d8610f81ca7319877eb1b4ebf61b3de50856692bc94ca7f5c1a0ba0ad85c85279157e259949c72bd07f6c96d249f1e00a329eef42575ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old~RFe5b7154.TMP
Filesize1KB
MD5f1a6f5195c2cd7052f8e0b0c0a4b67b8
SHA153460583fe165e73d694522aea77f8d58255263d
SHA25632c32f37ecd9785694a4ee9ad75a9e82914ba960271d66779be3f70143341b7e
SHA5122dfb4757d92bdb13837dd8c9b114076e23acc2b8dcfd8717c424f6a86c954e14c64c1cb5b1fb7bb5d4127c360096a622fd8443e0a4c95224ca0da95659c09b4d
-
Filesize
2KB
MD540e36cad6ff577ff1e4dedd676025f43
SHA1666455751bed48d5360f086422dd947d767e9567
SHA256a8552c9936d841beda6abe6f82a76745ab0ae22cafd7645cb47b3a0089bff852
SHA5126b44116e4a39a19abe5ede22347d56e6da91aff0f4064228f95d79b221d831d947b1344b76a8e34f433d709cd5c39afe2e74beba5c3427e2fa7b710c4ea96f7d
-
Filesize
3KB
MD5f3a6f75a7f80d2783e560248a8d84a78
SHA17ba4380ffddb2eaa585e99636325db2da7b88c47
SHA2563a80214ce0301794db11b23b065237bddbe858dbf3f2106f69af0d9533b590fb
SHA51268a83429cc807a8c1af2f34e4f6558b6e4ad325cd76c0f398310d6d8756143a2f0139d700731019c6037cffe0526aa6ed6cab3856b189e7849534ce091956b8b
-
Filesize
9KB
MD5edd4fa516f47dbd77c86c3a3b1869f2b
SHA169ed89af07f97c2f9891affbd044b6dcb4019637
SHA25662106667925b389d8bb293f3c7a9c9e20c723256d5a50b8c87dfd2776757f811
SHA5129b16db170f9e7a488302131e42a70af70ea403a6cfc5295b0d316f4842c9326d0eb498c3624c42995e1ffd3ce926c7801e0e5e397906a34a08a4def4ce801d48
-
Filesize
9KB
MD52c8829c859ac5b40337d422a9afaac44
SHA1a030ddcab9f35c5e77fa60006249d6b22c8921a3
SHA256050f77f70f5f30beca0c54b2f1702b5cab0414e1f89af1c9d2b0d7cca377cce3
SHA5123dce34bc30edace274e73104259b9f7232faf3c0bd7a28404991120e6938d91539caa241879e33b322146aa1cb4623f82663ea68212fa0541cb269e8032ff55c
-
Filesize
5KB
MD52512548db19e5984d5091fe86a8e3dee
SHA131ab1c09930088ca6015b33cb42136d34a52ea9e
SHA256111c3d4c8c885cbac10ac97c25df5817f023d98a4c8f5337f69b5b1b44f7e13c
SHA512cfc0f3a014588eca328cf96186d594263338f4eaa24142763ba534ebcee1d6dd839b16a4453a29d664e97503538ffca3370988c5a888c38f8a99595fca6b5371
-
Filesize
6KB
MD5cec7819dee47b195503fe105e0e23626
SHA167c02fa2d9f581d08adc5ffdc35e1373135441cc
SHA256aea6084f4a891aab4c9331565b2ac8382e2240aa0ea8a7b71bb2bbbb3d7ee0a5
SHA512ab64e07e39027dca0f8f18ab2b56f5ec882cf3a4a5fe2564b8d9309516486cb048c3d135469d8fac4babcf4706d7386dc58129ace7ffe2fffb5959b87b7fbfc6
-
Filesize
6KB
MD5c759be6af40178635e86a22bbe4af2b5
SHA1b684615948f1957b2bd80c9715f375816f355352
SHA25659fbff78f37b59c9c2dc53c18621a976a0c06665aea0c9ff93b00f1ca8ff55b1
SHA5129cbecaa216d480eb2bf245928499e7b7477758ca70a5eb6f2e5693cc1662551176a69d7b58322fbc1223394a16f16eec6ab0f176b8a0ce2e7b28735f93e6baf6
-
Filesize
6KB
MD5c1af3e7e243089b06a73e674f6bc627e
SHA13ec91d46db9656034cad5e9fe7ef47927094ebd3
SHA256ff003cf69440cacad71cd439735142bed218d49773f7f047ad61f11abd4d4324
SHA51279646ce17fc860ae2f9cbb2d9a109b0200466d316c6b050931f4f8dd31237ab4bee464e620d0d3fbe18caec8cb8f58bf764b4f48957cb8bb28742d1c456ba549
-
Filesize
6KB
MD5a510c2c5fb0a127f97a7573501c22bec
SHA1050ce221525d063c8fe4208a2fb5c45a9b336b0f
SHA256ccb8353195407329944225c6eac1f9a9a7a44b96e5ec2c2ff66c9364b4700ae9
SHA5125d730135390d5227ab43163cddf08d49190131c77003869956c2854ae9335958da402367a66dfa775ced1036b1fbb34d823adf38ef2502a6e64a73d51527e200
-
Filesize
6KB
MD5b655b24b7ff8ae3e83daa5767d9c129c
SHA11151ea264bafeaf3a1566a77839cd26770cb41d7
SHA25629f8e6cae449c0a8042428e3179eed645373a654b51a599832fda699322414d8
SHA512254420830f10ba59568fbd8b627b27acefd8ca1be9d0355ef4444a707adcd87eaa9c0173680059a66e1c06dad869592cd5451aeaa54ec3e42de0d31c9fcf0be0
-
Filesize
6KB
MD5a4ec1290947b09d5dc2cdb9c0ad1bd8b
SHA1d5713d4b97573f2812753c91d8d6893f3750fa47
SHA256fa08678552edb5386894e12f28f668a138609333c09dabb8fe06b9e8e62fe77e
SHA512c2a46c7b6e13e68507c0f38f4242ef0d47cd0199b469ac5582ff10d883834409724bc93acd8c31d61864773951551899c74c98ca77cee217f818eb7b0883f538
-
Filesize
1KB
MD5b7ab452ab32ca17ed7130420c2b91b0b
SHA1d76638f79c7e61b8f90412fce8352e68e8b25d1f
SHA2568d8dd2e9c6371ab82e57b8d97ffadc9cdaf0ab4c0af1f33afb3484f4b0d2ac8a
SHA5122052fd113e909a2ad06baccb04a5caa4e518d8fd4c18fcc196ee1c30efaabf2e36d2807f751483516aa0ff03b5dff6ac0d63c4eb26a6025538e484c08756816d
-
Filesize
2KB
MD5b78f3f9a5835e1ad6ea8700f1cb83945
SHA1273311aea3709712ab4765b09b55b8c91f2081e3
SHA2565bfb50c8508721fecf390676dfe54929657fc54d5f58e81af84eb6b996382e29
SHA51216106a94ef71f93d01122ee6bd0fd9b334ab3ff506b96e5bc4fc00c59e7260beb3fa0e73df5e70fe0032b88a686a624aa3e16ef8fb53c1ff7e0735e88e53d425
-
Filesize
2KB
MD586a4f6154384ed56d7b63b58a9ad1271
SHA1982c9de3214610b72b470f824d00d40d405dd749
SHA256a3b61d91f016651eec06af796302d12b9e40da38a036028e09f413d3244e94ff
SHA5121e403a79abb3e2240aa27039258c458ec6d44fddcb6bc282da972d3fc8570b0db5e1f394a62734373a90a3775bb0ea6f846e37bafdca9a08b36db888cd9946ac
-
Filesize
2KB
MD5f0c252243f7f47c44fc9bc33e0c4659e
SHA12d761e35237f112072c4135d26891e5d611d92a1
SHA25691c97d581ac9fb63025f21f982d6cdd47513c809d5fd174b84dd2901ec7a6fbc
SHA5123c2312ce262efdab66e3d7a2cf1c71c24d70f82575c67ce94db747954017f5081b5f34491ee07a0b379e2986ef8bd362d801c82e6be799f4eb8812933d63a535
-
Filesize
4KB
MD50ad60eb89a3f9f195893e9372a0fa588
SHA1030b6ae66d6218552b246fd96a3e8cac5c184bc0
SHA256e7b89d94500c02d1bf7c5ac23acdf2eb46b750bed0a2ef6725922785e313fad5
SHA512a9b43ad6aeaf5565230dbd9b9fe19f1af2743c3797f7825dda444c743cd40f55c9e8b41198ebb29b7947694ffd0e2162508bf57958072fd8a5f9908b8639350a
-
Filesize
4KB
MD5d6dd6cca27a577f4b212052b4b713253
SHA1cea32c7765b5854b99aa55905f2f4f1f34a68ed6
SHA2565b8951690120f8a8f9503a98cd2af61005050bb5f56d62aa6187836bc272d711
SHA512f3fe9a2e7bc18bcb5626cc12c5f03693ff75d84fcfe418633980205665a733fcef2b79e85bd231621b4dbab8240873131f1852045898e401910a66a571697045
-
Filesize
4KB
MD597ac46b881856704fa2b17345aa1e9a5
SHA185c12cd39bbd78c1d68c77fe0232f06571504c91
SHA256d245d03e88cc9e66066c29ee391a656a7f405a0f6b9fc28b183d6e61a0cfe0b4
SHA512c5dee8617513122feee5a6d9641c4636c417e8f1b2da325551b9163b87b5af856a500b83489754d4d1ac1c7a8a43466a8da761e3118ecac658c5fd200a77c0d4
-
Filesize
4KB
MD5ed0acc1e0e1e6c8a5bf9cc5c149c9fed
SHA16934b2d48d6d47e4bc9566988cca02143584b122
SHA256fa100ed218ba37801a58dd35e61cdafb71c89cd6870a87709d5883821e215853
SHA5120ef9462eef6479d8b25cb3572c206afd16eaebcd1570d72cf4b256099b5862333239e7b2b9fa1191e8fb217d9cf1bce45268ba649c3ce0caad973c7a63419b5c
-
Filesize
4KB
MD5d85b51ebb97d9258c8418a4d370b31d7
SHA171fdaab488e81589956832f4d379dc1bb7739f82
SHA2568a07391d59a2b6fd6e82af0e0de9fd5fe206739a5ba527bb210b36aa650218ff
SHA51247ea1756deb4783200fc4ff42025dd8419a3dda74c0de544f452008b32da26bda02b16fcefa23f8a211bc56f5834d919cc1e8f07bc906411cef7e0309ea12dbf
-
Filesize
4KB
MD51919e011e9f15c905d42d2fc1845773c
SHA142a79759b039b9d401de438e3bac7ff4396441f5
SHA256a7dd01dc669d299df174a672f96de46c447aefd933d966f4fbca9147e5a3596d
SHA5126c1b6fecf3af93ac0b697be3efb17e6cb0b6b5434f1c2a706dc325af73b3c3eb6e4d72c391b044fedbe8458b09613794cca20f1e64b28514114c0b0bc0ceae32
-
Filesize
1KB
MD5cab253933766f2280ca14434af97aa3c
SHA13605f4854465239871f52ac708c51579333c6071
SHA256150c39521880bf00221eae1106d240556c331a92feaf3adf8eb2d3d238048ae5
SHA512b60b8f1a959ddb68b0c42c2f138df49e136a00a205dcd2698cd0c915e7347cacd8e02279d4e913d5a86103e183d79720b546650f19961c6f39768e54750b7ac3
-
Filesize
2KB
MD54032823a169c9e176ff51e7dc6821e7f
SHA1523bff29699aadddae7a3b2c7ed4a0068777b5a8
SHA25621fd12e68f3d93e180f52d7f5cd925b364504b9ab8bbf6c63b2ad767f9db1052
SHA512ec347e3da03ea5845ddbc0a911d50b250acf3eb0fb134be6751d05fab52ebbe5ed8552c32c9355587c066979ca75e3fb699dd7a73dd2d69da0d7e8eea520735f
-
Filesize
2KB
MD5d5011c7b9b69885bc5429663c769596e
SHA1e5bd51d28306b94154896b535c8a042deff1c412
SHA256ad669d30ee2fa77366a78c577e629b3dc8c3a76c3b49f9154e034fd5b08c74d7
SHA51253b445e8be46058b4334faec8453018d2fced96102376d54ee60ffeb159e1ca65b370855706a684344ab3a19914b8994ae89002a55723bd59600bbca1a10579b
-
Filesize
4KB
MD56853626d84b0cfefba0f00c1a8760a76
SHA167aefed9e206645625a4642a0073b568b3c9875d
SHA256ff0e4874ffd0016e196fc62539c11cd9ae775da04ec0a7f674c0108c70709a4e
SHA512e01ac8d29500ef253c090cbf29a9b5972c5dea8e16ff7a4c7523513ec49c1c32dfafbf69708fd11ebc246fb7e62b21269478ddc16c9cba5e9c0dd4b7bd770ff8
-
Filesize
4KB
MD5409b656f535001b62e51e54e9e2aba38
SHA12370d2b877904e2f9eee0ccf5de35a7de22046fd
SHA2561516ef102b0d04efa6ffe153eecd40f6ea7c16bf2b7e25467e50323b47ae25bd
SHA5129367704f9bb577bbb1c3a0620c6409054faa2945cd4bb4cc248e1bde595d53590b1c1e31c7141325253ebcd2ad6a7f8da324d33f23f6c8285c23be645c6bb65b
-
Filesize
3KB
MD55b9b83c62219545dfc192c80d40ff37f
SHA1678b5a133a071cbd6fc04e5616b29458b432229b
SHA25695ff1976c9da99efdd08c701a3d6fb80703e9fb881cc0482a2525e3d1835a49f
SHA512616482df97c4106c08c0f80926bd4ec709e1e5ae9af6fb58e9db51950b1b57854d575f28aadf1bb237c7cee8d96b8baf566c89818cb994bcdac390712f342551
-
Filesize
3KB
MD5bb0f06adf85bb8ac877a951283c8c885
SHA1d3699e7fd7322f4b73b03161de5253ba9a19ac08
SHA2566e4eaf48a45052390b8c44e20884d4b2bf0982c8d7d843c9fa7b471ae33141d9
SHA5126535f0df2101eac327278023fc2b4cceb82d9fff46e9a8c6c82a37b0a316989d67432b1b74655a4b61f1416c75bc2aeea503acbdf2fb3909703d7d89fb97dba5
-
Filesize
2KB
MD5b203473a142560a40711fbaa3762d997
SHA1ec4cd6ce849a14a85bf59aec9bac4547335a7e8d
SHA256339c5caa0731a3f45f18125d2258321b65b7abc2a6aa0dea214c28f31237574f
SHA512684d11a3ddb2317cb7d45319365449663524627cc1435d5bfff5683067157ff4cf21e1747c37944f7ec09fe9ca2f9ae0bcc6866dc9a0fbd946dc04ec52289fb4
-
Filesize
4KB
MD5ba9ba2c74e3c55a526f883c6ab60d35e
SHA108bd938869d5248bbe668364d482dee9afdd8c84
SHA256da8f64fb77324b8c2ae20b6ca87a85973e0efc039641b8eec0e70eb4897fb8b5
SHA512c1e02f8cd3298dae99dd925de278969001035fd47b6a77e0473ed19927dee3d31d5e77555f5f159b3eb1e49f6880a6c27bf8a7dd6f67ffdde1884d4f69f8b5bc
-
Filesize
4KB
MD59bfaa21f426435af4584716a116087e5
SHA1297c00600ce2ac0c51ef6905e99ea9dd961bcbc7
SHA2568a33a3092aabefc5f88a06a894602a326fa0d194e83b381e286919c237783ad4
SHA5120b369a7a85e4bc34684d4c7c97419134dca4f9559a9930f86bca02999816d18a7c726cf1d70f230a7846c7b1b3974cd2de94d3157c83f5f6765e1236568a2072
-
Filesize
4KB
MD5057b77abceb93983ff7f1c37bf99ed67
SHA1a0ea38482af3100c7e91b4774067eb7b1dfa9e38
SHA25609daf70e7981bca7282aab8d3e928b9ecaa107ed1d6785fd798d8becc57432fd
SHA5122fe8054bb223b5d6bfa0bec56a45f780cb64c423cf52b225251d855c7385c1065f72fb21c56eeb02962d6870db0ae4c9e93a21bf05439b52ca431a0318063f22
-
Filesize
4KB
MD5dfa95bfdf0c4212d66453d20160b1147
SHA13ca0fc757a9d5ba73038961d61c8b21ddbd905af
SHA2567744b603ca73dd2fdd298b1a770eda30c53a34568b365da3c177a94046f04994
SHA512860f72104378f82cbef2f1306c94fe9cc7b54562d3bcab7ee00954c1cc0f3e497630717b93db3d5f1aa3f20cb2083de448e8ea8742b0dfd893fcc9d54f84d91a
-
Filesize
4KB
MD5b480a8eb183bd72bd9bd31ba6b3d74e7
SHA1bd6221852bb335baa54ea0355b7cadae78fe1138
SHA256a9ba930a3361b9fd5473ecc92e8c21cf7220988d0c35c9381c15c5718e7f1df5
SHA512a7fb38cc3795abdab9f9b2c0f30af5cfb9d017b1ab0bc8822518cb354b6b54c1c338dd85eb4f0a1d14736e86a88427a5a199b83ad5b4f3cf815f198569a74b42
-
Filesize
4KB
MD5ca1ffef71ded7ad5925f6a8500471552
SHA1d28b219ed0fa76faf347021de73b56b5a5664771
SHA2561855b04b3bc0cc363f4ffbf9c9c3a335000e5b75102f34654cb58dcc5da49ed9
SHA51217f97d92f72116863aad5d1734fad7fa63ea5284b32066f59075bc76329ec4126fd3079e8951566f99c98049ddc23833b46c6fca89997b72eb7cb34159039105
-
Filesize
4KB
MD5cca4df44f536d2febe2e7bd696b926fb
SHA1da576c1d21ae2f7da9e83cd9002a11afa0749d1f
SHA256caf2ee1aff8a2e5f052a0d909620e62fbbcdd7f92df447acec428c780a4701fd
SHA512673460583bd431555808ddcd08c69e2bbacd8bba0f1d4d613f50ecb577ff17aba07761078b168774592c309a350ccb6461e4567c8510f8c6bad709822f53ead4
-
Filesize
4KB
MD5357d7f9ecd1da016757f659e25a5a600
SHA1ab3e32e85764e36bc110e4909c4648c3c9b06c3d
SHA256f033dbe6eab6bfdf224f7c01054fb592b40c16d71d500b966057d78f21c37bf9
SHA512d509b8ebe7c257fdefb629c1e5d1509504f47536f8bd9bc026c100351643eaad440926a3adcbf4baf11636b2f81af35c5a13e959ea11ea9beed840d59da311cf
-
Filesize
4KB
MD57ceb4b4eb7abd9306cba4b16e5d37cc4
SHA146e265ae07bd3ef642f1403059986419d1bce65e
SHA256b77664a981756b1b8e5202cde6602420de01736e89a905ab48303ebf965d4319
SHA5123ee4a2d6576f76b0c43fae2ffbd98b2caab4953277531853d323b21ae8677d227b1ae371b62ce288f746b5a7aebce9a37d159eb8994517b78ae5051fadc25e33
-
Filesize
4KB
MD5ae507c770dbd658cc21c7acf0c68285b
SHA1ceab9ca8f260848e79382ec6738c174155a8330b
SHA256131fdf02d9337107b8536cc460883c1b5044b4210898a03316e8db500e662e73
SHA5124a1a751162d6c7a3b96200d941147abb5789489fdfb0226cffc1317639f437a5851ec5c996802311f8290ba9f79d1956a504a73a4b517d54ebf350ec23865c09
-
Filesize
4KB
MD5e8db58472d9bffc47eb3650cf36028f4
SHA1713872beb658664c69a84a22cf69f9f634d7ca88
SHA256eb53675bea697088eecce29ff82cd892b3080b5989ae0ed9c42013ba87e093fc
SHA512909db04090a9e2887fe7f8daedf26ff08898c9a62f1682f09c4457b332e63e6f58258522a020149ce696c2b0c8e7b74a61e41562ad641a4c1ba6e13a59613f23
-
Filesize
4KB
MD5352dd9841627f89a38cc7a3f7b5d1ad3
SHA1df87b17a0bfe3417498ede5fbc2c142e49ef9097
SHA256be5387b22b0049d09b0de47a7ea24ed7431fdb0ea0c132525f9f73c86dda2141
SHA5120a7471195c90fe5dcd613ea390a4d98cd5172ff42ed6bf3c07f2f99ce508a86a519500e463f37f08aee095ae7621ae3cf1642262f7b72b70c866b93192ebe490
-
Filesize
536B
MD5278279d4d87c1ac7c4ceaf762310b46d
SHA16edd6e734513aa389d0ae3eca0da2e46f20f8551
SHA256c726e12897a17d8baafee6bae52b3033b8c141fc677e6131fe87d3235a548f45
SHA512a6fe154ffaba88d22a744808b8eafd6034f409592bbe952a79b1263dbfd027797a33d2cc31c0f7d24661790cde4474425e5932ff3ab237e31686f8ca172973de
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55b099888e8e3f7ab38785056f910671e
SHA1cfadc2ee53f5a572b1eae98fbbeab07a46122e84
SHA2568e8cfa1f7429e58f718dc9166ea0d02c4a3f28374af010eef5fe81f596d656c0
SHA512c94283ac911a910a7e398b6b607229ee44ffaeb303f3573da3d43ec9013d136e6dc5888b1d86b6bf03025c25f70d6357c8a2a132fb3d8443e48f5b159c77e38f
-
Filesize
11KB
MD54f28fc13d1e38b94592754ec05327240
SHA1a306735ad6903a2b55393e320c03cfe8c6606e01
SHA2562aaee07a7503d5d4836611fbc603c3afc63234497d6e806a65651969829697f8
SHA512c23e494c8d4dfc8dfabf009f74321b97b309454fc87be585397bbb0fa1d27d7f7908718fd9cf50a6d4c9ed259a171e45a136d9eeb02c3621bb423ddcd69521e8
-
Filesize
11KB
MD50b5dfa394a6d1828d3e3bce9dede37b8
SHA1f23f0076f01cc0f37ae2840abda4710de69cce9c
SHA256c17f5eceacd5b09a9fb8038c251b48295ea4f1ff58570e2539020ea761b77efd
SHA51264bc0dac07accd10afae8cb3643d5cfb5c432074d3c66c5d2ec5192b77d08a6b6128b34f655b3de26be64ac6ef512fac9a911a8fc98e6f1dedd9247ec2863e0b
-
Filesize
11KB
MD504d069a9dd36a8cedd8779eb1dd8911f
SHA1c02cbe81b4054c21c3017545fed819ec5019df60
SHA256347143ab6bcdfe015dbbb576d8d626a61a23480d8ff1db04dc017d171184c2c4
SHA5128a47ed9062e56c227f4eb5471ca7e6e15c4a05c2a6eba46ae9bfbe99e48aacf1a0e96d48794e545124caf84ae2bdbde34617611bf154b93b486fc725715fe8c1
-
Filesize
11KB
MD5f20489b4a7b2d5fb406a29ba54ad6c1f
SHA1c962c18f2574871ca94411eefc1cafa5dc919a3b
SHA2562661d9f125be5d0f38fa09d5a7f1d3cb750ef743ef559ebf96229c1dfce5d176
SHA5127e09c8bccf9abf1d9b768396036a2fa69be780714b0c14457d3675fbdebcb9744320169a9c63609cab6dcbaaa05e31d9e1096dfc68129db360d56f216c06c813
-
Filesize
11KB
MD50b58a41d00320a7a50f46c04f780d469
SHA117a56ee28dd34034688702e20da4b6ee288baf96
SHA256c6ff9c79f6b11a10bd7fe665e64a5e6ed72bafc3590bd730a5745c428ff082c6
SHA51210b0991634506c45fa6f7d6d368c6362bac093d27df6c5c8b75260f8788897851e795efcccd77dfe57c9c08b1a1ae10d4758fffc2fca25e6ce927dd60fa28e07
-
Filesize
11KB
MD535e54e76649f98d4e9d54e3dff4ed129
SHA1029ffadf1ef67c3b6aca1133a0a4ba9bfb51963c
SHA256d5794d8ba6317e1601f49f3cbdc0909ad53d289b734a3dbe44cfbe449b618a83
SHA5129b40edf1d537e6eb96c3cad767deae36d4cda4067c3f2cff653715d1118e0e6084e899f5972034475d69fb49cf1b0f273ea19c1b1f3ce87f409c8e964b94b9c9
-
Filesize
11KB
MD5edd461171405aafb33931ba927e7b71e
SHA162f5ff6e16b710502868763a3585f1b0d0fd9120
SHA25697b39684e42009f313dbe8e99d602af466ae516a4891ac801ad4fe47442c055c
SHA512b315553b55c6e08db712b0ad8aede962e2c6b804bc8013484a82cde1952307da2680e76594f0e9780da1cff536e5ff8962155bef4ca257d6225a87789483612c
-
Filesize
11KB
MD574a3f1934f6f505e6406e1cf55961016
SHA1fc8b7d6476f6abceb64b47dbf7c36c82429e7f80
SHA2562fb1e3bafcad9e2f5fba71b6eda91e0d9b2504daf0d9761269219e4d69e14ad5
SHA5127c2977c79b9f9f2469add32039dc90b96e5e4b0510d96ad8ea62a21b2b7b17536efa9ab633db17c16011350a5499a49d6479b65f2f5d7f676529be45ec778389
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5830e40ff1bfb00c5e41d4b8894f23979
SHA10416b2af3ef1691c82a3e78c67735a3a8b9efa06
SHA256409002e58ed15985345c5a07e4b79d2e3a2d9acc1208c48307bc49e99fbeee92
SHA512e19c3ccd069054c85c4ab599d612cfe4a5e082d08e5bb35d674ab8930bb25d12c4d56458620de56eeddd949c22a0123ee13cff3f6abb54d235f755e5175d4c00
-
Filesize
5.9MB
MD5576e1c153e9a4c8db9cb845a7679bfcc
SHA17fa5235289c1eb038774cdcf30be21cb72771201
SHA256da54941bc273cb5ea3c50a3df7983f6560114d0e9f6fe196a2077e3810f561dd
SHA512a4d956c4c860ba9b652647c4fd94ba0a617d1ec3436a8fe267292d36b38805acc4f484aa65e9c45e20c10536365a13645d25acbdc4c23e7506829a6f603820af
-
Filesize
5.5MB
MD53191d6165056c1d4283c23bc0b6a0785
SHA1d072084d2cac90facdf6ee9363c71a79ff001016
SHA256cbd127eca5601ef7b8f7bec72e73cf7ae1386696c68af83a252c947559513791
SHA512ac0fa1c6e8192395ec54f301bc9294c2a13cb50698d79d1ca32db9d4deb4852e7607032733d721bc5c9fd8d1ce5610dd73b30b66e0302141377f263a3b7fa0f3
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
1.9MB
MD54068c0803b559c904b34b910d8d9ef86
SHA1e2cc27330b08ccf77a2affb4d60866d8fc3e3f9b
SHA25670dabd28c39071fb7ec71ef07a604d8a7388af14a23f1ed7a14868986fb2d70d
SHA51287d9907a284202b0cf3383810593ed66775fd695aa43793a185e1e23ce611336e9936b27a4b387b36a47c8659c75d4a217a7f2d4498b1e42170d0109292825c7