Analysis
-
max time kernel
1799s -
max time network
1800s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
waveinstaller official.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
waveinstaller official.exe
Resource
win10v2004-20240802-en
General
-
Target
waveinstaller official.exe
-
Size
1.5MB
-
MD5
c822ab5332b11c9185765b157d0b6e17
-
SHA1
7fe909d73a24ddd87171896079cceb8b03663ad4
-
SHA256
344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a
-
SHA512
a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d
-
SSDEEP
24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
setup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\127.0.2651.105\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
waveinstaller official.exeWaveBootstrapper.exeWaveBootstrapper.exeWaveBootstrapper.exeWaveWindows.exeMicrosoftEdgeUpdate.exeWaveWindows.exeBloxstrap.exeWaveWindows.exeWaveBootstrapper.exeWaveWindows.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation waveinstaller official.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WaveBootstrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WaveBootstrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WaveBootstrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Bloxstrap.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WaveBootstrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WaveWindows.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 55 IoCs
Processes:
RobloxPlayerInstaller.exeMicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_127.0.2651.105.exesetup.exesetup.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeWaveBootstrapper.exeWaveWindows.exenode.exeBloxstrap.exeMicrosoftEdgeUpdateSetup_X86_1.3.195.15.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_127.0.2651.105.exesetup.exesetup.exesetup.exesetup.exesetup.exesetup.exeMicrosoftEdgeUpdate.exeWaveBootstrapper.exeWaveWindows.exenode.exeWaveBootstrapper.exeWaveWindows.exenode.exeRobloxPlayerBeta.exeautoruns.exeWaveBootstrapper.exeWaveWindows.exenode.exepid process 2356 RobloxPlayerInstaller.exe 1996 MicrosoftEdgeWebview2Setup.exe 220 MicrosoftEdgeUpdate.exe 2228 MicrosoftEdgeUpdate.exe 2384 MicrosoftEdgeUpdate.exe 2636 MicrosoftEdgeUpdateComRegisterShell64.exe 5008 MicrosoftEdgeUpdateComRegisterShell64.exe 2164 MicrosoftEdgeUpdateComRegisterShell64.exe 392 MicrosoftEdgeUpdate.exe 628 MicrosoftEdgeUpdate.exe 4840 MicrosoftEdgeUpdate.exe 180 MicrosoftEdgeUpdate.exe 2476 MicrosoftEdge_X64_127.0.2651.105.exe 1364 setup.exe 4808 setup.exe 4836 MicrosoftEdgeUpdate.exe 2752 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 3164 MicrosoftEdgeUpdate.exe 2944 MicrosoftEdgeUpdate.exe 1784 WaveBootstrapper.exe 3820 WaveWindows.exe 2108 node.exe 2268 Bloxstrap.exe 4248 MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe 1256 MicrosoftEdgeUpdate.exe 1236 MicrosoftEdgeUpdate.exe 2428 MicrosoftEdgeUpdate.exe 3432 MicrosoftEdgeUpdate.exe 116 MicrosoftEdgeUpdateComRegisterShell64.exe 4028 MicrosoftEdgeUpdateComRegisterShell64.exe 4476 MicrosoftEdgeUpdateComRegisterShell64.exe 5060 MicrosoftEdgeUpdate.exe 1828 MicrosoftEdgeUpdate.exe 5576 MicrosoftEdgeUpdate.exe 5724 MicrosoftEdgeUpdate.exe 6056 MicrosoftEdge_X64_127.0.2651.105.exe 5624 setup.exe 2328 setup.exe 4464 setup.exe 5848 setup.exe 6792 setup.exe 1888 setup.exe 2400 MicrosoftEdgeUpdate.exe 6228 WaveBootstrapper.exe 1100 WaveWindows.exe 7100 node.exe 1164 WaveBootstrapper.exe 2304 WaveWindows.exe 1448 node.exe 6960 RobloxPlayerBeta.exe 5184 autoruns.exe 6248 WaveBootstrapper.exe 6092 WaveWindows.exe 6968 node.exe -
Loads dropped DLL 40 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeRobloxPlayerBeta.exepid process 220 MicrosoftEdgeUpdate.exe 2228 MicrosoftEdgeUpdate.exe 2384 MicrosoftEdgeUpdate.exe 2636 MicrosoftEdgeUpdateComRegisterShell64.exe 2384 MicrosoftEdgeUpdate.exe 5008 MicrosoftEdgeUpdateComRegisterShell64.exe 2384 MicrosoftEdgeUpdate.exe 2164 MicrosoftEdgeUpdateComRegisterShell64.exe 2384 MicrosoftEdgeUpdate.exe 392 MicrosoftEdgeUpdate.exe 628 MicrosoftEdgeUpdate.exe 4840 MicrosoftEdgeUpdate.exe 4840 MicrosoftEdgeUpdate.exe 628 MicrosoftEdgeUpdate.exe 180 MicrosoftEdgeUpdate.exe 4836 MicrosoftEdgeUpdate.exe 2752 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 3164 MicrosoftEdgeUpdate.exe 2944 MicrosoftEdgeUpdate.exe 2944 MicrosoftEdgeUpdate.exe 3164 MicrosoftEdgeUpdate.exe 1256 MicrosoftEdgeUpdate.exe 1236 MicrosoftEdgeUpdate.exe 2428 MicrosoftEdgeUpdate.exe 3432 MicrosoftEdgeUpdate.exe 116 MicrosoftEdgeUpdateComRegisterShell64.exe 3432 MicrosoftEdgeUpdate.exe 4028 MicrosoftEdgeUpdateComRegisterShell64.exe 3432 MicrosoftEdgeUpdate.exe 4476 MicrosoftEdgeUpdateComRegisterShell64.exe 3432 MicrosoftEdgeUpdate.exe 5060 MicrosoftEdgeUpdate.exe 1828 MicrosoftEdgeUpdate.exe 5576 MicrosoftEdgeUpdate.exe 5576 MicrosoftEdgeUpdate.exe 1828 MicrosoftEdgeUpdate.exe 5724 MicrosoftEdgeUpdate.exe 2400 MicrosoftEdgeUpdate.exe 6960 RobloxPlayerBeta.exe -
Checks for any installed AV software in registry 1 TTPs 20 IoCs
Processes:
WaveWindows.exeWaveWindows.exeWaveWindows.exeWaveWindows.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\LastUsername WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\Session WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\LastUsername WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\Session WaveWindows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\LastUsername = "test999" WaveWindows.exe Key queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\Session WaveWindows.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\KasperskyLab WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\LastUsername WaveWindows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\LastUsername = "test9899" WaveWindows.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\KasperskyLab WaveWindows.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\KasperskyLab WaveWindows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\Session = "Bearer 4e2fec33-d312-46c2-bc0a-e99b5942cf27" WaveWindows.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\KasperskyLab WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\LastUsername WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\Session WaveWindows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\LastUsername = "test9899" WaveWindows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab\Session = "Bearer 4c79a56d-c18d-42ef-a6bb-d13f7719fd64" WaveWindows.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\KasperskyLab WaveWindows.exe Key queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\KasperskyLab WaveWindows.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
RobloxPlayerInstaller.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
WaveWindows.exeWaveWindows.exeWaveWindows.exedescription ioc process File opened (read-only) \??\E: WaveWindows.exe File opened (read-only) \??\E: WaveWindows.exe File opened (read-only) \??\S: WaveWindows.exe File opened (read-only) \??\J: WaveWindows.exe File opened (read-only) \??\Z: WaveWindows.exe File opened (read-only) \??\A: WaveWindows.exe File opened (read-only) \??\H: WaveWindows.exe File opened (read-only) \??\V: WaveWindows.exe File opened (read-only) \??\X: WaveWindows.exe File opened (read-only) \??\V: WaveWindows.exe File opened (read-only) \??\B: WaveWindows.exe File opened (read-only) \??\G: WaveWindows.exe File opened (read-only) \??\Y: WaveWindows.exe File opened (read-only) \??\L: WaveWindows.exe File opened (read-only) \??\O: WaveWindows.exe File opened (read-only) \??\A: WaveWindows.exe File opened (read-only) \??\W: WaveWindows.exe File opened (read-only) \??\Y: WaveWindows.exe File opened (read-only) \??\R: WaveWindows.exe File opened (read-only) \??\V: WaveWindows.exe File opened (read-only) \??\I: WaveWindows.exe File opened (read-only) \??\N: WaveWindows.exe File opened (read-only) \??\G: WaveWindows.exe File opened (read-only) \??\A: WaveWindows.exe File opened (read-only) \??\L: WaveWindows.exe File opened (read-only) \??\N: WaveWindows.exe File opened (read-only) \??\K: WaveWindows.exe File opened (read-only) \??\U: WaveWindows.exe File opened (read-only) \??\P: WaveWindows.exe File opened (read-only) \??\X: WaveWindows.exe File opened (read-only) \??\E: WaveWindows.exe File opened (read-only) \??\G: WaveWindows.exe File opened (read-only) \??\W: WaveWindows.exe File opened (read-only) \??\B: WaveWindows.exe File opened (read-only) \??\O: WaveWindows.exe File opened (read-only) \??\S: WaveWindows.exe File opened (read-only) \??\U: WaveWindows.exe File opened (read-only) \??\S: WaveWindows.exe File opened (read-only) \??\B: WaveWindows.exe File opened (read-only) \??\M: WaveWindows.exe File opened (read-only) \??\M: WaveWindows.exe File opened (read-only) \??\K: WaveWindows.exe File opened (read-only) \??\R: WaveWindows.exe File opened (read-only) \??\P: WaveWindows.exe File opened (read-only) \??\N: WaveWindows.exe File opened (read-only) \??\T: WaveWindows.exe File opened (read-only) \??\M: WaveWindows.exe File opened (read-only) \??\O: WaveWindows.exe File opened (read-only) \??\T: WaveWindows.exe File opened (read-only) \??\Q: WaveWindows.exe File opened (read-only) \??\P: WaveWindows.exe File opened (read-only) \??\Q: WaveWindows.exe File opened (read-only) \??\Z: WaveWindows.exe File opened (read-only) \??\I: WaveWindows.exe File opened (read-only) \??\K: WaveWindows.exe File opened (read-only) \??\U: WaveWindows.exe File opened (read-only) \??\J: WaveWindows.exe File opened (read-only) \??\Q: WaveWindows.exe File opened (read-only) \??\I: WaveWindows.exe File opened (read-only) \??\L: WaveWindows.exe File opened (read-only) \??\H: WaveWindows.exe File opened (read-only) \??\T: WaveWindows.exe File opened (read-only) \??\Y: WaveWindows.exe File opened (read-only) \??\H: WaveWindows.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
setup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 485 raw.githubusercontent.com 486 raw.githubusercontent.com 487 raw.githubusercontent.com 384 raw.githubusercontent.com 385 raw.githubusercontent.com 483 raw.githubusercontent.com -
Checks system information in the registry 2 TTPs 26 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 3 IoCs
Processes:
chrome.exesetup.exedescription ioc process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 3 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 2752 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 57 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
Processes:
RobloxPlayerInstaller.exesetup.exesetup.exeMicrosoftEdge_X64_127.0.2651.105.exeMicrosoftEdgeUpdateSetup_X86_1.3.195.15.exeMicrosoftEdgeWebview2Setup.exedescription ioc process File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\Debugger\Breakpoints\server.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\LegacyRbxGui\PlankSide.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\Settings\Players\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\PlatformContent\pc\textures\water\normal_21.dds RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\prefs_enclave_x64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\show_third_party_software_licenses.bat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\identity_proxy\dev.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\fonts\DenkOne-Regular.ttf RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\Controls\XboxController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\LegacyRbxGui\PlasticBlueTop.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\VoiceChat\SpeakerNew\Unmuted0.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\VR\Radial\Icons\Backpack.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\LuaApp\icons\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\Locales\az.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\sky\cloudsfb.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\localizationTestingIcon.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\StudioSharedUI\DEPRECATED_pending_withbg.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\VoiceChat\MicDark\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\SETUP.EX_ MicrosoftEdge_X64_127.0.2651.105.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\Locales\ug.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\fonts\Kalam-Regular.ttf RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\StudioToolbox\AssetPreview\ReadyforSale.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\AvatarExperience\Avatar1_PPEButton.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\AvatarExperience\CenterPoint.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EU6D3D.tmp\msedgeupdateres_ru.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\Locales\nb.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\Debugger\Breakpoints\filter.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\DeveloperFramework\close.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\Controls\PlayStationController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\identity_proxy\dev.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.105\identity_proxy\win11\identity_helper.Sparse.Stable.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\Locales\et.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\MaterialGenerator\Materials\Snow.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\InspectMenu\gr-item-selector.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\Settings\Slider\Right.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\PlatformContent\pc\textures\water\normal_04.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\psuser_arm64.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\AvatarEditorImages\Stretch\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\particles\explosion01_smoke_alpha.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\TouchControlsSheet.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\identity_helper.exe setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\StudioToolbox\AudioPreview\pause.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\SearchIcon.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\Settings\Help\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\Gamepad\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\Trust Protection Lists\Mu\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\MEIPreload\manifest.json setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\LuaChat\9-slice\input-send-message.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\9SliceEditor\HorizontalDragger.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\AnimationEditor\button_control_previous.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\MaterialManager\Favorite-Filled.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\MaterialManager\List_LT.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\PathEditor\Control_Point_Selected.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\TerrainTools\icon_flatten_grow.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\Slider-BKG-Left-Cap.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\ImageSet\AE\img_set_2x_4.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\LuaApp\graphic\noconnection.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\Locales\mk.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\content\textures\ui\TopBar\[email protected] RobloxPlayerInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3988 3820 WerFault.exe WaveWindows.exe 5692 1100 WerFault.exe WaveWindows.exe 5304 2304 WerFault.exe WaveWindows.exe -
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeWaveBootstrapper.exeWaveWindows.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exewaveinstaller official.exeWaveBootstrapper.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeWebview2Setup.exeWaveWindows.exeautoruns.exeWaveWindows.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeWaveWindows.exeRobloxPlayerInstaller.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateSetup_X86_1.3.195.15.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeWaveBootstrapper.exeWaveBootstrapper.exeMicrosoftEdgeUpdate.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaveBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaveWindows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waveinstaller official.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaveBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaveWindows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoruns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaveWindows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaveWindows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaveBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaveBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exepid process 4836 MicrosoftEdgeUpdate.exe 1256 MicrosoftEdgeUpdate.exe 5060 MicrosoftEdgeUpdate.exe 5724 MicrosoftEdgeUpdate.exe 2400 MicrosoftEdgeUpdate.exe 392 MicrosoftEdgeUpdate.exe 180 MicrosoftEdgeUpdate.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
chrome.exeRobloxPlayerInstaller.exemsedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
setup.exeRobloxPlayerInstaller.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\127.0.2651.105\\BHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\127.0.2651.105\\BHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exesetup.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeRobloxPlayerInstaller.exesetup.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine.1.0\ = "Microsoft Edge Update CredentialDialog" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\ = "URL: Roblox Protocol" RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\AppUserModelId = "MSEdge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ = "IAppCommand" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback\CurVer\ = "MicrosoftEdgeUpdate.Update3WebMachineFallback.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.15\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ = "IGoogleUpdate3WebSecurity" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\URL Protocol RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ = "IAppBundleWeb" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\.htm setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3D94CEB-EC11-46BE-8872-7DDCE37FABFA} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods\ = "43" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback\CurVer\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\LocalService = "edgeupdatem" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{375D3B39-152A-41E1-BF1B-B648933F26D0} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ProgID\ = "MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ = "IPolicyStatus2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods\ = "5" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\CLSID\ = "{77857D02-7A25-4B67-9266-3E122A8F39E4}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ = "IAppCommand" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.html\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe -
Processes:
autoruns.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a autoruns.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 autoruns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 autoruns.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 autoruns.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 19000000010000001000000045ed9bbc5e43d3b9ecd63c060db78e5c03000000010000001400000002faf3e291435468607857694df5e45b6885186868000000010000000800000000409120d035d9017e0000000100000008000000000063f58926d7011d000000010000001000000006f9583c00a763c23fb9e065a3366d55140000000100000014000000adbd987a34b426f7fac42654ef03bde024cb541a620000000100000020000000687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff20b00000001000000260000005300650063007400690067006f0020002800410064006400540072007500730074002900000053000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000001400000009b9105c5bba24343ca7f341c624e183f6ee7c1b20000000010000003a040000308204363082031ea003020102020101300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3030303533303130343833385a170d3230303533303130343833385a306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad7056c7f04f3fe8329e74cac89054e9c65f0f789d9a403c0eac61aa5e148f9e87a16a50dcd79a4eaf05b3a671949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a471306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74820101300d06092a864886f70d01010505000382010100b09be08525c2d623e20f9606929d41989cd9847981d91e5b14072336658fb0d877bbac416c47608351b0f9323de7fcf62613c78016a5bf5afc87cf787989219ae24c070a8635bcf2de51c4d296b7dc7e4eee70fd1c39eb0c0251142d8ebd16e0c1df4675e724adecf442b48593701067ba9d06354a18d32b7acc5142a17a63d1e6bba1c52bc236be130de6bd637e797ba7090d40ab6add8f8ac3f6f68c1a420551d445f59fa76221681520433c99e77cbd24d8a9911773883f561b313818b4710f9acdc80e9e8e2e1be18c9883cb1f31f1444cc604734976600fc7f8bd17806b2ee9cc4c0e5a9a790f200a2ed59e63261e559294d882175a7bd0bcc78f4e8604 autoruns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 autoruns.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
chrome.exeRobloxPlayerInstaller.exeMicrosoftEdgeUpdate.exechrome.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeWaveWindows.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeBloxstrap.exemsedge.exemsedge.exeidentity_helper.exemsedge.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeWaveWindows.exeWaveWindows.exeRobloxPlayerBeta.exeWaveWindows.exepid process 872 chrome.exe 872 chrome.exe 872 chrome.exe 2356 RobloxPlayerInstaller.exe 2356 RobloxPlayerInstaller.exe 220 MicrosoftEdgeUpdate.exe 220 MicrosoftEdgeUpdate.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 220 MicrosoftEdgeUpdate.exe 220 MicrosoftEdgeUpdate.exe 220 MicrosoftEdgeUpdate.exe 220 MicrosoftEdgeUpdate.exe 2752 RobloxPlayerBeta.exe 2752 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 3164 MicrosoftEdgeUpdate.exe 3164 MicrosoftEdgeUpdate.exe 3164 MicrosoftEdgeUpdate.exe 3164 MicrosoftEdgeUpdate.exe 3820 WaveWindows.exe 3820 WaveWindows.exe 3820 WaveWindows.exe 2944 MicrosoftEdgeUpdate.exe 2944 MicrosoftEdgeUpdate.exe 1236 MicrosoftEdgeUpdate.exe 1236 MicrosoftEdgeUpdate.exe 2268 Bloxstrap.exe 2268 Bloxstrap.exe 5140 msedge.exe 5140 msedge.exe 3144 msedge.exe 3144 msedge.exe 2968 identity_helper.exe 2968 identity_helper.exe 7128 msedge.exe 7128 msedge.exe 7128 msedge.exe 7128 msedge.exe 1828 MicrosoftEdgeUpdate.exe 1828 MicrosoftEdgeUpdate.exe 1828 MicrosoftEdgeUpdate.exe 1828 MicrosoftEdgeUpdate.exe 5576 MicrosoftEdgeUpdate.exe 5576 MicrosoftEdgeUpdate.exe 1100 WaveWindows.exe 1100 WaveWindows.exe 2304 WaveWindows.exe 2304 WaveWindows.exe 6960 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe 6092 WaveWindows.exe 6092 WaveWindows.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
chrome.exeautoruns.exepid process 872 chrome.exe 5184 autoruns.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 36 IoCs
Processes:
chrome.exemsedge.exepid process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exeBloxstrap.exemsedge.exepid process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 2268 Bloxstrap.exe 2268 Bloxstrap.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
node.exenode.exeautoruns.exenode.exepid process 7100 node.exe 1448 node.exe 5184 autoruns.exe 5184 autoruns.exe 6968 node.exe -
Suspicious use of UnmapMainImage 3 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 2752 RobloxPlayerBeta.exe 1040 RobloxPlayerBeta.exe 6960 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 872 wrote to memory of 2924 872 chrome.exe chrome.exe PID 872 wrote to memory of 2924 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3104 872 chrome.exe chrome.exe PID 872 wrote to memory of 3844 872 chrome.exe chrome.exe PID 872 wrote to memory of 3844 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe PID 872 wrote to memory of 3468 872 chrome.exe chrome.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
setup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\waveinstaller official.exe"C:\Users\Admin\AppData\Local\Temp\waveinstaller official.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Checks for any installed AV software in registry
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Luau Language Server\node.exe"C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=38204⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/pizzaboxer/bloxstrap/issues5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa453a46f8,0x7ffa453a4708,0x7ffa453a47186⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:26⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2416 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10690802163700572463,17020234949649400164,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:26⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 61724⤵
- Program crash
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffa5791cc40,0x7ffa5791cc4c,0x7ffa5791cc582⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1808 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2188,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2240 /prefetch:32⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2268 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3340,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3444 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4608,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4560 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4040,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4696 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4704,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4900 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5088,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4728 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3480,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5108 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5312,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3388 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3384,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5192 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5316,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5540 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5680,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5532 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5208,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5184 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5716,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5636 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=4412,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5756 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5900,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6044 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5744,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5796 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5924,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5692 /prefetch:82⤵
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NzJDMjg0RDMtNEMwNS00MkY0LTgxNUYtNUQzNUExNjMyM0JGfSIgdXNlcmlkPSJ7RUIyQzI0Q0MtMERBQi00NUZBLTgzNjMtMUYxRTYxREU5OUNCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntEOEQ0QzkyMC1GNkIyLTRCODMtQjYxNi0wQjdBNEIyNUUwMzB9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-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⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{72C284D3-4C05-42F4-815F-5D35A16323BF}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
-
C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\RobloxPlayerBeta.exe" -app -isInstallerLaunch -clientLaunchTimeEpochMs 03⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5476,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6152,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5524 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=1308,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5456 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6076,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5840 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6084,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6164 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=5644,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6448 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=5920,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6468 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=5272,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5828 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=5232,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5156 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=4568,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5164 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=3200,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4088 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=5536,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3444 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=6060,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6024 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=4724,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=484 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=5824,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5252 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=4612,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4024 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=6104,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6460 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=6436,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6484 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=6492,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3468 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=6584,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6600 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6656,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6676 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=6304,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6524 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6972,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7004 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6944,i,12155146689071117943,4859823481926062450,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3068 /prefetch:82⤵
-
C:\Users\Admin\Downloads\autoruns.exe"C:\Users\Admin\Downloads\autoruns.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NzJDMjg0RDMtNEMwNS00MkY0LTgxNUYtNUQzNUExNjMyM0JGfSIgdXNlcmlkPSJ7RUIyQzI0Q0MtMERBQi00NUZBLTgzNjMtMUYxRTYxREU5OUNCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntBMzRDQjNBNC1GMzU0LTQ0RjYtQjk2RS0zMjZFQzZGMDI3OTF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEwMjY1Mzk2MTEwIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{87F4DEC8-8839-4DC0-B07A-168F9820BD73}\MicrosoftEdge_X64_127.0.2651.105.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{87F4DEC8-8839-4DC0-B07A-168F9820BD73}\MicrosoftEdge_X64_127.0.2651.105.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{87F4DEC8-8839-4DC0-B07A-168F9820BD73}\EDGEMITMP_AC9E6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{87F4DEC8-8839-4DC0-B07A-168F9820BD73}\EDGEMITMP_AC9E6.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{87F4DEC8-8839-4DC0-B07A-168F9820BD73}\MicrosoftEdge_X64_127.0.2651.105.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{87F4DEC8-8839-4DC0-B07A-168F9820BD73}\EDGEMITMP_AC9E6.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{87F4DEC8-8839-4DC0-B07A-168F9820BD73}\EDGEMITMP_AC9E6.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{87F4DEC8-8839-4DC0-B07A-168F9820BD73}\EDGEMITMP_AC9E6.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.105 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff67423b7d0,0x7ff67423b7dc,0x7ff67423b7e84⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NzJDMjg0RDMtNEMwNS00MkY0LTgxNUYtNUQzNUExNjMyM0JGfSIgdXNlcmlkPSJ7RUIyQzI0Q0MtMERBQi00NUZBLTgzNjMtMUYxRTYxREU5OUNCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InswQTMzMjIwOS04RUMzLTQyRjAtQTc1Qy1FNDQ1NDJBODk2RUV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-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-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDkzODY0NjI4NyIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjQ3NiIgZG93bmxvYWRfdGltZV9tcz0iMjAzNjYiIGRvd25sb2FkZWQ9IjE3MjYxMjY2NCIgdG90YWw9IjE3MjYxMjY2NCIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iNDQ1NDUiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{33486CE8-7677-49A8-81C0-7B4C0D620871}\MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{33486CE8-7677-49A8-81C0-7B4C0D620871}\MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exe" /update /sessionid "{D67117A1-6776-41EE-B03E-2905069E4C73}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
-
C:\Program Files (x86)\Microsoft\Temp\EU6D3D.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU6D3D.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{D67117A1-6776-41EE-B03E-2905069E4C73}"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RDY3MTE3QTEtNjc3Ni00MUVFLUIwM0UtMjkwNTA2OUU0QzczfSIgdXNlcmlkPSJ7RUIyQzI0Q0MtMERBQi00NUZBLTgzNjMtMUYxRTYxREU5OUNCfSIgaW5zdGFsbHNvdXJjZT0ic2VsZnVwZGF0ZSIgcmVxdWVzdGlkPSJ7NTVBQzIwQUMtMUI4Ni00M0ExLThEMzAtQ0ZEQkVGMTg2OURFfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjE1IiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMTUiIGluc3RhbGxkYXRldGltZT0iMTcyMjYwMTc1NSI-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTM4NDYyMjg2MTgiLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RDY3MTE3QTEtNjc3Ni00MUVFLUIwM0UtMjkwNTA2OUU0QzczfSIgdXNlcmlkPSJ7RUIyQzI0Q0MtMERBQi00NUZBLTgzNjMtMUYxRTYxREU5OUNCfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins5ODUyQjg2Qy03OTBDLTQ2OTYtQjk2Ny1FQTcwODU0MjI4MEJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE3MS4zOSIgbmV4dHZlcnNpb249IjEuMy4xOTUuMTUiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iSXNPbkludGVydmFsQ29tbWFuZHNBbGxvd2VkPSU1QiUyMi10YXJnZXRfZGV2JTIyJTVEIiBpbnN0YWxsYWdlPSIxNSI-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⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxNSIgaW5zdGFsbGRhdGV0aW1lPSIxNzIyNjAyNjYyIiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNjcwNzUyODYxNDQyNzM1Ij48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjExNDMyNSIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTcwMzc4OTcxMDMiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\MicrosoftEdge_X64_127.0.2651.105.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\MicrosoftEdge_X64_127.0.2651.105.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\MicrosoftEdge_X64_127.0.2651.105.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.105 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff62e65b7d0,0x7ff62e65b7dc,0x7ff62e65b7e84⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.105 --initial-client-data=0x234,0x238,0x23c,0x1f0,0x240,0x7ff62e65b7d0,0x7ff62e65b7dc,0x7ff62e65b7e85⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.105\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.105\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.105\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.105\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.105\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.105 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff68371b7d0,0x7ff68371b7dc,0x7ff68371b7e85⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7ODkwN0VGNjEtOTUxNC00MkY3LTgxODItOTk2Qzc5RDEyRTFEfSIgdXNlcmlkPSJ7RUIyQzI0Q0MtMERBQi00NUZBLTgzNjMtMUYxRTYxREU5OUNCfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InsyNTYwNjQ4RS03RkJELTQ1RTItQjZFMS04MUU2OEE2Q0JFQkR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-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-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-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-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x33c 0x2fc1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3820 -ip 38201⤵
-
C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks for any installed AV software in registry
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Luau Language Server\node.exe"C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=11003⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 57763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1100 -ip 11001⤵
-
C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks for any installed AV software in registry
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Luau Language Server\node.exe"C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=23043⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 56643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2304 -ip 23041⤵
-
C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
-
C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Luau Language Server\node.exe"C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=60923⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Image File Execution Options Injection
1Component Object Model Hijacking
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Image File Execution Options Injection
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Discovery
Query Registry
6System Information Discovery
6Software Discovery
1Security Software Discovery
1Peripheral Device Discovery
1Browser Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.105\Installer\setup.exeFilesize
6.6MB
MD596937bb70ddb5b3a89651ad8391ce5a1
SHA13d5ee58c00667b4dc63da7205c20b1c335c3efce
SHA25660ae19e62277efd9bbdc93ccc5fa8b4bc1f8f6537115d4a7e8e8df3c2014315b
SHA512d3b1c07157817bfbcaee4bf196a3743dc177470f82880d5bfdd5fce573434a652f7da5f1dbc40a086e0cc6bb9ae4bdb4f8ce86985c8dc01923418724caab6c0e
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.195.15\MicrosoftEdgeUpdateSetup_X86_1.3.195.15.exeFilesize
1.6MB
MD590decc230b529e4fd7e5fa709e575e76
SHA1aa48b58cf2293dad5854431448385e583b53652c
SHA25691f0deec7d7319e57477b74a7a5f4d17c15eb2924b53e05a5998d67ecc8201f2
SHA51215c0c5ef077d5aca08c067afbc8865ad267abd7b82049655276724bce7f09c16f52d13d69d1449888d8075e13125ff8f880a0d92adc9b65a5171740a7c72df03
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0DDDDD37-5F38-4D55-987E-CB282270F805}\EDGEMITMP_8462A.tmp\SETUP.EX_Filesize
2.6MB
MD52a255091a179efac806b9b5b52b6d54e
SHA1474bcf1cfa0e02e826df9adb957a8a0d6c07f552
SHA2563b9e0929633535052ee4fbf3654b15a3e8274ab7ab7cdd5ee6e89344628cc61a
SHA5129e9a351d1b2cbeab680477d62c45b0a11a89d33c8cb6027c0da3fb7a104fda3216c26750d03ab649d4ccc5abcd761c9d50be6f6af1872057e3de92907403c992
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\EdgeUpdate.datFilesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\MicrosoftEdgeComRegisterShellARM64.exeFilesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\MicrosoftEdgeUpdateComRegisterShell64.exeFilesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\MicrosoftEdgeUpdateCore.exeFilesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\NOTICE.TXTFilesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdate.dllFilesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_af.dllFilesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_am.dllFilesize
24KB
MD5f6c1324070b6c4e2a8f8921652bfbdfa
SHA1988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf
SHA256986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717
SHA51263092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_ar.dllFilesize
26KB
MD5570efe7aa117a1f98c7a682f8112cb6d
SHA1536e7c49e24e9aa068a021a8f258e3e4e69fa64f
SHA256e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01
SHA5125e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_as.dllFilesize
28KB
MD5a8d3210e34bf6f63a35590245c16bc1b
SHA1f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693
SHA2563b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766
SHA5126e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_az.dllFilesize
29KB
MD57937c407ebe21170daf0975779f1aa49
SHA14c2a40e76209abd2492dfaaf65ef24de72291346
SHA2565ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9
SHA5128670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_bg.dllFilesize
29KB
MD58375b1b756b2a74a12def575351e6bbd
SHA1802ec096425dc1cab723d4cf2fd1a868315d3727
SHA256a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105
SHA512aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_bn-IN.dllFilesize
29KB
MD5a94cf5e8b1708a43393263a33e739edd
SHA11068868bdc271a52aaae6f749028ed3170b09cce
SHA2565b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c
SHA512920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_bn.dllFilesize
29KB
MD57dc58c4e27eaf84ae9984cff2cc16235
SHA13f53499ddc487658932a8c2bcf562ba32afd3bda
SHA256e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98
SHA512bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_bs.dllFilesize
28KB
MD5e338dccaa43962697db9f67e0265a3fc
SHA14c6c327efc12d21c4299df7b97bf2c45840e0d83
SHA25699b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04
SHA512e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_ca-Es-VALENCIA.dllFilesize
29KB
MD52929e8d496d95739f207b9f59b13f925
SHA17c1c574194d9e31ca91e2a21a5c671e5e95c734c
SHA2562726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df
SHA512ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_ca.dllFilesize
30KB
MD539551d8d284c108a17dc5f74a7084bb5
SHA16e43fc5cec4b4b0d44f3b45253c5e0b032e8e884
SHA2568dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07
SHA5126fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_cs.dllFilesize
28KB
MD516c84ad1222284f40968a851f541d6bb
SHA1bc26d50e15ccaed6a5fbe801943117269b3b8e6b
SHA256e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b
SHA512d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_cy.dllFilesize
28KB
MD534d991980016595b803d212dc356d765
SHA1e3a35df6488c3463c2a7adf89029e1dd8308f816
SHA256252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e
SHA5128a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_da.dllFilesize
28KB
MD5d34380d302b16eab40d5b63cfb4ed0fe
SHA11d3047119e353a55dc215666f2b7b69f0ede775b
SHA256fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f
SHA51245ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_de.dllFilesize
30KB
MD5aab01f0d7bdc51b190f27ce58701c1da
SHA11a21aabab0875651efd974100a81cda52c462997
SHA256061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c
SHA5125edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_el.dllFilesize
30KB
MD5ac275b6e825c3bd87d96b52eac36c0f6
SHA129e537d81f5d997285b62cd2efea088c3284d18f
SHA256223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0
SHA512bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_en-GB.dllFilesize
27KB
MD5d749e093f263244d276b6ffcf4ef4b42
SHA169f024c769632cdbb019943552bac5281d4cbe05
SHA256fd90699e7f29b6028a2e8e6f3ae82d26cdc6942bd39c4f07b221d87c5dbbfe1e
SHA51248d51b006ce0cd903154fa03d17e76591db739c4bfb64243725d21d4aa17db57a852077be00b9a51815d09664d18f9e6ad61d9bc41b3d013ed24aaec8f477ad9
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_en.dllFilesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_es-419.dllFilesize
29KB
MD528fefc59008ef0325682a0611f8dba70
SHA1f528803c731c11d8d92c5660cb4125c26bb75265
SHA25655a69ce2d6fc4109d16172ba6d9edb59dbadbc8af6746cc71dc4045aa549022d
SHA5122ec71244303beac7d5ce0905001fe5b0fb996ad1d1c35e63eecd4d9b87751f0633a281554b3f0aa02ee44b8ceaad85a671ef6c34589055797912324e48cc23ed
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_es.dllFilesize
28KB
MD59db7f66f9dc417ebba021bc45af5d34b
SHA16815318b05019f521d65f6046cf340ad88e40971
SHA256e652159a75cbab76217ecbb4340020f277175838b316b32cf71e18d83da4a819
SHA512943d8fc0d308c5ccd5ab068fc10e799b92465a22841ce700c636e7ae1c12995d99c0a93ab85c1ae27fefce869eabadbeafee0f2f5f010ad3b35fa4f748b54952
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_et.dllFilesize
28KB
MD5b78cba3088ecdc571412955742ea560b
SHA1bc04cf9014cec5b9f240235b5ff0f29dbdb22926
SHA256f0a4cfd96c85f2d98a3c9ecfadd41c0c139fdb20470c8004f4c112dd3d69e085
SHA51204c8ab8e62017df63e411a49fb6218c341672f348cb9950b1f0d2b2a48016036f395b4568da70989f038e8e28efea65ddd284dfd490e93b6731d9e3e0e0813cf
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_eu.dllFilesize
28KB
MD5a7e1f4f482522a647311735699bec186
SHA13b4b4b6e6a5e0c1981c62b6b33a0ca78f82b7bbd
SHA256e5615c838a71b533b26d308509954907bcc0eb4032cdbaa3db621eede5e6bfa4
SHA51222131600bbac8d9c2dab358e244ec85315a1aaebfc0fb62aaa1493c418c8832c3a6fbf24a6f8cf4704fdc4bc10a66c88839a719116b4a3d85264b7ad93c54d57
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_fa.dllFilesize
27KB
MD5cbe3454843ce2f36201460e316af1404
SHA10883394c28cb60be8276cb690496318fcabea424
SHA256c66c4024847d353e9985eb9b2f060b2d84f12cc77fb6479df5ffc55dbda97e59
SHA512f39e660f3bfab288871d3ec40135c16d31c6eb1a84136e065b54ff306f6f8016a788c713d4d8e46ad62e459f9073d2307a6ed650919b2dd00577bbfd04e5bd73
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_fi.dllFilesize
28KB
MD5d45f2d476ed78fa3e30f16e11c1c61ea
SHA18c8c5d5f77cd8764c4ca0c389daee89e658dfd5e
SHA256acf42b90190110ccf30bcfb2626dd999a14e42a72a3983928cba98d44f0a72e2
SHA5122a876e0313a03e75b837d43e9c5bb10fcec385fbb0638faa984ee4bb68b485b04d14c59cd4ed561aaa7f746975e459954e276e73fc3f5f4605ae7f333ce85f1b
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_fil.dllFilesize
29KB
MD57c66526dc65de144f3444556c3dba7b8
SHA16721a1f45ac779e82eecc9a584bcf4bcee365940
SHA256e622823096fc656f63d5a7bbdf3744745ef389c92ec1b804d3b874578e18c89d
SHA512dbc803c593ae0b18fd989fdc5e9e6aee8f16b893ae8d17e9d88436e2cd8cae23d06e32e4c8a8bf67fc5311b6f2a184c4e6795fed6d15b3d766ef5affc8923e2f
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_fr-CA.dllFilesize
30KB
MD5b534e068001e8729faf212ad3c0da16c
SHA1999fa33c5ea856d305cc359c18ea8e994a83f7a9
SHA256445051ef15c6c872bed6d904169793837e41029a8578eaf81d78a4641ef53511
SHA512e937d2e0f43ade3f4a5e9cdeb6dd8c8ad8b5b50a7b6b779bda727a4fe1ced93abd06720395cc69a274ce3b0f7c6b65e1eba1ecf069db64edb80d007fbb4eedbb
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_fr.dllFilesize
30KB
MD564c47a66830992f0bdfd05036a290498
SHA188b1b8faa511ee9f4a0e944a0289db48a8680640
SHA256a9b72fcb3bdb5e021b8d23b2de0caeca80ddc50420088b988a5b7503f2d7c961
SHA512426546310c12aeb80d56e6b40973a5f4dffef72e14d1ac79e3f267e4df2a0022b89e08bba8ab2ffa24f90b0c035a009bed3066201e30fe961d84ed854e48f9c5
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_ga.dllFilesize
28KB
MD53b8a5301c4cf21b439953c97bd3c441c
SHA18a7b48bb3d75279de5f5eb88b5a83437c9a2014a
SHA256abc9822ee193c9a98a21202648a48ecd69b0cb19ff31c9bbf0c79dab5f9609b0
SHA512068166cfdf879caf4e54fe43c5265a692fcaf6a9dcbf151335fd054bbec06260bc5ed489de6d46ca3fc0044bc61fa1468fea85373c6c66349620618ee869383a
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_gd.dllFilesize
30KB
MD5c90f33303c5bd706776e90c12aefabee
SHA11965550fe34b68ea37a24c8708eef1a0d561fb11
SHA256e3acc61d06942408369c85365ac0d731c5f3c9bc26e3f1e3bb24226d0879ad9c
SHA512b0c1a9d7df57d68e5daf527703f0b6154a2ef72af1a3933bda2804408f6684b5b09b822522193243fd0756f80f13d3ab0647c90d2bed1a57b4a9fea933b0aa9a
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_gl.dllFilesize
28KB
MD584a1cea9a31be831155aa1e12518e446
SHA1670f4edd4dc8df97af8925f56241375757afb3da
SHA256e4eb716f1041160fd323b0f229b88851e153025d5d79f49b7d6ecb7eb2442c57
SHA5125f1318119102fcee1c828565737ce914493ff86e2a18a94f5ff2b6b394d584ace75c37258d589cce1d5afd8e37d617168a7d7372cfd68dd6a2afcd4577a0bc51
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_gu.dllFilesize
28KB
MD5f9646357cf6ce93d7ba9cfb3fa362928
SHA1a072cc350ea8ea6d8a01af335691057132b04025
SHA256838ccd8243caa1a5d9e72eb1179ac8ae59d2acb453ed86be01e0722a8e917150
SHA512654c4a5200f20411c56c59dbb30a63bfe2da27781c081e2049b31f0371a31d679e3c9378c7eb9cf0fb9166a3f0fba33a58c3268193119b06f91bebe164a82528
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_hi.dllFilesize
28KB
MD534cbaeb5ec7984362a3dabe5c14a08ec
SHA1d88ec7ac1997b7355e81226444ec4740b69670d7
SHA256024c5eae16e45abe2237c2a5d868563550ac596f1f7d777e25234c17d9461dd9
SHA512008c8443a3e93c4643a9e8735a1c59c24ba2f7a789606a86da54c921c34cbc0cb11c88594544d8509a8e71b6a287c043b1ffe2d39b90af53b4cde3847d891ba8
-
C:\Program Files (x86)\Microsoft\Temp\EUF517.tmp\msedgeupdateres_hr.dllFilesize
29KB
MD50b475965c311203bf3a592be2f5d5e00
SHA1b5ff1957c0903a93737666dee0920b1043ddaf70
SHA25665915ad11b9457d145795a1e8d151f898ec2dcb8b136967e6592884699867eb0
SHA512bec513125f272c24477b9ddbaa5706d1e1bb958babac46829b28df99fa1dd82f3f1e3c7066dc2fe3e59118c536675a22fc2128de916ca4c478950b9992372007
-
C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exeFilesize
5.5MB
MD5658a6b0f3866e63545503fdff59d000c
SHA1e5df1309e574ee77ca1727bf64a269f376d5ebd9
SHA25661b302dcf209bd7a3288a6a9e478c6ad0a5d6b195f5328f827c938d5122f679c
SHA512bc02baab236cf4427f26dba22fd3ab977abd8df1eb7d30b20d7b36f410f70877872a85f6d7bfdccc8b53c5e2ff5a70cdd056ac133d0bb7ec5a7596fbb7144e8a
-
C:\Program Files (x86)\Roblox\Versions\version-55d6e65f478642a8\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeFilesize
1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
C:\Program Files\MsEdgeCrashpad\settings.datFilesize
280B
MD5b08b92bfd5c45a96bd4399983d71a60e
SHA16df20db15ef4f7f5d77431455187abb08afc9c65
SHA2567a95684161e193d2b9cc66a6ab24e49deec9daac1b845893b7f1219d7a2abbbc
SHA512bda0f50da7d7735bd102914a2f727bfa6e7e720538af721eb55dd84add38c210d5214fbeefec71f9ea7dba07b626d233ecf7029da8573f7f89bcb0b8e09c1d63
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
181KB
MD5ad586da8ababc7200a67862475f27dd7
SHA1712344b82a704060ee9d2e30025d2e575127d65d
SHA25683d264ccddb18238f642206d7cbea296d51cccccd97c2e961bcb3cee8b655030
SHA51224fd4f159c74c09db31ac7eaca5fe0b0d16f166ec61ecb1164d27ef679ed2eaea532c63617b7d8bebf520edb9ac1394ae4379c6b6de94efe1419190f4e0fcc9b
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exeFilesize
249KB
MD5772c9fecbd0397f6cfb3d866cf3a5d7d
SHA16de3355d866d0627a756d0d4e29318e67650dacf
SHA2562f88ea7e1183d320fb2b7483de2e860da13dc0c0caaf58f41a888528d78c809f
SHA51282048bd6e50d38a863379a623b8cfda2d1553d8141923acf13f990c7245c833082523633eaa830362a12bfff300da61b3d8b3cccbe038ce2375fdfbd20dbca31
-
C:\Users\Admin\AppData\Local\Bloxstrap\Modifications\ClientSettings\ClientAppSettings.jsonFilesize
120B
MD5636492f4af87f25c20bd34a731007d86
SHA122a5c237a739ab0df4ff87c9e3d79dbe0c89b56a
SHA25622a1e85723295eeb854345be57f7d6fb56f02b232a95d69405bf9d9e67a0fa0d
SHA512cd2e3a738f535eb1a119bd4c319555899bcd4ce1049d7f8591a1a68c26844f33c1bd1e171706533b5c36263ade5e275b55d40f5710e0210e010925969182cd0c
-
C:\Users\Admin\AppData\Local\Bloxstrap\Modifications\content\sounds\ouch.oggFilesize
6KB
MD59404c52d6f311da02d65d4320bfebb59
SHA10b5b5c2e7c631894953d5828fec06bdf6adba55f
SHA256c9775e361392877d1d521d0450a5368ee92d37dc542bc5e514373c9d5003f317
SHA51222aa1acbcdcf56f571170d9c32fd0d025c50936387203a7827dbb925f352d2bc082a8a79db61c2d1f1795ad979e93367c80205d9141b73d806ae08fa089837c4
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\LuaApp\graphic\shimmer_lightTheme.pngFilesize
20KB
MD54f8f43c5d5c2895640ed4fdca39737d5
SHA1fb46095bdfcab74d61e1171632c25f783ef495fa
SHA256fc57f32c26087eef61b37850d60934eda1100ca8773f08e487191a74766053d1
SHA5127aebc0f79b2b23a76fb41df8bab4411813ffb1abc5e2797810679c0eaa690e7af7561b8473405694bd967470be337417fa42e30f0318acbf171d8f31620a31aa
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\LuaApp\graphic\[email protected]Filesize
71KB
MD53fec0191b36b9d9448a73ff1a937a1f7
SHA1bee7d28204245e3088689ac08da18b43eae531ba
SHA2561a03e6f6a0de045aa588544c392d671c040b82a5598b4246af04f5a74910dc89
SHA512a8ab2bc2d937963af36d3255c6ea09cae6ab1599996450004bb18e8b8bdfbdde728821ac1662d8a0466680679011d8f366577b143766838fe91edf08a40353ce
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\ExtraContent\textures\ui\LuaDiscussions\buttonFill.pngFilesize
247B
MD581ce54dfd6605840a1bd2f9b0b3f807d
SHA14a3a4c05b9c14c305a8bb06c768abc4958ba2f1c
SHA2560a6a5cafb4dee0d8c1d182ddec9f68ca0471d7fc820cf8dc2d68f27a35cd3386
SHA51257069c8ac03dd0fdfd97e2844c19138800ff6f7d508c26e5bc400b30fe78baa0991cc39f0f86fa10cd5d12b6b11b0b09c1a770e5cb2fdca157c2c8986a09e5ff
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\configs\DateTimeLocaleConfigs\zh-hans.jsonFilesize
2KB
MD5fb6605abd624d1923aef5f2122b5ae58
SHA16e98c0a31fa39c781df33628b55568e095be7d71
SHA2567b993133d329c46c0c437d985eead54432944d7b46db6ad6ea755505b8629d00
SHA51297a14eda2010033265b379aa5553359293baf4988a4cdde8a40b0315e318a7b30feee7f5e14c68131e85610c00585d0c67e636999e3af9b5b2209e1a27a82223
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\configs\DateTimeLocaleConfigs\zh-tw.jsonFilesize
2KB
MD5702c9879f2289959ceaa91d3045f28aa
SHA1775072f139acc8eafb219af355f60b2f57094276
SHA256a92a6988175f9c1d073e4b54bf6a31f9b5d3652eebdf6a351fb5e12bda76cbd5
SHA512815a6bef134c0db7a5926f0cf4b3f7702d71b0b2f13eca9539cd2fc5a61eea81b1884e4c4bc0b3398880589bff809ac8d5df833e7e4aeda4a1244e9a875d1e97
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\Cursors\KeyboardMouse\IBeamCursor.pngFilesize
292B
MD5464c4983fa06ad6cf235ec6793de5f83
SHA18afeb666c8aee7290ab587a2bfb29fc3551669e8
SHA25699fd7f104948c6ab002d1ec69ffd6c896c91f9accc499588df0980b4346ecbed
SHA512f805f5f38535fe487b899486c8de6cf630114964e2c3ebc2af7152a82c6f6faef681b4d936a1867b5dff6566b688b5c01105074443cc2086b3fe71f7e6e404b1
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\DeveloperFramework\PageNavigation\button_control_next.pngFilesize
1KB
MD534a4a4801e02097cef3e46e6b9c67c41
SHA12f271ae04352f39bb72c677a16da03f19a51f672
SHA2567ca0bdacdebc16eace9d67078a5ecbc8d9f6098fad80e0d8c09fb5f708ad389b
SHA51287a29f06c2539a6df2f043fbee747812f0672a9a6a97df906d8a38b9ede7a7e7ad2a61850888e39ad6b45f422680f4c89cc40c3724b1b4a0312dde8c35ed2a75
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\DeveloperFramework\PageNavigation\button_control_previous.pngFilesize
1KB
MD56e8a105456aaf54799b1ae4c90000ff1
SHA15a9a277b6ef822caaede13b34c222fb69451c141
SHA256fac4a9e1c49c9f3fc07dbce40f4648987cf90f4c2ed0a96827630341621e9845
SHA5128e74329066b3c0c4b8303976cc4207b94ebc7ee38b74dedd490c2006feb53a99a0671e407ec649ec9da6a4d3ddff46bb7150963dfa8254364ab619db9ec3fd54
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\StudioToolbox\AssetConfig\[email protected]Filesize
922B
MD597788161324392fe1af78ff82b9c953b
SHA1e9992beba9b73f7a03e7426dbf12fdd219633c4e
SHA256cf2c4273a398e58620f7f751ab9ccae36da95fbd39055184b4f3cc96393ebadc
SHA512447fca7cd7249597403de54621bb53663f3e378fa043d439ef1abd4363775d28402c6670d4a06d23381073b7585b30661dbf9aea35eef66ea92c8a2501730266
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\StudioToolbox\Clear.pngFilesize
538B
MD5fa8eaf9266c707e151bb20281b3c0988
SHA13ca097ad4cd097745d33d386cc2d626ece8cb969
SHA2568cf08bf7e50fea7b38f59f162ed956346c55a714ed8a9a8b0a1ada7e18480bc2
SHA512e29274300eab297c6de895bb39170f73f0a4ffa2a8c3732caeeeac16e2c25fb58bb401fdd5823cc62d9c413ec6c43d7c46861d7e14d52f8d9d8ff632e29f167c
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\StudioUIEditor\valueBoxRoundedRectangle.pngFilesize
130B
MD5521fb651c83453bf42d7432896040e5e
SHA18fdbf2cc2617b5b58aaa91b94b0bf755d951cad9
SHA256630303ec4701779eaf86cc9fbf744b625becda53badc7271cbb6ddc56e638d70
SHA5128fa0a50e52a3c7c53735c7dd7af275ebc9c1843f55bb30ebe0587a85955a8da94ff993822d233f7ed118b1070a7d67718b55ba4a597dc49ed2bf2a3836c696f6
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\TerrainTools\checkbox_square.pngFilesize
985B
MD52cb16991a26dc803f43963bdc7571e3f
SHA112ad66a51b60eeaed199bc521800f7c763a3bc7b
SHA256c7bae6d856f3bd9f00c122522eb3534d0d198a9473b6a379a5c3458181870646
SHA5124c9467e5e2d83b778d0fb8b6fd97964f8d8126f07bfd50c5d68c256703f291ceaed56be057e8e2c591b2d2c49f6b7e099a2b7088d0bf5bdd901433459663b1f8
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\ui\Controls\XboxController\Thumbstick1.pngFilesize
641B
MD52cbe38df9a03133ddf11a940c09b49cd
SHA16fb5c191ed8ce9495c66b90aaf53662bfe199846
SHA2560835a661199a7d8df7249e8ae925987184efcc4fb85d9efac3cc2c1495020517
SHA512dcef5baccef9fff632456fe7bc3c4f4a403363d9103a8047a55f4bd4c413d0c5f751a2e37385fe9eba7a420dbdb77ca2ff883d47fcdd35af222191cc5bd5c7a9
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\ui\Controls\XboxController\[email protected]Filesize
1KB
MD5e8c88cf5c5ef7ae5ddee2d0e8376b32f
SHA177f2a5b11436d247d1acc3bac8edffc99c496839
SHA2569607af14604a8e8eb1dec45d3eeca01fed33140c0ccc3e6ef8ca4a1f6219b5dd
SHA51232f5a1e907705346a56fbddfe0d8841d05415ff7abe28ae9281ba46fedf8270b982be0090b72e2e32de0ce36e21934f80eaf508fd010f7ab132d39f5305fb68f
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\ui\Controls\XboxController\[email protected]Filesize
1KB
MD5499333dae156bb4c9e9309a4842be4c8
SHA1d18c4c36bdb297208589dc93715560acaf761c3a
SHA256d35a74469f1436f114c27c730a5ec0793073bcf098db37f10158d562a3174591
SHA51291c64173d2cdabc045c70e0538d45e1022cc74ec04989565b85f0f26fe3e788b700a0956a07a8c91d34c06fc1b7fad43bbdbb41b0c6f15b9881c3e46def8103e
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\ui\Controls\XboxController\Thumbstick2.pngFilesize
738B
MD5a402aacac8be906bcc07d50669d32061
SHA19d75c1afbe9fc482983978cae4c553aa32625640
SHA25662a313b6cc9ffe7dd86bc9c4fcd7b8e8d1f14a15cdf41a53fb69af4ae3416102
SHA512d11567bcaad8bbd9e2b9f497c3215102c7e7546caf425e93791502d3d2b3f78dec13609796fcd6e1e7f5c7d794bac074d00a74001e7fe943d63463b483877546
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\ui\Controls\XboxController\[email protected]Filesize
1KB
MD583e9b7823c0a5c4c67a603a734233dec
SHA12eaf04ad636bf71afdf73b004d17d366ac6d333e
SHA2563b5e06eb1a89975def847101f700f0caa60fe0198f53e51974ef1608c6e1e067
SHA512e8abb39a1ec340ac5c7d63137f607cd09eae0e885e4f73b84d8adad1b8f574155b92fbf2c9d3013f64ebbb6d55ead5419e7546b0f70dcde976d49e7440743b0f
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-55d6e65f478642a8\content\textures\ui\Controls\XboxController\[email protected]Filesize
1KB
MD555b64987636b9740ab1de7debd1f0b2f
SHA196f67222ce7d7748ec968e95a2f6495860f9d9c9
SHA256f4a6bb3347ee3e603ea0b2f009bfa802103bc434ae3ff1db1f2043fa8cace8fc
SHA51273a88a278747de3fefbaabb3ff90c1c0750c8d6c17746787f17061f4eff933620407336bf9b755f4222b0943b07d8c4d01de1815d42ea65e78e0daa7072591e9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsStateFilesize
649B
MD5ec3deeb7e01fba6e156c6b68f6dd4484
SHA1a6d0e24e48e545e6f9622cb5198665187f62f2ee
SHA256a45c1ef796a4c4ab3a23eb3dcd68b68705b34dd37f97a6f6d01eaf29b96c568d
SHA512e4000cb6ffa5588d39bb6e7daa60805cbd784bc1bebdffde414fab3524a03c75fe292b45c373ca3da26d6087f7afc8f280f6323145fedc11eefecd7296c91479
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000006Filesize
100KB
MD5fdf09c3c067041ffdefcc9e1bdea9718
SHA1e31cf28187466b23af697eedc92c542589b6c148
SHA256144754d90b3eaad27d8a11c86faadb24da4ddc251bead8e43b9ed515fafb84da
SHA5129e32b294cfc17fd52fbdd62732571f4ee57dc0308d62af476331887d0e2446b483ceac06ba4617cfbb1c347d771c0f7ea12108bc384e93f69b180c7ca1a92268
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000ccFilesize
51KB
MD5588ee33c26fe83cb97ca65e3c66b2e87
SHA1842429b803132c3e7827af42fe4dc7a66e736b37
SHA256bbc4044fe46acd7ab69d8a4e3db46e7e3ca713b05fa8ecb096ebe9e133bba760
SHA5126f7500b12fc7a9f57c00711af2bc8a7c62973f9a8e37012b88a0726d06063add02077420bc280e7163302d5f3a005ac8796aee97042c40954144d84c26adbd04
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000cfFilesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_0000d0Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000103Filesize
20KB
MD5dd62255c6e72b80ce88a440481d3d22f
SHA117758b8673c033ecf7c194e5d1190bbf9516c825
SHA25616921001068e64b8ac9935d54eaa1dca108647370c5987443732ecd4f0f56249
SHA51219cb0414fa378f59229d6296a4165e3a073fb6c6b812969c7015d3f73e7738c70893346740396986c6148ca1fcd5e7a8021aed775c808eb67ee9d1b301f0ee76
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000115Filesize
32KB
MD590af67e8fd4d5ab0d104b28b82a5f9e3
SHA10172e38010ebd25ebcb3f0a4094be0e20f72ac48
SHA256971b268c15450ab1dded5c1e8e7875660b086b2ca6c45a31ddfa82486b1d06d3
SHA512ab10e3bd86abf1ae574133f34e7d5a8bff59f3bd003ba42da7e6b3b8744abc59df74b7b71b5c83537a2342adff2aa175caa0db5e5ba7f3a3e480820ef52b4672
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000117Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000118Filesize
45KB
MD5f95a0faf6629fe55dba24478808491ac
SHA1c91fbfa760c6642f522038a7e90b9445cf8c762f
SHA2563401a6c618e31c817b75f603ff2ecfd83b8b75e4309aa09007cad5e98878f1f9
SHA51206f2e5329db17deb104bd106cfc84ea2b321a4ddf64d6d4acf37462cc0d898530b3d913f2c48c7cc29063bb22430e9d12ebd6c9f8e32a2e980cd985a40923673
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00011bFilesize
141KB
MD519beb48c0f318246a4651315a8f7ed2f
SHA1389f1ff5a5211676167b60b34aa9db9d854eba74
SHA256edfc4737412920373161c4b5d320a8110ca06d0778eed92b507e8a0c513d308b
SHA512e704c6d8236155f98bdb917aec2eb2520eb859efdb0e17bb83ac4cae7059731d29e47729b2e95b57ec11b2fdc6ad00763ee7493043f4039289b6ba6c644dc5a1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
7KB
MD569ca508565a221bd844ed097be143b9b
SHA11e8275ed146c7f55287dd1dbcda4750cd043c20c
SHA2561941f118d871809b1e8c0d6508d0576b0522955814641e825500624cd4ae1cf1
SHA51299fff1866dd318b3d3177f63bad79cdadc0dc4870a13fbd20a82cdcd0728031571b957b1d046a9652e8b4c612621a8a7ba0b5bb199e79c3f288f7e97fe6d9140
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
6KB
MD56a39a68e5ecb6c1bd8e48bd547bea3c9
SHA1a0805eabb81797f6878b689bfe135814f90f20bf
SHA25611ee3c57f0cbe20bfc8b2709cb0bdde0621f29a20218d69214ef3f2eadafd249
SHA512ee1396db1b728a26f4cb631670db31617cb17dee1a8de46fe693e160689a5b5665df9cb227d4f2d9953d0180dcfda84346c940e6572b901bf5ae1b43a2014785
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD577e3f0aa257a40665fed3b8697717c07
SHA15c3e3efe85d581be5cf5f9fa9c454281061905e4
SHA2560d5875187c1b7c3877312dc75f0901f96521dbee0db2b1cf251c9fcd1ab20e66
SHA512799efe5225b42764211e1967a1af4d7228f566cd687269ec49eb9502cb43c1cf8778ea7f2adba88553bf5cdeb87fbdd5e6c72442b4f4e44cf4725d7c5fe8fcfe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD59307ba2f16fd28f7b1d8352a3665e190
SHA1704a27c79b339237aad2e0de1b26b53c250dcfc9
SHA256444dfaa3df387951ec4bfa20497c63136a09125e51f3c4d14d2ad10cd90266bd
SHA5120e493cea4d8da76f549a91c13e6ebea40e689ef12979097c81d018e751a9bf252d9847eecfec746bcdc731d321683ec5615494f4e116fc64ace3a0c1079a598e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
6KB
MD580172d5b041eb82ac433efab76cf2785
SHA1c3ddabc153969bfcdefe43bcdce84ed5682c9278
SHA25660d70e363c603a29bea95bd8de6c0005a63385f5dca6c6b9f62160e2d049e086
SHA512ef4337e7d0ef9d609941deede0ab9a42313758f73121dbe31087ca9c2aced3d796a6a8fba8fe3e951c2565dafbfee66e645a370bea0a6b8a8be64c049cfde197
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
6KB
MD573e436fb6e394c287dfaa7f1175616e3
SHA18f8f5dbf23b3f456479fd93ea3120e1c036889a7
SHA2562afe70fb01806708bf744e82778ba23a4dc98d69cdac58457ec350ce48ace956
SHA512e5c3fda707a5e85d8f0e20a3a761c90f0e1bed07b930fd219eece4128790f9db1d0175f82b402b306f4b4e58fe365568c926135b353d9c13777ac5a95c09acae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\000005.ldbFilesize
1KB
MD580ffa8a44af10947645fc13fdae55769
SHA119902aa5680e7cdd9c3cee8f63c4e99f3153f55b
SHA256b85d4f18de90243cb47a1ba103665cd437c0367e3cab2e7afee8f537e1047df0
SHA512d631c6e2b0154663988e3e7c4cdd9dae1ebbc75258d510ed45367f4c1743cb5f5d324d5a26c32466b9b51e4c69f87ce83d051b893e43bc18848be4a1e42dab2d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.oldFilesize
387B
MD534eca3a055c71e5ef3bfac236714bdfc
SHA12ae81cabbcd5b6de3a6aab2e1483d1656deba7a5
SHA256c395810e56e73e425fbaa70aa243c8c1e3990b675a00eb860a4242cc0d0fdb1c
SHA512911d728291c5a2c4243dac8511fade4a3080e8c637fa831be8845d43819811080f025bc023603d5b28b9a2a35bc8a991714443cf2d455526244f725f0f111cfe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.oldFilesize
387B
MD5b903672272aa59c498f93fc23a0b26d8
SHA1c4da624fd010325acb150a73cb56a171256cd676
SHA2566dde0aa7608068028ec670501968965689b52607adb43e2496ad3d5abf22d788
SHA512aeae0254ea9914d90745c1435e01ec116cfa41c09a6887cb8e7dcad2ed2cc31d277c7bc974b924f1107caa8aa4301beae278d31dc92486de0f5cb4b6956b1c27
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old~RFe5f19ab.TMPFilesize
673B
MD5a36d58844d01477f6a3ae81ebc023909
SHA1184689329eab7746eb29ba028a5029839e45f6c2
SHA2569c9aff242433b01e4861155ac55df4beb19c2894307cc7d0c7b476c76df4f6bd
SHA512afcac6bd56db8206e19b6a2d8d101a3aef1c6a8ae93e45eaf177c4180978929af213c1d1d64a8f38aa1059cc6af7edeeece2df52e78db981c92d9fb375c38245
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001Filesize
100B
MD528dea9a5a4492fcd5011d08eb61c4542
SHA19f3fcb422f5b77f49fd093a9cca4882f7e5ad6c0
SHA256d0ae48f70dea07ddc72cebfab98cf0613552750422affa3d157e7f66b702b5a4
SHA51278a84ddee64d5cc2155202c7686b126d44dd4c5affcc939f992e0a39f55bbf577c05ace6df3ed4e28e7f05b3dd1c8712802442704465dd2674d58348b0ad1cd8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD573a1b84d3fa3cfb38fdbc72f1daa9efb
SHA145e7d1cfa59dea090d7409a4520681f23ca44b05
SHA25617de5c778f1ff5137ba33c5b65f65c1acb8581e7d89295a66d611472e0305382
SHA512c914c861e5cffb53f1f124c52f9bd8e302ddc1b21fd294b25be63fcada536390077535adcfeca67d75d0616cdabb9bb4687266696ddcbcd7a03fc512ff09a9e5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
6KB
MD5c6dec69deb7c127f094cf486bd9b9753
SHA1a8697bb28711c5ca112b72a040855202dfbdfec0
SHA256efd0f0a67401be9e67dbbfccf770ed7f023a2ad73532c5fbb389354e02073305
SHA5123bcb494d71cd143ea2fb0df6e8ddee21481fbd3eee258edcf2b35211c0066fb9361ffec3bc6e2106a9b8e5555ed4fcbc65035922d0f55a51efb4ae0f715d7da1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
12KB
MD5df4aca9e20a98d43eb5b2b6fc66db3b5
SHA177cbd4a2387b72a4a6e63db5a2f360804d177cb5
SHA256ac1bd73896eb09917316e3bdbedc93c8b004775bf19d43ac93bd0534cc587945
SHA51260abd6db8842bd70842c421531fb2c9e8a7f54ed2eee3dc286431e89df8a2d759097cb07aef87304fd99c1eb0a7c09d4d369282a6ec763ffc69c0e927fb96d13
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
13KB
MD5ff04d6ae0bf1e1f32c517b29831aaf85
SHA16d26a1924489e5c77195b4b6a003f707b6fbda71
SHA2569755a257b96da0cda222738418e6ee7e7908e4348d54e900897b5a91ac53a850
SHA512abe0e3dcdd95f5ca262b5b5053b1d2e035c15d3f26598cf77823413142f1c1d44ca510d6a85d2bef0694fa151711137c4fc1328f73d15c0d8ddc90bb20924929
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5a00fb008894a57d89820bb2072c2cbc1
SHA1ed98e2ad1bee2d4c4100d8222857b8136a6aca19
SHA256a7af081c5235432300b4aa86987664c0b35d056c7e469594859be55630735ea2
SHA51288c5df73e2af117a5da08cdc954f46b3a3c6c33ebc6d8528ade5cf688799b5d2497a9241d71fcc79f258b85c47f6c27b84346814c6d19a9ce3c9fc8ba249cff3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
350B
MD53002dcda88367059e80fbd9232a14ff1
SHA190348a113ce3f23285dcc31fe52401c898e1fa97
SHA256b497ebbc3841847a0e3a5b52895e89ef48c923e9a3eb46cc4cc4d452efa42855
SHA512260a793c33a2dc69d84c65547851186941daf039d9da994b61e83ec19fa244faa470219a43d9e57cfbf5e28ab512b2a915aa1c71f5d3b6361f9d187ef7a87b42
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
7KB
MD5166f5fd031fcd25e5b7c905a2aef4a52
SHA10fb29183b5d35e4458bac2d63b42cb73920ce502
SHA256a1a29f3f8dcd29aa5824b82843c2a03def1ad00b97ddd0993c3ef9cbe5705cf4
SHA512ae8faf3fbc11f6286948d5fd5f572d3d4c2d875548779a2adb94d155130f277fcd48d4c1b7f3693e99632f64e0cc1f80c83934376180e7dc647bc38d9d50e44c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5d811a95a385aa1e08cc320e4d69b3340
SHA13d10291e7b6a825ace2219538c2f263d1cbffef5
SHA25650e13f360c938f07c1eae9bcafd0cf9deaca55a4188bda9b429e16d50a5089e0
SHA512b9682eaba861e21d306b5ed05e12b05ba9499a3d75084832e8dd1e955fc2dbfbb9f71ae489f32f24a30e0916d17a2bb9bdd6bdda441dabfd358ba5140f47eba2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD53bd003d4f8e8d683ced1e32730334436
SHA1a96c87062856fe6c18187252a4657befa732f153
SHA256214932fb7b5a7624f869794a58afde43be4e147da6d0cf816978f9d1d8065c7a
SHA5126a9555fd42de29ec84a261b577a9e66306d0bf6702510eedb542e77a6af6483a4d2b80751fbc54012f7005b042a5b0c34af80b91d9ed876a2564944aa6f294af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5ad56cff8eb4df6c8a6c49c171e39436b
SHA11249ec7e7fef298ee125e0020bbb253a7edded64
SHA2564b0d253834db160eb2cf8d4ff75621f7d2abf44dffe37bfef8e796770484bbfa
SHA512c396f5fa6a14ebf4a5a24787f2ce5462453110ddffbaca9ef060e96cb34b71bb2768d37db2a2325ed80d38bf6ebee6621191d19b9b026a806fe70321c7367568
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD5e0aeef4bcf72b78117126f3ab90164cb
SHA1855a567e2d063507d35e664e09fcf758762c474d
SHA256a09c2a8709cd3b077e423858d7762927599e97710f356f5547ca866751e45e19
SHA512eccfe1b34c6b47c5c7b3437912dc4ef9e7416285fddd2ddeac87b574ad9c5ed4f6de273cab27b7bd85c325c57b487f9ff1cc7d45cd3ac646c66bdbee9da3916c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5b8a282dcfb90c97f83abce48060bf162
SHA1a991a205d2a1428a9eccfc6cf406de63725a1554
SHA2560070167cb0a87d720c0d735ed42cd5d233308bfead646dfb8765dcbf573221d4
SHA51260b273f3b29d2e02b70c01fee5b3922f609572d98de3a4a82f275cb6c6edd2c7d2b7b33f61c514d7e80e5cfdf885d4608306fa8e217b4b8e4501813aa9214b5e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD51f20fde7c72d72891d54b0ed650cc221
SHA174a8b2f3da930fea4aba1a4ef44bebe699793e5c
SHA2566c4c2487facf3f4c721a49ed83b16a666ffa1c10e1008e904be639b038a5b84d
SHA512bf2f90c2f696fde9ba741d9840d7570b9eb1082cc354a0b6b367d3a9f4bf80113a20984a4cd940f1db1301bd6e314b89ee07a4ec0a77fd018bf69886ae7d913d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD58f4d535bd185948065f29c9df617a200
SHA12eaf224a476151fff4c6e6fe99df0f866cf952a6
SHA256ef1ac570c4813c786a64b0133b0948c0cae122b0b329db596502bd9a82b5894d
SHA512c81e5db1768e892f8b7b53eb2120f3667f76f1095bfa3d6dbc52e90c967aecf4eafc525495d040bd0ff8090d00dbc4d299bf10b4642e1784be3f0a57849019bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5c65dc5c27303d463394504aee121228b
SHA110076dc9994106ecc26dc40d158c22adbcedc82e
SHA25640b575be319237bc66938a0e2b1188b60421b655bd37388db39916d9221dda80
SHA512ac7ca03a6d64c3814dd77a0ea67fa90219579dd306ffc7fe35eff600fbb9b4d8839868ad3635eba276795e8edf3629f01abe4949b6b215be51225bfd761d2fb1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5f86c136c8f7279d08d78599384d832e5
SHA110c2380cf85f558c5ba3be65897ff4ebe0d97ba4
SHA256adc924ae90d3cdfa47e4c9610c640febdf737859dd2520f484f8415ffc044655
SHA512c85e73fe164bd74d46d577305cec1c6f982666d2f3a75a3acaaafe2002c087e98a1153725c6f588029479bf1c45d40debf626d5241f8c8bf57ac0bf1917acafc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5b716bb13f861acf91e006f6734bdc3f5
SHA18f7883bd704c5d5e2b50ed2d8c92ba43f7184c9a
SHA2561ebffae3c90f4727df2bb694ccfa2399e0a4e0b9f68a2d589d27ede0f6857fc6
SHA512553ea96d7bcd23987e65eb4195ce2b12b177e174fd0d144d2aebe6ec20ad52307dcc7517fa94bc55f1570f32ad1ad4c070ff11ecf0447b01e9653034fbf30d9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD55ff6b3508a9a250814ce3110814ce8fd
SHA14982d32bcadc86d338ad3afdfb3df0eb56150aad
SHA25638768026ca7a5b57b4f6a614a11bba392fff0123f11ed5d6c95e2d4a3091a881
SHA51260f2059bbc6e9dc813e694d1f675ea33d01d3915379d37f5db0a1c117d68c096c229bb408d3e17f911c86433ee7fff748afb56fc442e352a7609bfaeaf9b1367
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5383af450124ff16f6fce4c3e2288a558
SHA1715f2faeb8a93499700839708dedf3aed30c71a3
SHA2568f9f066efb02226571b0130d6ec5edbd310cb4994f94282710e627e1f79627ad
SHA512ebcb275cf4b8851df061db260865e6fcd5ba2bab7f21aa8769c78f0526851815f5f44088703078769c7276c8e3d70d8c08f452254c354b13b9266979d028f8cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD5a1519035eed6a692eb7952e6638676c6
SHA19d385c80851a17a77eed004b0d300e2e769adbb0
SHA256cf162d0ae813a1ed4253fda167d64a4a07e191b5528ed72952d9ad9625d03179
SHA512d549683a03d3a732c8a2c3883ba5fa3d94ed0458f810110205c65dcb6eb886f7a2019588027c5681691b8e53bbbccbf247749a2b7184a5f20f3d77ce1e4e21ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
7KB
MD5b30c1103ea79f8f07b0374c77623021f
SHA1fb9790f75e1c130013f3c411c4c86f23cc6963cc
SHA25662a966dc4c491f63585e34cc7e00e1fca95369c15f4a3a4c0e7b77d486481a63
SHA5129a1c93701d25c1888bd9619c42c2be0027297b8dfb69a1c76f408a06ab69d70dd3b3328b7e1c18345802d417d8a7c3a46ed540a440967fe0d43c8c679ae96bb6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD59fb47250fa257899c5563ab4ca05d2b3
SHA1a4cda626fbd884c06402d4558a56431b02ee67a1
SHA25650a08eda7851e9a27f19ccbeb76180d3b6ae17e23b570eafe571e7cb0eb8d61c
SHA51222f7a00c5b7dde51653ed3207fb80f7e5e590d6349ae3f5574244c48f09100d07b7d0ae66567940ca1cb145655ca8ec0ad5bf2ac6a7799eca6abf569531999d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5a9a028461ebf32b4db77acd60efa2fac
SHA1b74fd799887b71656a6bffdfc3f8101b8bc5293c
SHA2563b5da34068668c6a24ca3ab41ffe2e3a58481f10d6a126389b1d8ccac63fee3e
SHA5126866af6ad41e9b8cb56e89b6bca332ffc728728265b03552bb9a96ae965d3bfc0a92edd77e5ebecc5fde91d46795927ad09316b3fd07dbdbcfa8b836b17a1558
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD52cbab9b824dad19a5d920c01fd035ee6
SHA1ebcc45c3d5295b3d3d59360f3c49835456c949f7
SHA256f8c2e9596842570fd671b063a425574013529ca1028536e726058f002394ea29
SHA5127dfead0ef098230101a73e3191c80f4fe5825739ddb80dd048c3915d72d848d376ddb0b4dc022474e5722b2233a5566b8781e3d3d7a907cc59019b82ad19b721
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5e6c823bf858b1819d4c22fe65240b169
SHA1906e0c37b3344d61c7c06ec0f156766cf4c8dd54
SHA25621613920d817f7f29bc6914b815119dcf927a91346417451b34088a92afacad6
SHA51281cefad20d9e49442863305916f60c1d0e6c683a52d4d51be637c4ac634faa771d6054ebc08dee14d317bc2314a09a0c7fa447c2e8f425f42df87955fbd1f58f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5d7b536a392e42911ab981bc9f83e67cb
SHA1118ec8b5c0bf4786ac57bbdba3a50588a1432f46
SHA256ceb9a47e8c547b42ba9d653a02256b81593e222b20d993d451dedca4830be7c1
SHA5128a70bc75fae6a7e95c8e8f173c1fcbec894da4459e26fecbd4f7729078ad66d49507df17a0741ce241a6666f601729b72745d229a6f84f69e73db4197b860e3c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD52c24470ef9364d9fccc194dcd96cd2bd
SHA1d42e583d75bd6deb67be865c450188d5c52d1c73
SHA25665fd9b9a9c80512b6024a255e508a91b816973c9fa0b8b67e42a92ee15786fd4
SHA51216cbedde928d1487e37057a8bced761d742fc1027938c3c3c96e94c9d278e52f6c058d795ad3f060c5463f43c87eebabfeb3ccd211c72b7593bb1961a4ed064d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5a67a26773d216eae6be71de35b2cbfbb
SHA16389d533532b1fc8874fbd1294cedbe992b05a42
SHA25673841c49c43a562106f9f2a090fcf2eb724acda5a0598ca2628982911d30f1d7
SHA512e859135645934463fc5ea060d18fc9fdff3fd4b1834ca4f6728c6265ddda496301890574064bfa4ecfd3c2916ec65f5bce43f3aac7c44e0cb2e117605ad32aee
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD50fbdc31bd6fdef1154c87bafcc05c521
SHA133bdb1b52f8cd5a573e4398bcddde42b6f7fac6b
SHA256fbbe56b0120ad33a226d58103238fbd162759bf3b2f05a8dbe2f553ecce37ab2
SHA512362e65ce4e22936328b14dfbec9a6fd467f367c31fd188150298d227b978a2b470a2657ab4653cfed2d9137f6404b771c424da2882ed761a0b7b67ff071d5521
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5941ab4e5702c245d57099fdb3e8f780e
SHA17d3513bb15b7b7c5fd2d8bbdcc546ed42bfdf010
SHA256561aa67efc8ac48183be4bdd671a132983fb3691d54c1907f60a3a7bf9e33596
SHA512e2077a6f172882434087473ec2d4ca2e10be096cdb687d1e203ea5d0dbeea08070134792510aee0d8db284c94538cfdd277802add01482e77719c9f3d635c5ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD51d4bae6720231e7521eb4d19f28e6425
SHA1a4787eff037b3437ce2f10a95d24af689f1bce01
SHA256b24fb426d4f197b5fc86f3a5571d24dfa56343462b67edd3a438b01bc0753961
SHA512a5afcb0195367baf9ca577a55f9d190b4fa09c856b4eda2b2acbf0777a1ebb02290d4a12b1aa8c4d53ea303e441ca8bb61c771aad79d7c0742b0e6b351af2125
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD546d58b028e123ce2d1e9b3c289108d79
SHA12002b0f3a842935281d620e2ab1f643ef38b1afb
SHA2566554c5729f7ed8f5a7f5c0734ec0d4e0a622ae71edc9000596f6ca9d4776ab9e
SHA5122bfdf73753ebe237efc1afcdf95b60bdb48f9056d240ab9f4fd1d8c8c5b7e026dc883883e68298cb21105a53783d8774dab03975a7f8171084b90c31d8c3f447
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
7KB
MD5eaa564e75e0a8726217bc1886a12d830
SHA14e20fdb2e461083b0d15bde61faacd98e8fbd7bb
SHA2565bd1f9ba0a966660bea3630234da57c49ddb19c6769ebd225982d0ff8bc29244
SHA5127d02fed1fe0512cbf1052d5fa699caefe751f2aa843ed04aa377fa2aa359ba9d5d69dd5dbcb3a9c3d423d0e4e431bd4be0254804b462437e71f4f8c3e59c3a66
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5f8376f66c62da7d6d2bea0cef094449c
SHA159415699fee343675b8cec54117c4adc920a005e
SHA256fac9b196c179f412051e7c27adf29d3e83494d7054b9aba80d237ffcb320d738
SHA512e242df5ce1a65fb0c1b39d908e72598cd574fb94f0634d0a5d097bc5c6bd3ddca358d9cc988c4710f63f370adef4b4c697ca77ba7169e00e5fc8c1f830285401
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD56b08db62999889fb6d629971d3cc7f3a
SHA14baf5fd6ffd9e7cb13f8679b9ba2041f443f08d3
SHA2569f87d7e93c0e738fc65e63198b6b8f15924a487641d8210cfd77754746e212ed
SHA5126422472c60b6ba42612050f8401457fd33ad4d68e69598df77b3b00eaea64c9c47be247d9ee371e748fc321cfaa5616f2b207a637f2044477b92b5755fc8ec57
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5cb74b6b563d98bf9f38fc0cf94f53036
SHA1eecdf1c8e3d5f5831cd4bc5b936c74825c276a01
SHA256a179e984b00d8f17ab063debb08b2215cac7abd3b5fbedf205ef1419d8d406f1
SHA5129c5afba7bd303aaf610be4245a36f450378540dbeb21bbfa2b1aa4cb8b8cd874657e1fd4f5c8c7adea7d1ba2e37f807907c32d2c6f7fe11cf1e7dd6a148bc17a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5244bc436dac7ef89cc5ba3d9ad4e1528
SHA10046b1ae5c9a77f2dd2dda549f5187def76263af
SHA25698baee09520663877122bf2814c246362610694ccd804a154b164f23aa2f01c6
SHA5121c01d53cedd8504b8a9ce5975e05e874680df9944bfce2529c104f858c435a8cb0d6dd76188efe765ac3e4b00b9feaba600b2c19271de18cbb33179a4646660e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5e3da4c2b852bbbfeebfd97f4bdceebd8
SHA1198801473ade812ab5d6a5109595dcf1c0647984
SHA25600b0cc8b15cde6416372ec0692bc1f6b1c628246bec033ba68a9ba566fa69a75
SHA5127efd56ad3c8e1a22b2a08a1419088879f8df6912bc9215d4c632326eaa4e2cc771265de605c0bff5ca8392b274887af22830b8518361f5ce7ec4c6b7e6d6c9c6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
7KB
MD5835cf9af74d7fb664e528ce45fbc0a8a
SHA18752baa6366a5c27c0ce0ac61b070a15495e6bec
SHA25636d4aa064b4149c7da0d01dbace3d847e5ef01449ee6f778bfa8c9a672318af4
SHA512cb53b06f5716e659f6dd3486ac1b0b9bc52677dd9da79f7dbdbefb02e83f12fd89d736379ae2c37c3ca35cef3ff93d58ee6a990c268d7cdfd4214f0e03957416
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5128e67e304d911523b9f0c1a86d42a6a
SHA1e9087e240ddb5dcd415a42cc45a86acdf83acef4
SHA256e96c360aead135f29a107c938e478f50d1f425317f4b8e9dc18f7bcd3cd39555
SHA51277863bd1e0bbdd8b2db6b8305283e1cdf30f443a721109e65d815066d0be8e63f93b2ebe45f0ffa6f9d1434ebd4a71b9dfea184189e0cc3d49702cfd1b2b8db2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\cd715081-9fe4-46c1-8baf-422ebcd25ac9.tmpFilesize
6KB
MD5a24940b279591f892aca3314ad0025f2
SHA1de09ddb76c4c698c8128a47413163583f7a337a4
SHA256ea805958bd6dfc800bc840313fdd54840d78dd216cdcf3cec938b6b93131916d
SHA51234a31b9fb8c26c63526cb2e647301fbcb9a251f46b4eccec21297ef4688c100e5317b9b3babdbfd6f7e77c76898be67fc1573b7beda51d42e5fbfb233ccd99a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD596014becbc551e22e6e8e73dc16d2be7
SHA1ec25bf14d8eb0814c82c0fd8ac168fe1cb16703e
SHA256269a0e554897445262ee15757d7ac225c1f0d1c02ba8a255830763ba3a1a1607
SHA512b6bfa1fb32fd1c07237ddc445c71687c383a5fe15ee550388fa957b15b72683ef2e037a746670bc8632960cd7cf9b23fdf03619109a3b57f44384ccdb95992ec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5ac60355acae9514b0eb02a59161aa379
SHA10ad73889df62b1c81f06d112521bde585c78794e
SHA25676feb3e9fd9187f3cc6d7d3030209bf9fd4389aace990132617db24fd7fdd6f8
SHA512ccb0c16633e5cdda71b56eb81c817f90115e598e22a90c7ab9b4beda18f55f0c269f0e4ba8ffc2cce76a2bc8a8a3411bbb684a9b19a78af584d4f816386e5f30
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5ef66b2da20814f3eb8b2526915e85162
SHA108e773af67bb4d9dcfa8b1cfadfa9a88ae6021bf
SHA2566243e1369856471cfcad13ac4bccfaae40b382d311a2eeb7bd78b6ccca715619
SHA512f9f588c65ef6f0d546555dd6fb5c58727c36c9c46d0eee3c9beffe1f0bd58985061e21eceb7c18c0a6c78aacea01ab0d414cd2806e804ec04c69f8b951d7621a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5971f592ab8bb25ca12228b0edb2264ad
SHA114e827667173b1cc174ba66defc7d72dee4a91f0
SHA2565182664e6fcadba28ab418a438bc8c73a9d7a701aee216153bd1add08e39495f
SHA512d6a42029486fe30f6bf70dcac72280932fa8d4b4a954d156d7c49ec31f0d1f0d6a3fbf7f45c997324d67329fb255d387922ffa694fe8cd853131310e8c7995de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5dbfeea7461141e60488ecfcd03ab907a
SHA1d524c7a1880ec1b39ff765676d3cdb17c5a7e338
SHA2567e8384607a8eb27e3a056c17e3e7eacbecfecbbe1de695ed42ef15abc08bbb82
SHA512d5492a7d71cf0fcef4f546152c15bae9a8f94bf0c9aba3f896db71ed084253805b42d84867650f6344c79744762364cd6cb92123ed12fde8d49bfa5705b69dff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5298aeb4a899d3bbc49d0c234f8787ca1
SHA1929cda0bd7e1d92a1b1f9dd9db74330bcf423399
SHA256d4a092e18af5758cd81d356b3ce3da4bd6cc55a4d3e68538d6016224d272252f
SHA512cb424e5e90ff2b1cc90e6311e01d77e151531397fe85bc5204c49539367536695d5c52826e2ab9e7c8da2fdea45c6d9849941a89914f31a58ec1cbc335c9c588
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5f35cc9af4275a5f28f35d40313620842
SHA13f75bacf7c2cf4b3eceffe8d91db0781316417e0
SHA25691557254a2192fbcf89dc6e8db5659207ea7e33daf47fb542fbdcb8c647e22c6
SHA5126b45048f1ae6577fdc42ab213c8f0e6394c01aecbb93362270bafd9360845b6b356bf90c0ba2332a1f9dbd8a86f570a4d378b47ea003faa72e1f0ff03a530e08
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD57d67884d7578ae7417b5b61eed11297c
SHA155d557c5f8961669cbb82663ac827883fe84f46d
SHA256bc9d578e505b005d18826bec26ffdc65588d5371a001b046a698d7dc44c64390
SHA512f19aab56d9c56ff6a72bcee2c503e60e9700f8e66a107483ea998e254931e1961617549120c8acf9bfb4a4e32b7aaf71b64f2719f1e21a30f038b4bcffaed66a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD51cf5d7753c43e6dc2ddf0d9a507761a0
SHA1450c6aa31d6dcb908950d8015cf0233909d0108c
SHA2563e1d0bb034417f129a42540843262f00e0fa0171649f4bed640ad485211a2a81
SHA5125f5339056ba8fc698dd7718a15ff7577e90462e6ef8052aabbbcbab5c0dc62a4cc1908e9c7070e9c4672b5c38ebebcf4551f2d91adaccd905648c515d5da05a5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD572d140a934fda167f129d9808e1f28b7
SHA1aca4a77f27557f9609a01c0f29e225f199f4a58d
SHA25600dc6fa1670147cbc48092ed96ea630637268197dafc12a40ab4ca9ba8827484
SHA512c4237598f949128123e192f493aca2a4b7ec9ddeb36a50d14fa2f8815176d2dd65eccca990191e6fbbed4054e871016d12ee81637af200f86945d6767fe998fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5e6c11dd4733349565950766b27d35efc
SHA12e7f455daef80fde94bf4a11cd027e7b594c9623
SHA256afbb0619bf321a0076cf98f2cdfdeda37a2eac374824fcf337d4e0bce15c5ee4
SHA512423b89ab08468856bcff51192bd5a63949c43176fa9dddedb7f228f27fa2c1fb7dfb6b31c6d07435aedbbc90df54deab4f75d08e71882e676c96909c19709556
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD51c4a161e9d85c443815903d226cd7605
SHA1e2f7d65af948f8d72af3841872e3dbc32dcc0d3d
SHA25606cdad1a59a7e927b0458a19338411587a1189184f67f95ec73046ecbd6e5a35
SHA51275eb13f3205f50f7b290098ca1e269c434dbf3abf5442eab74154d1d752a05e2c73ef3acfb7ada82cef2d7d7d729b502efa2f5ce855123708c55cffc944d2aae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD59312cecc160960f795a9fddad66cb5e1
SHA160cc9c850ac9a969af600054b8528b4a7e33fab8
SHA2567f7a93c9c8bab61d267a84c214c76cc7cfd10010af8b9e936d1531e9bc761a3b
SHA512728f940e93f1d5f1871448a57399e272d8d560b2586f7fd9a7d8a0d5d86d5108b592cb9af991adb1c293ab72dc3479d782fe192200ef1731a1127107b438d43f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD57cb5313505442e7465f5998bd58baea8
SHA1f5aba1a00edb05d64a439e8219b477ff37f9a6ae
SHA2560771c5198e930a10444f4f2796ecd5821062533a4817c6d3d277ba085d937d4b
SHA512870902c85b7f1ce7b9405a5e00fb01cb8286072ef62892b13fd314a6017f0b9532285343a8a045330f6dbee7acecd7d06a22939f05cbe7307e5c187ca0d9a431
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5abfaf4a06690b51bbfba119651583d99
SHA1797803a09497c0d6921f172c23381b7442949c0b
SHA256c063dfc9fc34ac666cb2fd1d08b1996dac2a547287835ccb633b406951e1935c
SHA512d5ae6e1e428ff68322da39452c8dc01af57b6efd72008251b6453f46db95bbbb72bd32e620895f37b431dec5a1ce8b0dcdaf01b5145c075bfd506fbbd68f5215
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD52a049f5e608da566dc4de1b4bf958354
SHA159194f3803363bd6c98e7d5b38562d32a22c9906
SHA256e8f35cc8a0d2a88e1497113ee024eac84d4d7c219e7ace299831f50c54e83a0e
SHA5120dff20fc88ec713b423ca4035f29b789d7a9cb6afd0ba433f1063d3195e4f6b8660dedd361fb125763067c1cef355e6b948bb386842eb0aba36ba6dcf4ee21b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
10KB
MD5e3a5468cdfda4e78e410ee846484ba4f
SHA1d47f57cc2e1838310246c97b07243fd607f45647
SHA25655fe230a9bd097c3654550a7d5652725dbc5469d1bfaa92923a1d2cb17585ca7
SHA512016d0c23a2caf7da7febea6497095fc266aa81135aa1d38a9503d4834efc10a40826b6e32799ae47934b3779d3fe77bad25708eb719ef19ed526e336aa927289
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD589d6c34e6131eefb8540b41fc9d5b8c9
SHA1fbd8c1b7799e738f04d09296d8fbb4c6f288b977
SHA2568a451d720da9186d248f261805c073857d106ce542ae82fb7967cedabbabc207
SHA5127aac12bea7c8803785edd7c6dd64fee6b83e76c10c67674361e8f8bd86bc53d8b87e8bc018336649f370b92040d9d32399a7d7baaa8050663cd4269a37aaf184
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD59b908d33a69654c87c77f667f169a69c
SHA1cd5d468d27893c0507a2a2f66e09fa0293912db8
SHA2561fab6348595b272f94d6f3445e91c301edfa9576ee8aac1e1e2670e3e5ecf0ed
SHA5128cd2924d3f579f58cd23349ae6daed28b230e194cd752efccdfa6cc43ff0316afaef5c82fb3a168e261bacb6d4b3351cae57d7266bcf2c15c9faca93a59d96c8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD516fbbb890c3936de8c2d358ee25ffafe
SHA1c195c8aba0b786bf58872b2ec035193fce48f438
SHA25669408a04d57dff6f19707d300ee479af616a6654cb8fb5851cf62a4b7eeff22b
SHA512cb40993d93338924bcc951558f6b74d3d3e7c69a2e82617885bfdafd1fd336bb05d760ce03111b95513e04963f6742c9a252c0c2e44e1ff68170f89fad6bb821
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD53a67e0f2fc4ee60850ad9c729329d51c
SHA195e80b7dd6b02f175b02b169657906f32021cf68
SHA256a0734c4db7845365210bb698d34f8ab12fc0a4027d1e80a5c9350a043b54cafa
SHA512dd505b7bb9fa425c8ca8efabae9c2a62e2ba2cb0efdb9c675e361e7a9047cd423633c04939d721f12396fb3d3399e4fbb01ba42acb4ba478267380c4d777cdbd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD581ffdc3e2dbbd5c2718279ae4b6e68c3
SHA1df2204a4c4878bfe4e2a3cc5518288ef6ccee99a
SHA2566d9a7e6ef95916a72634c061f5191efd38da36f048c045f3d098cb3868fd9271
SHA512572e95d07dc45a98f792d3872d90b9b0b7d0ade502e6ba315dba54df67aa53f4fc7046430dccba1f7185c49d14ee207243854ed1f84aec50188da963d5a2f119
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD503ed20a944933dfde330253dd9c7b7e4
SHA135c0daafed5046f3b99c7640e9d0918ea9ed5b6e
SHA2563b8cdc88b05ea4c07dd810af07b48ce59b345869c6ee11a0ca9543cd55797528
SHA512cd1312d6c92c6a98606ff1a4e9419f06119fd88dfe7d762de0aaa441fb7aa111425220088dabf5484632f1fa25663a408c2becef77cf3555a86ed764ddedd3e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
12KB
MD566318ac0456a315bc3fcd52505d38094
SHA1a8f47c6481b68cf06314571903671eb4a57ed080
SHA2564eda4118848720c6cdc036615e72561c8dfc63237bff9ddf07d9093d99f44108
SHA512d6c62c2a5c12e5ea3f606ccc028f2bbb3e1f2aadd7436ed1bdc16beb2749b8883b3a6b0e1c28e18424ba43b97630b3f29697ca7945a6c25e3d8ec71fdf06e64e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD5f5639649bd22cdb2dabbce155e2bc0cd
SHA1cc7008d11fe15ba57d3a75e3e37a66ac734436a4
SHA256b71813e9417685fa245844f1e12653c115de25ecfa3bcdfb24aa4efc6e2a8ed5
SHA51238e9b12ca4c1d1e43710c9bab34387e8e58d53d71f70b8297c2d0ae3e478dd1d17ca15c4907c084507365b5a268a483c2a4407d317aeeb4b755c5d4d03f03b40
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD5362c93c158eb4037cf1ee644d2b2888f
SHA1fac715ab512f2c719d2d3744f9155354d85dfe05
SHA256f5a9b419e0ad7086990fe2b04d0f6c24c333a658792299c80fb2118023c92400
SHA512dc60ce10eabfe5d3ac1b1f5eb8cdfd4b8f91755bedf81772233a247ad39b599875c427196af5253ac6981ff552428861e61389148461908fb707cf04a22615ce
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD575d60b67aba1424e1660f778ddbfb14e
SHA13d85abd0b8dcaaa8d3daebaf86e5bdae38ed1e59
SHA2564e05c2f411478aef4fafe0213fa78f5b5472e614b461042bacc8f92eed9837d3
SHA5120a955572d36b33c157c05046792efcb196dbea1073069be6007b1a3590698e2f47fb86c093cf153aa1b176da75437fbcc3a0b975dcc68527095f1237a06d5bad
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD54afae5e3ab24e6fc1eed4d7dececa166
SHA1e359b6efd51ed87a3c9b0435b2965873cf8b4b80
SHA25601f3f2a7095e8e04d25d3f9ae9ca6d8343355f3d0f143974e5260dbf2a75cc22
SHA51226e9e5076f45c61fcde791b2924120a54ab9eeb156f41c1e44195b298e2784657cf13833d1dbfb843741f466f38fa9f518575cc4051d946db84282f39ddc8968
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD53562912a4804bd47731c0d8ef704ca17
SHA134abe0fc8c31b28d6d29e901b2080207956a1232
SHA256d9ad0043032c774408771cc297b92f15e74d62c7bd4757145a47a8b9355564b6
SHA5123714331e48c99a61ace7f12fb86e6d1ecf82e1ef3197d759411db4f812a5c3a190d979d126bbfb6ac6c9660fd08f0e4daa06632441cc9c9a65a95095f5ed7276
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5d2daa8a1ba467a8066c3e6093c8ec591
SHA16cb30ddb62dc35d73bff5825cea178a70e6d5102
SHA256800d9eebf084843f990bb2c5f113ebe0ffa8c9a934634eec6e98d641ce828a62
SHA51237d27f4f4f9ff9cfb13d4b978b505efc79dbc6af921da50ed1855fa5edf4920e99411e3d76831b28aa07313c14a215c4a87f49770aa9a797a14ece86548e0937
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD501f01f52ebed3b6c654cb548c20895b7
SHA1748b52cd50e614003fb358d14eecb11efdf93d28
SHA256c9502315e1d7e40417379dc5d428231b0b7d2575249d229763c3b027533ea2ca
SHA512af88a3e8b56d3ebc7053ec8f29c2419a291a6ad16c6b7eccbc75dc1b62cb4482d6091693bdab89a2762076d05b9cb3f2ee66262aa91c4cdb2a6e68665ebb6e89
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD52588bfc5f3b1884590ccceb7b8fc35ee
SHA153cdffff3aa6dfff22ef76a94b10a8ebcd0f0610
SHA2562255c9704b40fbc5ef56e59b5f15a94dfb4484d17e99478d4a8d3acc264c6322
SHA51202d2c9de587c75b73d3656a8dc1346b25e7c1f7aa2743a2e621aa4ee91af26d4ea452f2ea2beba6dbe1a5948adb77e9643ecd1ebd7dcfcb635e0ff9cf01ed426
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5631cf030c4e0ff620e219f9681a6fd7d
SHA1860bdeeaec95471b3b436544a1211ff130c3cc57
SHA2567e5339ce0541cb84e2c963339fd936d6968f4f4c45e984b3338cc844d5b15489
SHA512cba6065f35a5404504824020f7a804e50d2983ca18a73e05780c73f0b48448d825356b6230f0051c5b536ccdd1129176b818304a7f7441f61b8b80f3972302e1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD513f1d42ec2d5e82c40766945c54d3c60
SHA178c88139fbdce03d40467047e84ca1f6446aef0c
SHA2567ab0fd69628ed04eb2f75b117a7748b8a9af94b31e154e6b78691e1432e06fae
SHA51264abcc87017d47cd6c0df44ff108c7ff796758a5e1bd1c53053395e146ec4b94dbdfbb7d4c47bbb425719d22b8c3611ad1149721e35496806e1526b723db0018
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5d30471dc9a9cff5bf74de34b6fcb3e0e
SHA12e300eb2b2524c6409e9b94bcdb575f06984ab97
SHA256b7a25d71cf1d319ac6de2f6f2ac7e1f6358ede8d0c8976df0781e456b812df1b
SHA512a2857d4992ef12b1577fe3f068add6744bcdab923a0c09aefc7bba794c89cfce4d92cadac0a2225f3aee1b6d0006c51d648a36521acfd44d8f5971700e835b99
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
10KB
MD520ec03c919b578a6e1d5c1efb75515ef
SHA144b276723b0663c36feddaa80edba9aa501f770f
SHA256695a7733f103663469ddc6d99498ffeae113ba59daa882455229763b2a66accb
SHA512df4ba3ba7d351668341f105751e601d84a770b679303e71c611375f6d47e1bed3ff4302b23d32d101852ce344d8be81fa181fa445094df14402c3c710bbc88e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD589d6d795b96da04a9803ba90eee46a1c
SHA13a89ff85b935a081d1a9fdabff2005cfcaa4ea92
SHA2567e6176b39d17ff92f76763c93b0403d0380b4ac97d5ccf67868aa3144a2e5f37
SHA51298001ed57f1d7ce794c576a37af72696ddb9fc2978532eee362b276b3fc51490cc449ba52296b561f4bbcff15e62671205ab2a0847cd3041452e7dbac9e8c810
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD513947d89f8c18de09500eec4581c3cc3
SHA128a0abbecb22185f5ad88495ab7492cfc21c8b72
SHA2561be5f483ea118b073f6e7e6981274d0fc6a257a46f5564571c7f3431c01e9fae
SHA512786dd42441b97e274794ce85adeb4f9343ea0630b2124bc8a1fb619c9da81ac149ada187c8214d12fa9d3925184c5d5a1ca3fb2d0125861f7fb2d6aa1ff32e94
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD50fc5c580cfba028671e5918056fa6b25
SHA1b16dd90b5c400dd2cf146758a280ab0936773969
SHA2562bea5ed73f23ae8af442747882e0e39a80dd13150f9ff3495cd4acae968b1ac2
SHA51283d532e29ba2c3e3a15fddcafa8a8b5b7a2872eca4c67cf743e93c83d98102c717a5910835bebbf98e0176205c510ce42191bf8e36f2cb9a1709914a83ee229d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD528df4499c35a416e05638da2b9b0e6d6
SHA1145a1d188349111d6bddc20515523cfa1912fe05
SHA2562f688e5d4e3692ef2db03df29323a798874084ece0683e59da23847c63b3b89d
SHA512497d3f0501a03cf9fe420fa130bcf53f96913cc861ce55b11ec90cad9ab40cf0113b30dfdb843dbde993c45a757fb0f83d42304a613f4254f9904a8caea608f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD54e6df46479329b64943d06d382b9a3d4
SHA1b86e365a7f67d72edb67e4c0d8cc55a48eea08d9
SHA2569eaf27184288de8f1d64eee8d145464ce654cded2131422d811088e385211966
SHA51295ed4f16a28f0e8e3888b96c724438b5a8a3af8f82045b914b532895ab2f81310967cc38381f55a444b8adf8da5c875f8815ece0458775dc9b5accdcb695441d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD5b8dc63042b856218dab9f1d80849f904
SHA19d38fcb82e48fb4bb6124968d4bbc758caf82124
SHA256f40db2e08eccc1d89ffc283b7d6cea6b19e292c6c3ea18002c698d590d76d090
SHA5125c8f58f62c716fac97c90777f3cb3879af4c463caf7056bdd0257547a42c2d45e4d76cced612e277b9f3cb074b9b9cdcafd532fcb897e7baa772e4b392799024
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD5c9e0f6efa83a7185ef0cc747f55c67da
SHA14a131f0853f54c7b5065ef32db4b8a6d19c97c2a
SHA256ef75dd220db53e06536389003015747a8e8d5698a111f801d57ba60364564e09
SHA512cb3307df68aee70204379ad9e46c7061e991ff3ca57837e7940f9dd2b6009d4cc92cdff9cdcd3821fd13a6faf8a7beb03d37653d9346a2d936696da5e93c74d6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD573e457cfa4a3ed8bbf61be8a7e561952
SHA1da309588b2e51b22fd41ee1e41ad9b14eebeadd8
SHA2563d9777c32366b628dccad2ec7405cfc3d3913781123e7bafdbb98bf49320d199
SHA51245b8140edbaed5a22c9de5fac5e6782913b68887b810cbec3bcc354e6a1aa05eb77dc5bec3654ef88977c2d9bd2730a22f81abcc3690d77f39072188a94b9b33
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5a2342890101ebfbca98968159761570f
SHA1257e34cdc1df5a12aa5a2fa6bf83df6a2bbf83dc
SHA2561f512da007138396eb9b6418ab46ac89e9195063afa46c8245539f7d54de77ad
SHA51261d8c69a4f658593fd50dae384e79ea7971e3563381cc068676f8f6fad6626acfb92eadca481c0b5224b39fdfc9dba4883d52ada9a40d28f4aa3f6421742fa79
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5be76fc3c6b2a2f06fa52838ddf72c26d
SHA14c44ed40ce09a88e6a2b81efbceb362945d4931a
SHA256cc0d12b755eb0b24e418fb18fd8b675c38d6aeb91d9d5863bfdc3aba2f3eae0d
SHA512a19eb7f134b5f0a733096dc455cf6313f73be3c892b75da7567bfed73fddfff5321d0f85cfcc7f41bcd12b4d0665b4c0f5d018d999f3ba4245d60c0bf7601622
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD59e9bedb06f31c66cc73205e68ecea0ef
SHA11f37daa59430d708b85547a568322e201bc031d2
SHA2566651f16b4835e468a4d22b0f7cef455de35463f6b15645ad504da1d00b4fc7d1
SHA5126da71305df4fa9ee539243ed2620ab86d49488b28719e742abd7ccc42597bab326270c76eb92a523fc19afd19e1d1d5e5f86eacde2dd4041ed7e0cae2383620f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD56577e50b954c57f197843381aa456691
SHA1e4bad5f23868c64d5cfb4c4f999ed6095b0d312f
SHA256205e6a64520f6476cef264bcc7230c873f305e82396909e46648ec844c93cd36
SHA512a4ece3ef4cdc19573d62689f140d818903b1a3ed66d764062d9e51300b539569e9d1446c7b66d0e85c7288d9bd9e6e1ddf8d0cdb2e2e2d6f30707aa6843140f1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD59a241e0741a91ef780ae88b53ebb4dd0
SHA1a3e4b6971084ae767fbb1152004e8720633b6406
SHA25612b40288cdd4f1f5ec4519dab73d77dab098ea9d76bd37711dc39c18e0e0ab4f
SHA512878ce9999ea1b3e0b63f68a7189104661a0984e015d50560b490d8fc301606cff87824d8c374538e95a8ba45dc2a5a99ac3bcd80390d12caed257277ed0fea8c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD571c3d19b592f811974d3fd2f7881a9a9
SHA172f86bb16e616586fda40c1e0b69bae924414917
SHA256b29e5fb23d96362c937f91a888e3eb2e05297de8cf80e2d5ae8e431a226e70ec
SHA512a6cf0b622c9ea20e47e36f2ef9ebbc6083dcf9854a750beb3737ebbf4f9bd18b67568936b8a98a3497eafc4dd77263e39ed25854f21d6edb547cb52e1833660f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5b26e8475cd916c55432ee0ea97be0916
SHA18be5f6ea4b78076a5ab31b41bd7e8c5cb8dac675
SHA256a32dffa74b629422ba912731aba1a0e296c40879290c7213e06d09567849f5c0
SHA512cb4738507d21ceca56364fc9b0515d7235136dd534b0b6eb944a8644cdddd5f1f342054f62c2e8abdb109bc9f8fee0d610ace210899c6e731322a39cbbcba5a0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5de915129d8b7bfe5032a4ddf362469e1
SHA1ed324ba676f2bdcefe973735bb55871b3ef1fbcd
SHA2563043edcd9df6369255caf27d307c37e2c7ce998d6860237b3a15f4d59e7da017
SHA512be95c0dfb392828b1d2d5a25742eff26cc7726c434409e70324f4fff9b42ddcaacb9abe09d67f6c36feb1d1a9a6fa6a6776d551680deb627be9b08933f4a6763
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD53e8f31e5b05c3b7acfc25c0e027b1dc3
SHA19d326396873b7f398178c0a9aa6a0289cf81b5c1
SHA25611ecd7ddd30186fd5b5652aa781eed0556bb4a81b5e15d3ad0acb9333931668e
SHA51250376e8b7b6e3b3ca31c44cb8880bec5bddca2ac0e5d757c1a1b7de1f6d99fa0714013183dd15208bc1e90d3453cc549595c450d95f1754e218d3931b36715f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD510e93b87c223789721d25e1f2cd1a91b
SHA15a199695eec74ebdac8282932618cdcd22bb0851
SHA256ba720fba947a8d5ace94dd899d8026a05a09cfc1153e717ba7a5836de1fe0a55
SHA5123728b159912a4368b35f92dc0566b87ce8343e7bd1ae6abc28c35183ce4d8765f82d9d3ca35cf2babb45e3b8cb1aa616db48f62780eef05ba569a9b9ca0e51ba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5ff90b2e04170f78c6564c999a8408e9c
SHA1f76db0285e4f17f2c7d3186d8b0435385e0e8f59
SHA2568d2b4233585797864aa685f34106daa4ca8b4fc0f6fcc4a3ea5da9008d29c685
SHA512e56b8af20e63e3ff5acd52ee9b8d97cee79f48245e1e708852d9a617405348702e1de7293874afcaaa8261f8f152ce58221566815979152dc831f8a4718b2e7f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD540c6a3ffea68a68e7e3460bddc8fada2
SHA1c11acdd2cf163c25773c55b1e33a8adb43794f3a
SHA25667d17e83a1749b1b684f80a5ea535e9333fa613dcc775046561ac973efc43cbe
SHA51253f46c0335ef75e10482baca0d2a1110d54bddd8ce835ca2e4a6f5dae7c5dabdd33fff479eafe56c7bef3b20d7c6ecd340460e20f24bde621093f3c7c5960538
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD580da8f8b2f5a88ec4bf55a35cc2525b9
SHA1d09257ef4dd436a985acef8e969d869746b93883
SHA256c873f5660b6c7c40945d5ee11cf781f0bd5fc95658352489ca2328a2d4795347
SHA512d65dc57638768d9be47809f1e9df09f2b66ce6a0ea1a47ae2e71920901c851443d17060111a31526c1f638f8dd95b9722617a97d83c344923cc51ccd836aa50c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD505a1077f918d7185044ee7a278ae49b6
SHA119a9ba0e22edd5d076a9fe3051cef971b793f838
SHA256051c1fe154fdfcd341e37a1ff15cc203d8ecb08985813e8b0885c8955e8c7bc8
SHA5122d3701a09cacc6e742269dac1b77427e28d76f6b3f9353338a932447e0ca2eda17862264176292b5492c3817e142bf91ab975b1f88ee2bd9ca05556105982218
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD56348717e61dc331f5d5c5dfe08b84c96
SHA1d4dcc069e0892458fbc1a263298b2481b38b9e8a
SHA256f400f31c6c5d2ea683fdcd629e2d2f05593c8fd5383d72531907b7a242a685ac
SHA5128c5a029e3815f43ac54fbd02d8c79a6c53ca07ec24c9a79641f8c599faff8761ffe01d0b445ea26c02629f9a856f64ac538540f2859714bf083a79266e502ef9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5015493a47f980be9e2c59e6d85a2944d
SHA17823d054d2dad0c69f188af7b64fe0e2c95cfa6e
SHA256b18dffcffb78fb7a914393242eb6b8f59d688e148399bbd33bb2b05d0fed72af
SHA512c6aca3ba4de13e1b04da7941219193a2d544e5cf64cb1e49c07e3f1dee9e41bd6109b0c846aaea8dc35919413b3d5e0068994d65daaf7ccb78fad5f30ecc6c4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5a922b10681f90403476b4f0d5e150714
SHA15f1171a8d5cb005ab8cda9f3ab5c115c6c79b322
SHA2565998a7ed726904c2e9ce88dc20eb9db29b19b42df4bdd2fe82a65f94de1a3676
SHA5121d244ddea942acc937c1299c35f518b20aec7720cc76acbdefdb88ce45944bc2aff08b567a151797209a2c8fb918a34af1e3a17b355674ffa44a168e17a4cec5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD55533b371f49f01ce2087170440c30c51
SHA160ee41d6a2bd2c7ff9c84dc25b13bf7501f8e96b
SHA256070edff29600a789f54e9527e40ad692a8e6f2185167d3f322ad7b316a857900
SHA5123608703dfe4f117e8cd3e6eeb817ccf0fe1f4ccfb571a6ea563419c4fd6b8d052a05ca85d1a1f549a53d3537660f161d04afdbc25d75573b3b56fe02a3b946c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5009ac208c64639d27e70b1c54eb84d79
SHA1b24d1a2ab65a4dabecbb123ad351ea67317d8cc5
SHA256f825ff5d9ac9d26e41ab267ec0eb2a0bd940a6bcfc0c14b68ebcc3d30d79e18b
SHA512102f5d4b4a00659da598de07b087b12b10220f3f74106405905cfcc26957028c2d9496a75bbf85f00f284ee1889418899d45769eaabc646e770665c41ae15a59
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD52ebea41ca5680aed97a7ab3fa8e54437
SHA1882b43e88b099514ab0bbde6a3013602d90b481a
SHA2563d0697b44a01e3d38c96610d8f1446ee9e98d68e7d5df023c7ceedcfb9ca507b
SHA51229e939edfc61eb3e2b63675f9a2bd9e6fc25ef186703bb920e4d639d2077e2bf18553b92c1700175ba8c425494b6429b5e611ba8e89ffa196ef61148c53af329
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5694cab18115e2824d251f03cb1c80219
SHA1f9795b06f5e0e9e5c087c7ac77ea6952ecd82d08
SHA2567a7150fec77ec622c9175a560bc39fcb629c3f3d7b41b054a32c416a8c9badd7
SHA512004ed428311c981d0d9fbf03adc2ed8b20be1a8bc4c84c4991d7bf165f4ea82ea5ad064c6fe366f2d4aa02f762b6981d9a385a37b4880c3ee374102dbae8ef6a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5694527b33a6a3916e23b5f81278a530f
SHA166d4d285d0e946d366080ae783b3d4f9319b3cf3
SHA256c2b5f8089a98f1216932eb29249fbf0907c38065e071211f96ba430fc478828b
SHA512d5f3eff9c9a9536052a2aa29ae06b533e4e3cddf06a24efbf73e7f331e7503c0c4bd93d923858b0304cd135b77a1ef2fc280b0bee4dd39d76490bf176b12d641
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD551797ebdc100ccefa3c5fbd47311eb5e
SHA1c9e96720724abb416dc67ab25b7d9b988fa5c9a2
SHA256e573f211238b52f633bb86e707b4aa5df8938dfe0d70a5d56efb05cd3b6a1a03
SHA512956370327c2fac2b31c19feb504eb347adb3135119b168c42b61e09fe99440cad014c35e52336bc5bd1bf4f3452db95b0fc0b8f6b5984977f0c0e451fc4c40b7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD58db7f30bc6a6f75b3a415d03c645b465
SHA16dda988731305c286f529585c0fc21148790ee35
SHA2569fe7f2039fba6f39af16894734f0c970d59544fa6d57a822d47053ecb98eb82e
SHA512205afc951f9d45723ff2ff9dbf473f2a35e380258d71bfe5d9c7cbfa4a7fdd11d852fdc67ac15963e991a0af89374f26df599a2679c96a0dcfda890182f657cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
12KB
MD508474e96609d4f965467990dafbf0364
SHA118e7e29c393ef46b8e41a2e8f41151a63c8f933c
SHA2561e693ead6b81b2bf5ae056a79ec69e3ac6eba8fc15f84100b2c885ff45e7d0ab
SHA512ca3f6934b8b3f9c4bf0543227155b9113c2c5d62f2cfcb95c2150447f9a9eafb30592c1a93108402ae8e087906b1cf3f664b6805c9de81f1f2e38fa9e7918d04
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD54faa54f96a12a858caa263f742a4a8aa
SHA109458b5d427e4d67cf1fc3f1f693158afdf06807
SHA256d1b576d7f05192e93fc03a59928157bb3ccf13274305f9717558b37199dfac7c
SHA512560ebafe15d0bd231b5379f1bcf9db56e7a80d70fe4ec82ddcb15cf74ee36221b1cc5ddbc5af1abd0f3c414ef975fe2f6ed75d94aea5d2de035fcb0b340eda9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
13KB
MD57eecbff6696183f33b5b965fb90ea8c7
SHA1662edfcca69a7e0b9cce80c0dfd2bbb67ca46a07
SHA2560d68c635211ab3b2d1345f55782e44eae1b701a4e9c6ae33d95dec4e364ecb94
SHA512f14168c6a8247977436bdf9c236247abbdb0757c5fe56720ffcef0a0cba8bfd8544c1c57fb894c6304a736183891b0e492b776b3752dcad7cde48410096f1f07
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD509492198776ab2d773c140d5b37d6d97
SHA1d42edc91e4675747b14f192d244f30fd1b5850ee
SHA25665e812c7bdd0aae8d2b55c7310428c275a794e7cc252844768aa396cc92ee504
SHA5125983aa64b2f13c1e407393efa41b5e2ec4ae195797da92221088d05f649bf5d60e534053dd9636acb8396a3a1265082f72a74536d941df01daf2b59247e13010
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5d688f7b623e0adcf7c9271805cfeb3b1
SHA1722d603143aea86b9fb51e2d76a56163dffd5a4f
SHA256a4e074f067a7829253a67f722520d928516c4a7f9e728ef95aba30fc49ccf128
SHA512ef117f0dc548ef6eeb67f3149f6e211902acd272a760a02d69b7f22f3b11220284d729561204f72ad01b4899daad8f8ea72ae450d26efc625db5691d8309ba35
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5200f320b61d5da59d2debbee8ebb1253
SHA10a72683ba028ec51b0c03696031318cf2ea0f248
SHA256363ff711e499083db309b00a15d65cdbbf0ac4996f8e9502d9a2ffa1c03c6b78
SHA5123dbbfce9c4e74ee40702d428a1c2d22749fdc5a981e87ccd7a190a92a42bc36cec91ddc05aa5e96e45628ed9eea78f528740369fcf5cf63b48848b32255d1df2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5fdb9eb14c156fcdfd0936fa9d0e0933e
SHA12570c16d47187adc0aee904baa2145989f42221c
SHA2562879dbd3d55fa675fb1f909216660371e3b91ca82a3b55fb61a31798218f0a00
SHA5121c57d4923e4ab0a73b5153c432ccec474229ac096fcf21d8241d5255ee4a52b01c73cc8f4933cc196020cc874423a656543b1880c03834af9c4cf074a43467c7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5b163fd280c2a060bfc5e7cb72a556f69
SHA1c3cc04438ce7098850f3e3129a1de77c1d261745
SHA256bdcb395a2fb9f5f22618cf1e40bb4e7051b1200f499f382716c3b889d5ef33c7
SHA5122bddac5291a76f524301394ed93123d6778a41aafbacf15609a4b01eb68453ce4be37c0ee96e13f909e72f930c0ff00debc271e957a19c02f62ab34db2615590
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5445bed22edb8bfeef048c35dd025c0f6
SHA10ed60dd54be2a766540a563cf4c87ab8869843c4
SHA256b23d1634d13c730cefbfd95da75225c5beb7c11bd148203622605bc61136926b
SHA51268fc428dd9c38cfce6652ebce3a2f50f4d398eed8be90a43e79fbf7c4afe9da3a2d8dcddd5d87e036e5795ad126e0a7f0266bd28f1a95508fcc22fcacc96fdad
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5799f4fb8c9224f658d854b4d0b30ddd7
SHA1915a002b7e47957e2866713812968d0ff3526932
SHA256bdf3fe99f141a1daba01eafa254d6aeeb6201e1c12438f4211bdc12045da9eb6
SHA512c4c331c7b18ea47f4a8943fc613ba453882383e1662a7fa295f577e8f94845c1f2426eea0c39f027f634e90790168f292df48ad9373da87ac38b78bf606d7ed5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5f6a9a0281a4e137e7c14749fcbbf4446
SHA1201a66a0526464b56c4247a6ca8d1aa64f36d61c
SHA2562c597056856aefe19ba9da365aa2cbabf479152e4568f392bf54d6a8b77dcc60
SHA512d9cc9fffc0ad20690eda621981c1ecfe91af27bffbc45ffc40df4f12cc95efcc15295f7732a6d159236911e436d445895088a7500ce5c31b69012afa8fbc62df
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD548f5db6851fef479aea1a8a37332634c
SHA17715903e10c0f8366257e27777f21b686546e4b3
SHA2568cc10bcb2f30414d938f4be1fe2a1fe9b36a9a67e7689b14f6a2417d0e3482f6
SHA512fd86cb584c0e05b0b287ea417a05e13244a29a11f44d81fb25f1dbf6936c6cc534e12e596bbc4c4fcb943b18de0b838a59718fb793ef8aaa99dcc3040a2b1322
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5dc9fcacbc0f47386308987372ecbc575
SHA184a902fbfc667b4b7354f48f05c5153b3a864523
SHA25654b1f4cd77566fd011274582dc95331f747cd82bd7e214101df5f6d923a87916
SHA512b4160606ab11efd6cb79b7e9ba0140c211155f4db7f727ba2bf4bc46a60fdebab2a4f22e40791f1476a11254ca46b532c4625fb9136527ee4a8e2a60a6f69e53
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD51b3046b13a0245f0cf58eac097e43b89
SHA144c2a2cc71e044d94f9c07833fc2eb2fc8d9a052
SHA256103e067869b11dd2310597bf93801e1f68313d575a1e527b300082d0a890d994
SHA5128deff8f9132fbc9d0f0ffef3df95086b6dcff1a3eb87746cebcf8555caaaeb49963d98858de0e7056afa5167bafbc07e32404be3ef71578a75228e653970fc92
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5e44ab0463f8a6ba9f026dd40d26d6476
SHA1b057d8ebbd5641b0e6d348d04b65e7b28776b7e8
SHA2565bd1942490c6275d7df9db9cf9b7a6ed316fa3453dd9b28ff65181a9d5669306
SHA5122c43dcb71d46cdbd3a252c5c4d6b2b90556fc9472cb9cfa38efdd63fdf74ee0d6c17f7beaaec7340b8498a44a08ad9fdd8ad04eca7adfec56a7489d84f8d2f9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5f471c4925d3fe983e2ac973194217c75
SHA1d9747c8d1f3da095098ff9018cefc3267040fdb9
SHA2569433eb5334d703baebe11fef3508269e53850b5f1da088e75816eb2411612390
SHA5125a9fdc13ed316b6f92cdfe5e45d50ec0331e8fbf5c769f2c13f0655a9f57cc9069158ef66ccab3e89b27d2bcf4a845c9385bc5b4ced98ddcf1d51c39c322579f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5774a963177d56c643d5da2cdc828f591
SHA14eeb6229a51f51c28e1477e217ca15d3f412d612
SHA256881754c7eb82c26bca085bf866111b05fb4315cff95918755f7fc62df16757ca
SHA512fe1d2647569c86015b8385c260c5695f8ec6a94377d78745605ccf4f9f277678d5276ca0f3b81d30fa036cbcdb8434adb843f540d67888c6304180bf68b45d8b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5f7139ff31f61ee4a0cb310d28353a919
SHA1d57daff3d3e07ccc6d97b1c172b6909b7a49936e
SHA2569a330544cd191d90d73de04516c9eec1859ae878e574c45b2df6b21282a0ada9
SHA512f1a3754b7f11007d46e151213a19da81f541e117c4c713eb9f67c05ec9af0be4fb23acede74a3dfc70cbe1cb431e9434b12c320a912cb03e16433999fb1651ac
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD567b3809b5a42246c2b80bc34bb45e52e
SHA17701ae693095c5a51735c91eaf1762f025f109ee
SHA256d3ceaf3bf329fa3e67f2e134b43b416be87e224cf3a8856b300d53145f4a2cfa
SHA5120f6681d20258e8370103416f23561fa829a718d6f8a39001d947c32f6452769e7610bfb0d5a7b21113fd928316e06adc3462ca9a5a389741d1a9dd1d5e420565
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD50e4802f9af8b52242f4f193d9f3872ed
SHA10586daed3ebad6bd6c54f2d07102d17eee9fd29a
SHA25660c9e477fdcf36e4e55d8f3e13d354e0ef5709ea39c1a7968a08417ed7f3508a
SHA5124b023ae0bec0a0c802e85e3710d2cfaf64b600243bb9f9ef07b9ed356d251f74c420832f8401db43d860a167b7ee0d41a94b3a321900032853d68fb79ae400fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
12KB
MD5fa1b3e466d2a3e7f1c5642e5c5213c54
SHA13fb433432249ae65c241af7b5b70815df0501b74
SHA2568050761d342d8ef543fcf6bb35d44b669b9d4b0e97ff759bfb2122a208444c8a
SHA512182c32ae53e2c52ffb42d0e810cdbbc0cc34ae00743c21a76be90240248d4a382aa4b065c6a7b233d5c64482d0a3bd5781ab9d74d52495ef1f09e12450c9c832
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
13KB
MD544be610549f6515459485c19ebba97e0
SHA1681df8cf644cab0341efbb05e9087bba1f362a18
SHA25602f98e3b1057ba447ccc79130e4a258031befd04363c89f111b0258def4e295d
SHA5120b17d037522b88ab2be5c31c6240f5a2f97d4059c9c6bf7d2ba21b8c43cda1de567b0b1e487c08ebbb938fa193f46890c869efaa3893972ffa990c8504cc898c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\3\CacheStorage\index.txtFilesize
80B
MD5e15da84dec21262e438814426b236fe5
SHA17cdd0da1799c051e1243b7b0f38854c3639bbb14
SHA2567db93488174dd053c494398252af37c154c7f50de96bec3b1498d79c3d8ce243
SHA5129e43e91d5b2cef19014f5a8f7abf69e1fdffc31f3ed06257246b204dd8519a3e1f4d4208896312fd046830634b24431bd11c85f5478a7760bec7c80227f7b5a6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\3\CacheStorage\index.txt~RFe62700a.TMPFilesize
144B
MD510aa5808bdba3463654e3c4557886a5c
SHA198f9c319cace9869cbb9fce125ae45191b9b184a
SHA256d25bede06d595694a1325dfdf65d027c3492e742e049fd3e909f411da17c5903
SHA512347bc250b617887cf5d5b3956f7308d56b5340cafba3710877c4cb72154c8a792ac89bbf9a778a2ec7fbd2d48be60ce048157f1cf75855f7b60dfb359cba3a42
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\3\IndexedDB\indexeddb.leveldb\MANIFEST-000001Filesize
23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\c91a79e8-c6c9-4aa1-84d2-31d69fa1c015.tmpFilesize
11KB
MD5818036414852437960b80ddfabdf22ce
SHA1c0f31afca802772b6f3824774ef3de1619cd3066
SHA25692ce4a35ec25d9ef179eb7a3d92f12434f373f3bb9119194d9a63ff69ab7f15b
SHA512131f32a567db9061c04718be1752364cbf704211ba8a211c1c18ec16d1917e1fc36c0404e1c55767f52110f088b438c971b3ea91b2533c555e18cf44a6c032db
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e6ba4285-5dee-487e-9b1e-5ded29351a33.tmpFilesize
11KB
MD530368a65d044bd853e2e5d96f2e1fd42
SHA1adaf03e19ea4e2f3204b37c668b65ad8ca998503
SHA2562b77fc0c6fa9eaf7ab29368ccd6d09e624776ae7e08d757a926d6d74be6f951f
SHA5125522b7dae0647d31491a9efa897761e0438561bcc663a43e2b2d5fbfb1dd347ae0f9443e05b44d885a1a467e7ffa0cd078b4de6da18676239a9e0245e365148b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
196KB
MD511bbc54e9f107105d779892eaf27836a
SHA1db8f259e913a9ecb049eb6c4034b36d3d1dd8d1c
SHA2569a0ef2c2dd9a5ce3049d951eab04eead8fbe0b2510ba9d984f22d0856dfbc5c8
SHA512e0fa41d74172646d40b9813b10a83a7b6766d8fdc9d4efeab2b4cdb46edbf7fc42e59585ee00d929bf251881be1af38df4cad09378addce452a9b073743a7f3e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
196KB
MD5062a5901bda72b5cf2f2eb8b65523a68
SHA1b3989e92c79295e562e1cd689608bc60d993b129
SHA2566998f9994a5815fcb8efdb3bab09f735388251fb9445d6d51b3541d9c05bd151
SHA5124ff1763ad90b8de981e726faeeb85ba68d8aca11dee160c05b42ee3c9e89e8d6022364172461cb471cbb1f715f5d93f405ee0a30aea81eb6288aebe0167c330b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
196KB
MD54132ac477d2353d1b43188383feb985f
SHA18074017faf87300ba33bd2cb225f0abe7fca7218
SHA256e953468a47a9745e03bc42c517fabdf57d805e06e8f55e0cb5d6896dc0adc604
SHA51267aaf14d6f5d3c205b3ad9a05ff153cd4ea4b84896d882604fea523bb94d4565b3b5f51d916a2a834f3123692e13e66b55bf824ceb6b378bf163fc83686f1940
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
196KB
MD52add7c06083dc9516201489aea98ded7
SHA1f5b34490476768243dbcfbaf62df8ab1fdb9b5dd
SHA2562e9676db4395dd5ab4c5e361543d636e0a104243eeec9b8ba49b471ead57c365
SHA512b14b8a194d3589f4e44de4f0fd92b14b729df685b57d96edbc0086d4ba59e16942f805192a060db19b8849a84c36208cc76b3952efa8e6ee03eabbe7c9a83776
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
196KB
MD57a54f7628406965f3d8faf0ce7935f26
SHA18219e4b89ad8858e00717d338a6e34f97945f248
SHA25604c25aeabf0cb6429bf750379bb5dbee0c1b68efa746c4b8464e27420a644c63
SHA5121cdb79b755a424146c01e0347e059aec9f0767a84fa52bfdafaf44d7384868e99b936fcd4b025c90214b2271cedd90d754e4d18b2ad944243e023b78ce6bee34
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
196KB
MD5464ea8f0b186d126c39cae237743daad
SHA133877e11ec26ba3d0eba2351e3e79c14b1c09771
SHA25680217ca86ea41fd7c2f3219572d907b4eeb8c9f0845234cbede94cb1465f7efd
SHA5129d0625234d7a809a528c8686ba01502c836c69823fe5d33fd9fd36ef6a8c31f8b006028b684e8d056271f4ecbca404e22ac613139ffb770c3e063d9301c9a97d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD543f6bd86975f6fef3ece857b87969ff0
SHA1b9356300180bdde46f0634cb74a1abf1474d5e13
SHA25615d19bfd5bca6cb49689479e9e28a63021ed644a33a6f5562f77b21ecf21cf72
SHA512555a25ef2cb44fadeb578409ce9302614c1861d323944d81fdab472c5501d72d39753b3df37f8192504c65692326943ee5c078b9701b54e95de9d65590c9afc6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
409B
MD56d77c748a815affda97a19a2c41d8a92
SHA14e827c762ef5b586bfc3f7ffbd87ac2d36723e74
SHA256701a731d9f61e7a3c3a2a7c38666e9b73d07167f5c809663defd7f84f4e6890c
SHA512c06c131a7f703bf31730e2161860aaec194ae682075f9822cb4ea628a294cece98ae718f9db3bc909cb45231eff0ddf42e955cb3cb9b2113f38c1e110aedbf97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD58fd94aa8faf60421592d19cb57d10f16
SHA1e821e3d7ce2b820c6196a4dc819279aa17e4ff44
SHA25626b4f1c561e298d7d4a3f75ff672a7e7a365bd94479ba6fa0315626edcd0157a
SHA512d5d3f351fcec93cf14c14cca59a67faab5c0d33c6391f0220abff37eb4675e8efdcb5d12f7e2df4e86a1f464fd6568def32d07f6154c18c23f221b83583b7d79
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD51f7fcec10c54c0efabdc2196f1bce9fa
SHA1d295ae3df6b64289506a2b46062f1ba9ff98da98
SHA256f1c7b7e54989d30ad007fa87231e9851ff7a14195a0e920e26fdafba7bb7ff59
SHA512fc1c62974f2292f54de0d02d684cd65f916dd56b967a3b21e22e4f11d591e7cc18f077916274cfb643b08c0f106c89213c4ec1c7bf767cb6cd80a80fe2403a90
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5650a08a9ef672889ca5d7d238c7e9b26
SHA1896ebf16d551fdd2f4798cfb39d106de2dd0cc3b
SHA256527e07387441a1afd42324f201365507444303a5d878452cbe660ea9e9e8ce1a
SHA512b704f9b1d908bc3547a96fc8336cbd346aff619614f06106ac7e0c57762a4b16b481806c32dc80ff0a5e2b7c6acb39fba9dafd8b21a1f318aeaaa48918ec10b2
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdbFilesize
896KB
MD5de708a6fced82eac2670ef85188abbbe
SHA16e3445aaec4c000a9371672d454a0ae5a35f7631
SHA256a01ff1d989e2904396fb5f44488dcc4dff4cbb66a328c5c062f706e35be129ce
SHA5120d27c9dcf78c04f5d43e8b198ace4d1c005691673f0d9d44f5fa10ebcea1812635ffe5f80dca4b3c37f387a7d7c6229a386c727a5bb07ba039c81618aa240464
-
C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XMLFilesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Roblox\Downloads\roblox-player\b93f42f728fdd67f390b066d6df035e0Filesize
5.9MB
MD5b93f42f728fdd67f390b066d6df035e0
SHA17c7f3e149096ce743262cfc30974689afc5c5152
SHA256f32d067a66abe3ea7761ca4f698af726e82234088f3e4218e026d698c9c5f6c3
SHA51217fdbe368d9f75e2b0f1d2c7e8730d398d3e6c8b4bc4e424d3519910d7756e622d2977fec60a8613f4c4062f4afc5d1f2da0f6b97b03ae7c1e720852ee47d804
-
C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exeFilesize
949KB
MD5495df8a4dee554179394b33daece4d1e
SHA10a67a0e43b4b4e3e25a736d08de4cec22033b696
SHA256201263498c60fa595f394650c53a08d0b82850349123b97d41565e145ddf2f42
SHA512ce3bef1038741f7a0f90cc131a4a1883fd84b006654024d591f5451e73166b4cae546e307c358b5b90aa0e6517bf7b6098f1f59a3ecc01598d4feb26e6b6af33
-
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exeFilesize
8.0MB
MD5b8631bbd78d3935042e47b672c19ccc3
SHA1cd0ea137f1544a31d2a62aaed157486dce3ecebe
SHA2569cfda541d595dc20a55df5422001dfb58debd401df3abff21b1eee8ede28451c
SHA5120c51d6247e39f7851538a5916b24972e845abfe429f0abdc7b532f654b4afe73dc6e1936f1b062da63bfc90273d3cbc297bf6c802e615f3711d0f180c070aa26
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exeFilesize
5.5MB
MD56670e5c270db13d474d6f93c38303245
SHA1ec8566078f8b1aaa425f59502372be14a60c3ad1
SHA25680cb35cc5a9750f74e8b005e4a52c384527c2d2510d38069f32b023c27f62033
SHA5125a1354134ac1765ecc3d85dd94baddd4ffd570e9935b68f6e43a1179f8a0f6d0e664989bfb42b409a6b0b2c6a53e6d33bc9dda723632e0a658fef5275578ba26
-
C:\Users\Admin\Downloads\Unconfirmed 253277.crdownloadFilesize
1.7MB
MD561506280fc7e663db6715ac2206af6d4
SHA13b42f1e497c909d48343768b58e9e5222d540330
SHA256f41051697b220757f3612ecd00749b952ce7bcaadd9dc782d79ef0338e45c3b6
SHA5124343ace3777173fbf68c501d15011fec940f9f3eea7206712f9934bab432d15753b4c6c0369eb14b8341221992f964c5a37c23a655255572b1a13cde717b2472
-
\??\pipe\crashpad_872_WRMFZGZIDFEZTOGHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/220-1500-0x000000006B7E0000-0x000000006B9F0000-memory.dmpFilesize
2.1MB
-
memory/220-1438-0x000000006B7E0000-0x000000006B9F0000-memory.dmpFilesize
2.1MB
-
memory/220-1437-0x0000000000480000-0x00000000004B5000-memory.dmpFilesize
212KB
-
memory/220-1571-0x0000000000480000-0x00000000004B5000-memory.dmpFilesize
212KB
-
memory/1100-10779-0x000000000B440000-0x000000000B794000-memory.dmpFilesize
3.3MB
-
memory/1784-2543-0x0000000000960000-0x0000000000A52000-memory.dmpFilesize
968KB
-
memory/1784-2547-0x00000000090D0000-0x00000000091D4000-memory.dmpFilesize
1.0MB
-
memory/1784-2548-0x0000000009EE0000-0x0000000009EF6000-memory.dmpFilesize
88KB
-
memory/1784-2549-0x0000000009F20000-0x0000000009F2A000-memory.dmpFilesize
40KB
-
memory/1784-2550-0x0000000009F60000-0x0000000009F68000-memory.dmpFilesize
32KB
-
memory/1784-2551-0x0000000009FC0000-0x0000000009FDE000-memory.dmpFilesize
120KB
-
memory/2304-10831-0x000000001A160000-0x000000001A4B4000-memory.dmpFilesize
3.3MB
-
memory/2752-1607-0x00007FFA65A80000-0x00007FFA65A8E000-memory.dmpFilesize
56KB
-
memory/2752-1576-0x00007FFA65E20000-0x00007FFA65E30000-memory.dmpFilesize
64KB
-
memory/2752-1620-0x00007FFA63D30000-0x00007FFA63D56000-memory.dmpFilesize
152KB
-
memory/2752-1619-0x00007FFA63D00000-0x00007FFA63D10000-memory.dmpFilesize
64KB
-
memory/2752-1622-0x00007FFA63D30000-0x00007FFA63D56000-memory.dmpFilesize
152KB
-
memory/2752-1618-0x00007FFA63D00000-0x00007FFA63D10000-memory.dmpFilesize
64KB
-
memory/2752-1617-0x00007FFA63C00000-0x00007FFA63C10000-memory.dmpFilesize
64KB
-
memory/2752-1625-0x00007FFA63A30000-0x00007FFA63A57000-memory.dmpFilesize
156KB
-
memory/2752-1623-0x00007FFA63D30000-0x00007FFA63D56000-memory.dmpFilesize
152KB
-
memory/2752-1574-0x00007FFA65D10000-0x00007FFA65D20000-memory.dmpFilesize
64KB
-
memory/2752-1616-0x00007FFA63C00000-0x00007FFA63C10000-memory.dmpFilesize
64KB
-
memory/2752-1577-0x00007FFA65E20000-0x00007FFA65E30000-memory.dmpFilesize
64KB
-
memory/2752-1604-0x00007FFA65A80000-0x00007FFA65A8E000-memory.dmpFilesize
56KB
-
memory/2752-1602-0x00007FFA659D0000-0x00007FFA659E0000-memory.dmpFilesize
64KB
-
memory/2752-1583-0x00007FFA65F00000-0x00007FFA65F05000-memory.dmpFilesize
20KB
-
memory/2752-1609-0x00007FFA64DD0000-0x00007FFA64DE0000-memory.dmpFilesize
64KB
-
memory/2752-1610-0x00007FFA64DD0000-0x00007FFA64DE0000-memory.dmpFilesize
64KB
-
memory/2752-1611-0x00007FFA64DF0000-0x00007FFA64DFB000-memory.dmpFilesize
44KB
-
memory/2752-1612-0x00007FFA64DF0000-0x00007FFA64DFB000-memory.dmpFilesize
44KB
-
memory/2752-1613-0x00007FFA64DF0000-0x00007FFA64DFB000-memory.dmpFilesize
44KB
-
memory/2752-1614-0x00007FFA64DF0000-0x00007FFA64DFB000-memory.dmpFilesize
44KB
-
memory/2752-1615-0x00007FFA64DF0000-0x00007FFA64DFB000-memory.dmpFilesize
44KB
-
memory/2752-1603-0x00007FFA659D0000-0x00007FFA659E0000-memory.dmpFilesize
64KB
-
memory/2752-1606-0x00007FFA65A80000-0x00007FFA65A8E000-memory.dmpFilesize
56KB
-
memory/2752-1582-0x00007FFA65E70000-0x00007FFA65EA0000-memory.dmpFilesize
192KB
-
memory/2752-1608-0x00007FFA65A80000-0x00007FFA65A8E000-memory.dmpFilesize
56KB
-
memory/2752-1605-0x00007FFA65A80000-0x00007FFA65A8E000-memory.dmpFilesize
56KB
-
memory/2752-1599-0x00007FFA63860000-0x00007FFA63890000-memory.dmpFilesize
192KB
-
memory/2752-1593-0x00007FFA635E0000-0x00007FFA635F0000-memory.dmpFilesize
64KB
-
memory/2752-1594-0x00007FFA635E0000-0x00007FFA635F0000-memory.dmpFilesize
64KB
-
memory/2752-1595-0x00007FFA636F0000-0x00007FFA63700000-memory.dmpFilesize
64KB
-
memory/2752-1597-0x00007FFA63860000-0x00007FFA63890000-memory.dmpFilesize
192KB
-
memory/2752-1581-0x00007FFA65E70000-0x00007FFA65EA0000-memory.dmpFilesize
192KB
-
memory/2752-1580-0x00007FFA65E70000-0x00007FFA65EA0000-memory.dmpFilesize
192KB
-
memory/2752-1579-0x00007FFA65E70000-0x00007FFA65EA0000-memory.dmpFilesize
192KB
-
memory/2752-1621-0x00007FFA63D30000-0x00007FFA63D56000-memory.dmpFilesize
152KB
-
memory/2752-1575-0x00007FFA65D10000-0x00007FFA65D20000-memory.dmpFilesize
64KB
-
memory/2752-1578-0x00007FFA65E70000-0x00007FFA65EA0000-memory.dmpFilesize
192KB
-
memory/2752-1584-0x00007FFA63E90000-0x00007FFA63EA0000-memory.dmpFilesize
64KB
-
memory/2752-1592-0x00007FFA63F40000-0x00007FFA63F50000-memory.dmpFilesize
64KB
-
memory/2752-1591-0x00007FFA63F40000-0x00007FFA63F50000-memory.dmpFilesize
64KB
-
memory/2752-1590-0x00007FFA63F40000-0x00007FFA63F50000-memory.dmpFilesize
64KB
-
memory/2752-1589-0x00007FFA63F40000-0x00007FFA63F50000-memory.dmpFilesize
64KB
-
memory/2752-1588-0x00007FFA63F40000-0x00007FFA63F50000-memory.dmpFilesize
64KB
-
memory/2752-1587-0x00007FFA63F20000-0x00007FFA63F30000-memory.dmpFilesize
64KB
-
memory/2752-1600-0x00007FFA63860000-0x00007FFA63890000-memory.dmpFilesize
192KB
-
memory/2752-1586-0x00007FFA63F20000-0x00007FFA63F30000-memory.dmpFilesize
64KB
-
memory/2752-1601-0x00007FFA63860000-0x00007FFA63890000-memory.dmpFilesize
192KB
-
memory/2752-1585-0x00007FFA63E90000-0x00007FFA63EA0000-memory.dmpFilesize
64KB
-
memory/2752-1598-0x00007FFA63860000-0x00007FFA63890000-memory.dmpFilesize
192KB
-
memory/2752-1596-0x00007FFA636F0000-0x00007FFA63700000-memory.dmpFilesize
64KB
-
memory/3820-10181-0x000000000E0F0000-0x000000000E61C000-memory.dmpFilesize
5.2MB
-
memory/3820-10765-0x0000000019860000-0x00000000198D6000-memory.dmpFilesize
472KB
-
memory/3820-10712-0x0000000005C20000-0x0000000005C5E000-memory.dmpFilesize
248KB
-
memory/3820-2598-0x000000000BA70000-0x000000000BDC4000-memory.dmpFilesize
3.3MB
-
memory/3820-10763-0x0000000021520000-0x0000000021552000-memory.dmpFilesize
200KB
-
memory/3820-10762-0x0000000018CC0000-0x0000000018D36000-memory.dmpFilesize
472KB
-
memory/3820-2597-0x000000000B0E0000-0x000000000B102000-memory.dmpFilesize
136KB
-
memory/3820-10761-0x00000000213C0000-0x000000002151B000-memory.dmpFilesize
1.4MB
-
memory/3820-10760-0x00000000149B0000-0x0000000014A96000-memory.dmpFilesize
920KB
-
memory/3820-10759-0x0000000008D20000-0x0000000008D6A000-memory.dmpFilesize
296KB
-
memory/3820-10758-0x0000000008BE0000-0x0000000008C04000-memory.dmpFilesize
144KB
-
memory/3820-2577-0x0000000009D50000-0x0000000009E02000-memory.dmpFilesize
712KB
-
memory/3820-10733-0x0000000011340000-0x00000000114C6000-memory.dmpFilesize
1.5MB
-
memory/3820-2575-0x0000000005490000-0x0000000005498000-memory.dmpFilesize
32KB
-
memory/3820-10714-0x0000000005DE0000-0x0000000005DE8000-memory.dmpFilesize
32KB
-
memory/3820-10713-0x000000000B480000-0x000000000B4E6000-memory.dmpFilesize
408KB
-
memory/3820-2574-0x0000000005800000-0x00000000058A0000-memory.dmpFilesize
640KB
-
memory/3820-2573-0x0000000005750000-0x0000000005802000-memory.dmpFilesize
712KB
-
memory/3820-2572-0x0000000000450000-0x0000000000C52000-memory.dmpFilesize
8.0MB
-
memory/3820-9831-0x00000000010F0000-0x0000000001128000-memory.dmpFilesize
224KB
-
memory/4876-2321-0x00000000053A0000-0x00000000053AA000-memory.dmpFilesize
40KB
-
memory/4876-7-0x0000000074A0E000-0x0000000074A0F000-memory.dmpFilesize
4KB
-
memory/4876-2320-0x0000000005390000-0x000000000539A000-memory.dmpFilesize
40KB
-
memory/4876-6-0x00000000057B0000-0x00000000057BE000-memory.dmpFilesize
56KB
-
memory/4876-4-0x0000000074A00000-0x00000000751B0000-memory.dmpFilesize
7.7MB
-
memory/4876-2315-0x000000000B840000-0x000000000B8D6000-memory.dmpFilesize
600KB
-
memory/4876-8-0x0000000074A00000-0x00000000751B0000-memory.dmpFilesize
7.7MB
-
memory/4876-2319-0x0000000005440000-0x00000000054B2000-memory.dmpFilesize
456KB
-
memory/4876-2546-0x0000000074A00000-0x00000000751B0000-memory.dmpFilesize
7.7MB
-
memory/4876-2316-0x0000000005280000-0x00000000052A6000-memory.dmpFilesize
152KB
-
memory/4876-3-0x0000000074A00000-0x00000000751B0000-memory.dmpFilesize
7.7MB
-
memory/4876-2-0x0000000074A00000-0x00000000751B0000-memory.dmpFilesize
7.7MB
-
memory/4876-1-0x00000000000D0000-0x0000000000262000-memory.dmpFilesize
1.6MB
-
memory/4876-0-0x0000000074A0E000-0x0000000074A0F000-memory.dmpFilesize
4KB
-
memory/4876-2317-0x00000000052D0000-0x00000000052D8000-memory.dmpFilesize
32KB
-
memory/4876-5-0x0000000009140000-0x0000000009178000-memory.dmpFilesize
224KB