Resubmissions

17-09-2024 17:18

240917-vvrehsvcqf 6

17-09-2024 17:13

240917-vrr7msvbrk 10

Analysis

  • max time kernel
    270s
  • max time network
    269s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17-09-2024 17:13

General

  • Target

    RobloxPlayerInstaller.exe

  • Size

    4.6MB

  • MD5

    f16ac9b02b4726b444b383d76db1ae18

  • SHA1

    7388c264874447d1ded6b6acaa35d26144d023a9

  • SHA256

    f59c4acec3cd952c3ab981d56e1e68f543ad8684a3b44c6b59b70fbabc2b5ff0

  • SHA512

    9bf0e99eae1406341358c787de4bfd412933af8ca064e0aa09f0bf6893b5d5d9899a82d360f423cc7fae6d647e7196778fddee031508caae99f4a9316e6edf39

  • SSDEEP

    98304:Q+v//h75UcT+6O6QCp4jgzg2ar8S9rpTwkTPKXbSz:Jnh75nTS6Qvg3utwSiE

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 12 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 42 IoCs
  • Loads dropped DLL 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 52 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RobloxPlayerInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\RobloxPlayerInstaller.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Program Files (x86)\Roblox\Versions\version-43ad1853ad91427d\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
      MicrosoftEdgeWebview2Setup.exe /silent /install
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • Checks system information in the registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:964
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:880
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            PID:2668
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            PID:4332
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            PID:2568
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NUNGNTRGMDItNzgxMy00MDZFLTg0QzYtMTVBMzAyRjRDNDUwfSIgdXNlcmlkPSJ7M0UyQzU1MDktN0NEOC00N0IzLThGNTQtODY3QzQwNTY3NzU0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InszQjA3QTVGNS1CRUZGLTQ5NzEtQTRCMC1EMjRBMTkzNUM4REZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE0My41NyIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ5NDAyMTg5MTIiIGluc3RhbGxfdGltZV9tcz0iNzA2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
          4⤵
          • Checks system information in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:688
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{5CF54F02-7813-406E-84C6-15A302F4C450}" /silent
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2072
    • C:\Program Files (x86)\Roblox\Versions\version-43ad1853ad91427d\RobloxPlayerBeta.exe
      "C:\Program Files (x86)\Roblox\Versions\version-43ad1853ad91427d\RobloxPlayerBeta.exe" -app
      2⤵
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:2984
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
    1⤵
    • Checks system information in the registry
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NUNGNTRGMDItNzgxMy00MDZFLTg0QzYtMTVBMzAyRjRDNDUwfSIgdXNlcmlkPSJ7M0UyQzU1MDktN0NEOC00N0IzLThGNTQtODY3QzQwNTY3NzU0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntEMzBEMzZEOC0xNkM5LTQ5RkMtOTY3QS0xMDI2QkM1NUI3MUR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbmV4dHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iNSIgc3lzdGVtX3VwdGltZV90aWNrcz0iNDk0NTM1ODM5NCIvPjwvYXBwPjwvcmVxdWVzdD4
      2⤵
      • Checks system information in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:5028
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE0B4ACB-D26E-4F6A-AE9B-2A4EB96AC5E2}\MicrosoftEdge_X64_128.0.2739.79.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE0B4ACB-D26E-4F6A-AE9B-2A4EB96AC5E2}\MicrosoftEdge_X64_128.0.2739.79.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE0B4ACB-D26E-4F6A-AE9B-2A4EB96AC5E2}\EDGEMITMP_A7B7D.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE0B4ACB-D26E-4F6A-AE9B-2A4EB96AC5E2}\EDGEMITMP_A7B7D.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE0B4ACB-D26E-4F6A-AE9B-2A4EB96AC5E2}\MicrosoftEdge_X64_128.0.2739.79.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
        3⤵
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3904
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE0B4ACB-D26E-4F6A-AE9B-2A4EB96AC5E2}\EDGEMITMP_A7B7D.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE0B4ACB-D26E-4F6A-AE9B-2A4EB96AC5E2}\EDGEMITMP_A7B7D.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=128.0.6613.138 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE0B4ACB-D26E-4F6A-AE9B-2A4EB96AC5E2}\EDGEMITMP_A7B7D.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=128.0.2739.79 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff603fe16d8,0x7ff603fe16e4,0x7ff603fe16f0
          4⤵
          • Drops file in Windows directory
          • Executes dropped EXE
          PID:2900
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NUNGNTRGMDItNzgxMy00MDZFLTg0QzYtMTVBMzAyRjRDNDUwfSIgdXNlcmlkPSJ7M0UyQzU1MDktN0NEOC00N0IzLThGNTQtODY3QzQwNTY3NzU0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntDMDk5RkQwNC1BNzM4LTQ2MjQtQUQ1My01NkU1RTFFNTNFOUV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMjguMC4yNzM5Ljc5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTU3MTc4NTA5IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-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-PC9hcHA-PC9yZXF1ZXN0Pg
      2⤵
      • Checks system information in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:3936
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffef5433cb8,0x7ffef5433cc8,0x7ffef5433cd8
      2⤵
        PID:2272
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1864 /prefetch:2
        2⤵
          PID:4816
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4136
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:8
          2⤵
            PID:4656
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:1
            2⤵
              PID:4228
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
              2⤵
                PID:3324
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:1
                2⤵
                  PID:4128
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:1
                  2⤵
                    PID:4848
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3328 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4736
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:1
                    2⤵
                      PID:3836
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:1
                      2⤵
                        PID:2820
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3728
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:1
                        2⤵
                          PID:3504
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                          2⤵
                            PID:3500
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:1
                            2⤵
                              PID:2852
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:1
                              2⤵
                                PID:2072
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:1
                                2⤵
                                  PID:4788
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                                  2⤵
                                    PID:5116
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:1
                                    2⤵
                                      PID:3116
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                                      2⤵
                                        PID:3324
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                                        2⤵
                                          PID:4852
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:8
                                          2⤵
                                          • NTFS ADS
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:916
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:8
                                          2⤵
                                          • NTFS ADS
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1088
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,6638823119356031513,14762410162761174605,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4644 /prefetch:2
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4896
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:5052
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:1180
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:820
                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
                                              1⤵
                                              • Drops startup file
                                              • Sets desktop wallpaper using registry
                                              • System Location Discovery: System Language Discovery
                                              PID:4948
                                              • C:\Windows\SysWOW64\attrib.exe
                                                attrib +h .
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                • Views/modifies file attributes
                                                PID:2476
                                              • C:\Windows\SysWOW64\icacls.exe
                                                icacls . /grant Everyone:F /T /C /Q
                                                2⤵
                                                • Modifies file permissions
                                                • System Location Discovery: System Language Discovery
                                                PID:3184
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskdl.exe
                                                taskdl.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:2892
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c 150631726593406.bat
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:928
                                                • C:\Windows\SysWOW64\cscript.exe
                                                  cscript.exe //nologo m.vbs
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3132
                                              • C:\Windows\SysWOW64\attrib.exe
                                                attrib +h +s F:\$RECYCLE
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                • Views/modifies file attributes
                                                PID:2916
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4588
                                                • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\TaskData\Tor\taskhsvc.exe
                                                  TaskData\Tor\taskhsvc.exe
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4792
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd.exe /c start /b @[email protected] vs
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2092
                                                • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1160
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4088
                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                      wmic shadowcopy delete
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4236
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskdl.exe
                                                taskdl.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:2872
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskse.exe
                                                taskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:796
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
                                                2⤵
                                                • Sets desktop wallpaper using registry
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1872
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "zthdngla894" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\tasksche.exe\"" /f
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4356
                                                • C:\Windows\SysWOW64\reg.exe
                                                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "zthdngla894" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\tasksche.exe\"" /f
                                                  3⤵
                                                  • Adds Run key to start application
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry key
                                                  PID:4140
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskdl.exe
                                                taskdl.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:3172
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskse.exe
                                                taskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3300
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5116
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskdl.exe
                                                taskdl.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:2856
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\taskse.exe
                                                taskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5320
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5416
                                            • C:\Windows\system32\vssvc.exe
                                              C:\Windows\system32\vssvc.exe
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4384
                                            • C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe
                                              "C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe"
                                              1⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Enumerates system info in registry
                                              PID:4184
                                              • C:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_95B4C\RobloxStudioInstaller.exe
                                                C:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_95B4C\RobloxStudioInstaller.exe
                                                2⤵
                                                • Checks whether UAC is enabled
                                                • Drops file in Program Files directory
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Enumerates system info in registry
                                                • Modifies Internet Explorer settings
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:812
                                                • C:\Program Files (x86)\Roblox\Versions\version-ea7c4a2d814e4dc6\RobloxStudioBeta.exe
                                                  "C:\Program Files (x86)\Roblox\Versions\version-ea7c4a2d814e4dc6\RobloxStudioBeta.exe" -startEvent www.roblox.com/robloxQTStudioStartedEvent -firstLaunch
                                                  3⤵
                                                  • Checks whether UAC is enabled
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Enumerates system info in registry
                                                  • Suspicious behavior: AddClipboardFormatListener
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3080
                                                  • C:\Program Files (x86)\Roblox\Versions\version-ea7c4a2d814e4dc6\RobloxCrashHandler.exe
                                                    "C:\Program Files (x86)\Roblox\Versions\version-ea7c4a2d814e4dc6\RobloxCrashHandler.exe" --no-rate-limit --crashCounter Win-ROBLOXStudio-Crash --baseUrl https://www.roblox.com --attachment=attachment_0.642.0.6420636_20240917T171753Z_Studio_AC7F3_last.log=C:\Users\Admin\AppData\Local\Roblox\logs\0.642.0.6420636_20240917T171753Z_Studio_AC7F3_last.log --attachment=attachment_log_0.642.0.6420636_20240917T171753Z_Studio_AC7F3_csg3.log=C:\Users\Admin\AppData\Local\Roblox\logs\log_0.642.0.6420636_20240917T171753Z_Studio_AC7F3_csg3.log --database=C:\Users\Admin\AppData\Local\Roblox\logs\crashes --metrics-dir=C:\Users\Admin\AppData\Local\Roblox\logs\crashes --url=https://upload.crashes.rbxinfra.com/post?format=minidump --annotation=AppVersion=0.642.0.6420636 --annotation=Format=minidump --annotation=HardwareModel= --annotation=HasBootstrapper=true --annotation=InstallFolder=ProgramFilesX86 --annotation=OSPlatform=Windows --annotation=RobloxChannel=production --annotation=RobloxGitHash=fb5071aa25c087808982b03a639e8c461b22c7f7 --annotation=RobloxProduct=RobloxStudio --annotation=StudioVersion=0.642.0.6420636 --annotation=UniqueId=8668901584380423267 --annotation=UseCrashpad=True --annotation=app_arch=x86_64 --annotation=application.version=0.642.0.6420636 --annotation=host_arch=x86_64 --initial-client-data=0x5dc,0x5e0,0x5e4,0x538,0x5e8,0x7ff76b9f2860,0x7ff76b9f2878,0x7ff76b9f2890
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    PID:4860
                                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 642, 0, 6420636" --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=3080.728.7077429988319522107
                                                    4⤵
                                                    • Checks system information in the registry
                                                    • Drops file in Windows directory
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Enumerates system info in registry
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                    • System policy modification
                                                    PID:4252
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=128.0.6613.138 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=128.0.2739.79 --initial-client-data=0x17c,0x180,0x184,0x158,0x18c,0x7ffee1da9fd8,0x7ffee1da9fe4,0x7ffee1da9ff0
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:1460
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 642, 0, 6420636" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1704,i,16396152083174308662,16226163059745571358,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=1700 /prefetch:2
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:796
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 642, 0, 6420636" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --field-trial-handle=2024,i,16396152083174308662,16226163059745571358,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=1856 /prefetch:11
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:4788
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 642, 0, 6420636" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --field-trial-handle=2236,i,16396152083174308662,16226163059745571358,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:13
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:4868
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 642, 0, 6420636" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3568,i,16396152083174308662,16226163059745571358,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:1
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:5468
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 642, 0, 6420636" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3592,i,16396152083174308662,16226163059745571358,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4132 /prefetch:1
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:5788
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 642, 0, 6420636" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3676,i,16396152083174308662,16226163059745571358,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=3784 /prefetch:1
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:6052
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.79\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView" --webview-exe-name=RobloxStudioBeta.exe --webview-exe-version="0, 642, 0, 6420636" --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4936,i,16396152083174308662,16226163059745571358,262144 --enable-features=MojoIpcz --variations-seed-version --mojo-platform-channel-handle=4940 /prefetch:1
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:1920
                                            • C:\Windows\system32\OpenWith.exe
                                              C:\Windows\system32\OpenWith.exe -Embedding
                                              1⤵
                                              • Suspicious use of SetWindowsHookEx
                                              PID:4108
                                            • C:\Windows\System32\GameBarPresenceWriter.exe
                                              "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
                                              1⤵
                                              • Network Service Discovery
                                              PID:5992
                                            • C:\Windows\system32\OpenWith.exe
                                              C:\Windows\system32\OpenWith.exe -Embedding
                                              1⤵
                                              • Suspicious use of SetWindowsHookEx
                                              PID:6024
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                                              1⤵
                                              • Checks processor information in registry
                                              PID:4584
                                            • C:\Windows\system32\OpenWith.exe
                                              C:\Windows\system32\OpenWith.exe -Embedding
                                              1⤵
                                              • Suspicious behavior: GetForegroundWindowSpam
                                              • Suspicious use of SetWindowsHookEx
                                              PID:5924

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files (x86)\Microsoft\EdgeCore\128.0.2739.79\Installer\setup.exe

                                              Filesize

                                              6.6MB

                                              MD5

                                              337bec799cf5a4312866be547387e091

                                              SHA1

                                              763f4f372b7920365e8e850680b24594d4e3c45d

                                              SHA256

                                              d4d15e2686afd133e9870c4a8e98ab041e9db746dbab5a14373098a8e5b28281

                                              SHA512

                                              cdee342bf56c499e5516d9799c35fc3fd1c833de6863225b961d6d5058625f36ee93fb770f7ea1d604a829e8145caea4ddd178be34d8adf9d9853be41888e365

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\EdgeUpdate.dat

                                              Filesize

                                              12KB

                                              MD5

                                              369bbc37cff290adb8963dc5e518b9b8

                                              SHA1

                                              de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                              SHA256

                                              3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                              SHA512

                                              4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\MicrosoftEdgeComRegisterShellARM64.exe

                                              Filesize

                                              179KB

                                              MD5

                                              7a160c6016922713345454265807f08d

                                              SHA1

                                              e36ee184edd449252eb2dfd3016d5b0d2edad3c6

                                              SHA256

                                              35a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9

                                              SHA512

                                              c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\MicrosoftEdgeUpdate.exe

                                              Filesize

                                              201KB

                                              MD5

                                              4dc57ab56e37cd05e81f0d8aaafc5179

                                              SHA1

                                              494a90728d7680f979b0ad87f09b5b58f16d1cd5

                                              SHA256

                                              87c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718

                                              SHA512

                                              320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

                                              Filesize

                                              212KB

                                              MD5

                                              60dba9b06b56e58f5aea1a4149c743d2

                                              SHA1

                                              a7e456acf64dd99ca30259cf45b88cf2515a69b3

                                              SHA256

                                              4d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112

                                              SHA512

                                              e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\MicrosoftEdgeUpdateCore.exe

                                              Filesize

                                              257KB

                                              MD5

                                              c044dcfa4d518df8fc9d4a161d49cece

                                              SHA1

                                              91bd4e933b22c010454fd6d3e3b042ab6e8b2149

                                              SHA256

                                              9f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2

                                              SHA512

                                              f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\NOTICE.TXT

                                              Filesize

                                              4KB

                                              MD5

                                              6dd5bf0743f2366a0bdd37e302783bcd

                                              SHA1

                                              e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                              SHA256

                                              91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                              SHA512

                                              f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdate.dll

                                              Filesize

                                              2.0MB

                                              MD5

                                              965b3af7886e7bf6584488658c050ca2

                                              SHA1

                                              72daabdde7cd500c483d0eeecb1bd19708f8e4a5

                                              SHA256

                                              d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19

                                              SHA512

                                              1c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_af.dll

                                              Filesize

                                              28KB

                                              MD5

                                              567aec2d42d02675eb515bbd852be7db

                                              SHA1

                                              66079ae8ac619ff34e3ddb5fb0823b1790ba7b37

                                              SHA256

                                              a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c

                                              SHA512

                                              3a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_am.dll

                                              Filesize

                                              24KB

                                              MD5

                                              f6c1324070b6c4e2a8f8921652bfbdfa

                                              SHA1

                                              988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf

                                              SHA256

                                              986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717

                                              SHA512

                                              63092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_ar.dll

                                              Filesize

                                              26KB

                                              MD5

                                              570efe7aa117a1f98c7a682f8112cb6d

                                              SHA1

                                              536e7c49e24e9aa068a021a8f258e3e4e69fa64f

                                              SHA256

                                              e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01

                                              SHA512

                                              5e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_as.dll

                                              Filesize

                                              28KB

                                              MD5

                                              a8d3210e34bf6f63a35590245c16bc1b

                                              SHA1

                                              f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693

                                              SHA256

                                              3b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766

                                              SHA512

                                              6e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_az.dll

                                              Filesize

                                              29KB

                                              MD5

                                              7937c407ebe21170daf0975779f1aa49

                                              SHA1

                                              4c2a40e76209abd2492dfaaf65ef24de72291346

                                              SHA256

                                              5ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9

                                              SHA512

                                              8670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_bg.dll

                                              Filesize

                                              29KB

                                              MD5

                                              8375b1b756b2a74a12def575351e6bbd

                                              SHA1

                                              802ec096425dc1cab723d4cf2fd1a868315d3727

                                              SHA256

                                              a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105

                                              SHA512

                                              aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_bn-IN.dll

                                              Filesize

                                              29KB

                                              MD5

                                              a94cf5e8b1708a43393263a33e739edd

                                              SHA1

                                              1068868bdc271a52aaae6f749028ed3170b09cce

                                              SHA256

                                              5b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c

                                              SHA512

                                              920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_bn.dll

                                              Filesize

                                              29KB

                                              MD5

                                              7dc58c4e27eaf84ae9984cff2cc16235

                                              SHA1

                                              3f53499ddc487658932a8c2bcf562ba32afd3bda

                                              SHA256

                                              e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98

                                              SHA512

                                              bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_bs.dll

                                              Filesize

                                              28KB

                                              MD5

                                              e338dccaa43962697db9f67e0265a3fc

                                              SHA1

                                              4c6c327efc12d21c4299df7b97bf2c45840e0d83

                                              SHA256

                                              99b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04

                                              SHA512

                                              e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

                                              Filesize

                                              29KB

                                              MD5

                                              2929e8d496d95739f207b9f59b13f925

                                              SHA1

                                              7c1c574194d9e31ca91e2a21a5c671e5e95c734c

                                              SHA256

                                              2726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df

                                              SHA512

                                              ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_ca.dll

                                              Filesize

                                              30KB

                                              MD5

                                              39551d8d284c108a17dc5f74a7084bb5

                                              SHA1

                                              6e43fc5cec4b4b0d44f3b45253c5e0b032e8e884

                                              SHA256

                                              8dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07

                                              SHA512

                                              6fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_cs.dll

                                              Filesize

                                              28KB

                                              MD5

                                              16c84ad1222284f40968a851f541d6bb

                                              SHA1

                                              bc26d50e15ccaed6a5fbe801943117269b3b8e6b

                                              SHA256

                                              e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b

                                              SHA512

                                              d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_cy.dll

                                              Filesize

                                              28KB

                                              MD5

                                              34d991980016595b803d212dc356d765

                                              SHA1

                                              e3a35df6488c3463c2a7adf89029e1dd8308f816

                                              SHA256

                                              252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e

                                              SHA512

                                              8a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_da.dll

                                              Filesize

                                              28KB

                                              MD5

                                              d34380d302b16eab40d5b63cfb4ed0fe

                                              SHA1

                                              1d3047119e353a55dc215666f2b7b69f0ede775b

                                              SHA256

                                              fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f

                                              SHA512

                                              45ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_de.dll

                                              Filesize

                                              30KB

                                              MD5

                                              aab01f0d7bdc51b190f27ce58701c1da

                                              SHA1

                                              1a21aabab0875651efd974100a81cda52c462997

                                              SHA256

                                              061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c

                                              SHA512

                                              5edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_el.dll

                                              Filesize

                                              30KB

                                              MD5

                                              ac275b6e825c3bd87d96b52eac36c0f6

                                              SHA1

                                              29e537d81f5d997285b62cd2efea088c3284d18f

                                              SHA256

                                              223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0

                                              SHA512

                                              bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_en-GB.dll

                                              Filesize

                                              27KB

                                              MD5

                                              d749e093f263244d276b6ffcf4ef4b42

                                              SHA1

                                              69f024c769632cdbb019943552bac5281d4cbe05

                                              SHA256

                                              fd90699e7f29b6028a2e8e6f3ae82d26cdc6942bd39c4f07b221d87c5dbbfe1e

                                              SHA512

                                              48d51b006ce0cd903154fa03d17e76591db739c4bfb64243725d21d4aa17db57a852077be00b9a51815d09664d18f9e6ad61d9bc41b3d013ed24aaec8f477ad9

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_en.dll

                                              Filesize

                                              27KB

                                              MD5

                                              4a1e3cf488e998ef4d22ac25ccc520a5

                                              SHA1

                                              dc568a6e3c9465474ef0d761581c733b3371b1cd

                                              SHA256

                                              9afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011

                                              SHA512

                                              ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_es-419.dll

                                              Filesize

                                              29KB

                                              MD5

                                              28fefc59008ef0325682a0611f8dba70

                                              SHA1

                                              f528803c731c11d8d92c5660cb4125c26bb75265

                                              SHA256

                                              55a69ce2d6fc4109d16172ba6d9edb59dbadbc8af6746cc71dc4045aa549022d

                                              SHA512

                                              2ec71244303beac7d5ce0905001fe5b0fb996ad1d1c35e63eecd4d9b87751f0633a281554b3f0aa02ee44b8ceaad85a671ef6c34589055797912324e48cc23ed

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_es.dll

                                              Filesize

                                              28KB

                                              MD5

                                              9db7f66f9dc417ebba021bc45af5d34b

                                              SHA1

                                              6815318b05019f521d65f6046cf340ad88e40971

                                              SHA256

                                              e652159a75cbab76217ecbb4340020f277175838b316b32cf71e18d83da4a819

                                              SHA512

                                              943d8fc0d308c5ccd5ab068fc10e799b92465a22841ce700c636e7ae1c12995d99c0a93ab85c1ae27fefce869eabadbeafee0f2f5f010ad3b35fa4f748b54952

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_et.dll

                                              Filesize

                                              28KB

                                              MD5

                                              b78cba3088ecdc571412955742ea560b

                                              SHA1

                                              bc04cf9014cec5b9f240235b5ff0f29dbdb22926

                                              SHA256

                                              f0a4cfd96c85f2d98a3c9ecfadd41c0c139fdb20470c8004f4c112dd3d69e085

                                              SHA512

                                              04c8ab8e62017df63e411a49fb6218c341672f348cb9950b1f0d2b2a48016036f395b4568da70989f038e8e28efea65ddd284dfd490e93b6731d9e3e0e0813cf

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_eu.dll

                                              Filesize

                                              28KB

                                              MD5

                                              a7e1f4f482522a647311735699bec186

                                              SHA1

                                              3b4b4b6e6a5e0c1981c62b6b33a0ca78f82b7bbd

                                              SHA256

                                              e5615c838a71b533b26d308509954907bcc0eb4032cdbaa3db621eede5e6bfa4

                                              SHA512

                                              22131600bbac8d9c2dab358e244ec85315a1aaebfc0fb62aaa1493c418c8832c3a6fbf24a6f8cf4704fdc4bc10a66c88839a719116b4a3d85264b7ad93c54d57

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_fa.dll

                                              Filesize

                                              27KB

                                              MD5

                                              cbe3454843ce2f36201460e316af1404

                                              SHA1

                                              0883394c28cb60be8276cb690496318fcabea424

                                              SHA256

                                              c66c4024847d353e9985eb9b2f060b2d84f12cc77fb6479df5ffc55dbda97e59

                                              SHA512

                                              f39e660f3bfab288871d3ec40135c16d31c6eb1a84136e065b54ff306f6f8016a788c713d4d8e46ad62e459f9073d2307a6ed650919b2dd00577bbfd04e5bd73

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_fi.dll

                                              Filesize

                                              28KB

                                              MD5

                                              d45f2d476ed78fa3e30f16e11c1c61ea

                                              SHA1

                                              8c8c5d5f77cd8764c4ca0c389daee89e658dfd5e

                                              SHA256

                                              acf42b90190110ccf30bcfb2626dd999a14e42a72a3983928cba98d44f0a72e2

                                              SHA512

                                              2a876e0313a03e75b837d43e9c5bb10fcec385fbb0638faa984ee4bb68b485b04d14c59cd4ed561aaa7f746975e459954e276e73fc3f5f4605ae7f333ce85f1b

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_fil.dll

                                              Filesize

                                              29KB

                                              MD5

                                              7c66526dc65de144f3444556c3dba7b8

                                              SHA1

                                              6721a1f45ac779e82eecc9a584bcf4bcee365940

                                              SHA256

                                              e622823096fc656f63d5a7bbdf3744745ef389c92ec1b804d3b874578e18c89d

                                              SHA512

                                              dbc803c593ae0b18fd989fdc5e9e6aee8f16b893ae8d17e9d88436e2cd8cae23d06e32e4c8a8bf67fc5311b6f2a184c4e6795fed6d15b3d766ef5affc8923e2f

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_fr-CA.dll

                                              Filesize

                                              30KB

                                              MD5

                                              b534e068001e8729faf212ad3c0da16c

                                              SHA1

                                              999fa33c5ea856d305cc359c18ea8e994a83f7a9

                                              SHA256

                                              445051ef15c6c872bed6d904169793837e41029a8578eaf81d78a4641ef53511

                                              SHA512

                                              e937d2e0f43ade3f4a5e9cdeb6dd8c8ad8b5b50a7b6b779bda727a4fe1ced93abd06720395cc69a274ce3b0f7c6b65e1eba1ecf069db64edb80d007fbb4eedbb

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_fr.dll

                                              Filesize

                                              30KB

                                              MD5

                                              64c47a66830992f0bdfd05036a290498

                                              SHA1

                                              88b1b8faa511ee9f4a0e944a0289db48a8680640

                                              SHA256

                                              a9b72fcb3bdb5e021b8d23b2de0caeca80ddc50420088b988a5b7503f2d7c961

                                              SHA512

                                              426546310c12aeb80d56e6b40973a5f4dffef72e14d1ac79e3f267e4df2a0022b89e08bba8ab2ffa24f90b0c035a009bed3066201e30fe961d84ed854e48f9c5

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_ga.dll

                                              Filesize

                                              28KB

                                              MD5

                                              3b8a5301c4cf21b439953c97bd3c441c

                                              SHA1

                                              8a7b48bb3d75279de5f5eb88b5a83437c9a2014a

                                              SHA256

                                              abc9822ee193c9a98a21202648a48ecd69b0cb19ff31c9bbf0c79dab5f9609b0

                                              SHA512

                                              068166cfdf879caf4e54fe43c5265a692fcaf6a9dcbf151335fd054bbec06260bc5ed489de6d46ca3fc0044bc61fa1468fea85373c6c66349620618ee869383a

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_gd.dll

                                              Filesize

                                              30KB

                                              MD5

                                              c90f33303c5bd706776e90c12aefabee

                                              SHA1

                                              1965550fe34b68ea37a24c8708eef1a0d561fb11

                                              SHA256

                                              e3acc61d06942408369c85365ac0d731c5f3c9bc26e3f1e3bb24226d0879ad9c

                                              SHA512

                                              b0c1a9d7df57d68e5daf527703f0b6154a2ef72af1a3933bda2804408f6684b5b09b822522193243fd0756f80f13d3ab0647c90d2bed1a57b4a9fea933b0aa9a

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_gl.dll

                                              Filesize

                                              28KB

                                              MD5

                                              84a1cea9a31be831155aa1e12518e446

                                              SHA1

                                              670f4edd4dc8df97af8925f56241375757afb3da

                                              SHA256

                                              e4eb716f1041160fd323b0f229b88851e153025d5d79f49b7d6ecb7eb2442c57

                                              SHA512

                                              5f1318119102fcee1c828565737ce914493ff86e2a18a94f5ff2b6b394d584ace75c37258d589cce1d5afd8e37d617168a7d7372cfd68dd6a2afcd4577a0bc51

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_gu.dll

                                              Filesize

                                              28KB

                                              MD5

                                              f9646357cf6ce93d7ba9cfb3fa362928

                                              SHA1

                                              a072cc350ea8ea6d8a01af335691057132b04025

                                              SHA256

                                              838ccd8243caa1a5d9e72eb1179ac8ae59d2acb453ed86be01e0722a8e917150

                                              SHA512

                                              654c4a5200f20411c56c59dbb30a63bfe2da27781c081e2049b31f0371a31d679e3c9378c7eb9cf0fb9166a3f0fba33a58c3268193119b06f91bebe164a82528

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_hi.dll

                                              Filesize

                                              28KB

                                              MD5

                                              34cbaeb5ec7984362a3dabe5c14a08ec

                                              SHA1

                                              d88ec7ac1997b7355e81226444ec4740b69670d7

                                              SHA256

                                              024c5eae16e45abe2237c2a5d868563550ac596f1f7d777e25234c17d9461dd9

                                              SHA512

                                              008c8443a3e93c4643a9e8735a1c59c24ba2f7a789606a86da54c921c34cbc0cb11c88594544d8509a8e71b6a287c043b1ffe2d39b90af53b4cde3847d891ba8

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_hr.dll

                                              Filesize

                                              29KB

                                              MD5

                                              0b475965c311203bf3a592be2f5d5e00

                                              SHA1

                                              b5ff1957c0903a93737666dee0920b1043ddaf70

                                              SHA256

                                              65915ad11b9457d145795a1e8d151f898ec2dcb8b136967e6592884699867eb0

                                              SHA512

                                              bec513125f272c24477b9ddbaa5706d1e1bb958babac46829b28df99fa1dd82f3f1e3c7066dc2fe3e59118c536675a22fc2128de916ca4c478950b9992372007

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_hu.dll

                                              Filesize

                                              29KB

                                              MD5

                                              f4976c580ba37fc9079693ebf5234fea

                                              SHA1

                                              7326d2aa8f6109084728323d44a7fb975fc1ed3f

                                              SHA256

                                              b16755fdbcc796ef4eb937759fe2c3518c694f5d186970d55a5a5e5d906cb791

                                              SHA512

                                              e43636d8c947e981258e649712ad43f37c1aab01916539b93c082959fb5c6764c9c44979650092202839e812e6f252c6c3eaf66d3d195c1efd39c74c81ad1981

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_id.dll

                                              Filesize

                                              27KB

                                              MD5

                                              03d4c35b188204f62fc1c46320e80802

                                              SHA1

                                              07efb737c8b072f71b3892b807df8c895b20868c

                                              SHA256

                                              192585d7f4a8a0cd95e338863c14233cdd8150f9f6f7dd8a405da0670110ee95

                                              SHA512

                                              7e67ea953ea58ff43e049ce519ae077eec631325604896479526627d688f2fa3bfc855a55ac23a76b1c9ef8cd75274265b8238423b95a2437be7250db0db31b1

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_is.dll

                                              Filesize

                                              28KB

                                              MD5

                                              5664c7a059ceb096d4cdaae6e2b96b8f

                                              SHA1

                                              bf0095cd7470bf4d7c9566ba0fd3b75c8b9e57ec

                                              SHA256

                                              a3a2947064267d17474c168d3189b0d372e36e53bf0efb9c228d314fc802d98e

                                              SHA512

                                              015dcb17b297a0aaad41c7b0b2199187e435855fd3977d16402be774622cc4f6b55d04ba9159a89e26e350c5602928c76dd9386be3974437b41888a0cfdddfa8

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_it.dll

                                              Filesize

                                              30KB

                                              MD5

                                              497ca0a8950ae5c8c31c46eb91819f58

                                              SHA1

                                              01e7e61c04de64d2df73322c22208a87d6331fc8

                                              SHA256

                                              abe2360a585b6671ec3a69d14077b43ae8f9e92b6077b80a147dfe36792bb1b7

                                              SHA512

                                              070398af980f193ff90b4afaecb3822534ef3171eca7228bce395af11ca38364bc47cab7df1e71187ef291f90978bdc37a8611d2992b1800cd1de6aa7fda09d9

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_iw.dll

                                              Filesize

                                              25KB

                                              MD5

                                              45e971cdc476b8ea951613dbd96e8943

                                              SHA1

                                              8d87b4edfce31dfa4eebdcc319268e81c1e01356

                                              SHA256

                                              fd5ba39c8b319c6ba2febf896c6947a0a7bae6aa0b4957bd124d55589f41849d

                                              SHA512

                                              f1c9fccf742fa450be249dbbf7e551a426c050ae4af3d2e909f9750068a2bdc801f618eb77a6a82d13421d27949c9f2a9681a44bcb410ccdeec66b24a70f6a9a

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_ja.dll

                                              Filesize

                                              24KB

                                              MD5

                                              b507a146eb5de3b02271106218223b93

                                              SHA1

                                              0f1faddb06d775bcabbe8c7d83840505e094b8d6

                                              SHA256

                                              5f4234e2b965656e3d6e127660f52e370dc133632d451ef04975f3b70194b2ed

                                              SHA512

                                              54864e9130b91b6fd68b1947968c446f45a582f22714716bfd70b6dc814841fffe939bc2f573a257ec8c62b4ff939643211fb29cabc0c45b78a6cc70eaa3752c

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_ka.dll

                                              Filesize

                                              29KB

                                              MD5

                                              3bc0d9dd2119a72a1dc705d794dc6507

                                              SHA1

                                              5c3947e9783b90805d4d3a305dd2d0f2b2e03461

                                              SHA256

                                              4449ee24c676e34fea4d151b3a752e8d0e7c82f419884e80da60d4d4c1b0f8cb

                                              SHA512

                                              8df01ad484bf2924892129c59317f3da4f79611be2ca29e208114e5ed2cb96a63f753511dc4fe97e281417366246f2fb576cc6ef2618a67803ae7ac01be7b067

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_kk.dll

                                              Filesize

                                              28KB

                                              MD5

                                              bcb1c5f3ef6c633e35603eade528c0f2

                                              SHA1

                                              84fac96d72341dc8238a0aa2b98eb7631b1eaf4e

                                              SHA256

                                              fdd6bffdb9eca4542975f3afe3ac68feac190b8963f0a7244b4b8fa6382381d1

                                              SHA512

                                              ecd79ddd9f3e6db1d0471132c453c324ab55bdead21de77392f418281bc8a2dd43e9009912896ffa3d55d4d3ef17b0aa847a084369b619eb04a2d2313641d520

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_km.dll

                                              Filesize

                                              27KB

                                              MD5

                                              2ea1200fdfb4fcc368cea7d0cdc32bc2

                                              SHA1

                                              4acb60908e6e974c9fa0f19be94cb295494ee989

                                              SHA256

                                              6fd21b94f62ee7474b3c3029590ddf06936105508f9bf3509620c42dc37486c3

                                              SHA512

                                              e63b80a5929200c85c7a30a3054bd51eee2f27e603501f105073868690906f4619a27a52e58c90ac2ab5d5c34a4739dfdd2a511574afeb7d0118de88c5544f42

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_kn.dll

                                              Filesize

                                              29KB

                                              MD5

                                              60dfe673999d07f1a52716c57ba425a8

                                              SHA1

                                              019ce650320f90914e83010f77347351ec9958ab

                                              SHA256

                                              ef749f70e71424d7f548d5c12283be70a6d6c59cffb1c8101b74f37ecacb64af

                                              SHA512

                                              46bfe77a49f14293988863a8e4dd0543202b954b670940d9ad5dc6d2b46e46104d8d6206be08a941f7e02b8ff3e2e2366b7b795d02352cff18971f8d0df5fcdc

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_ko.dll

                                              Filesize

                                              23KB

                                              MD5

                                              cf91a1f111762d2bc01f8a002bd9544d

                                              SHA1

                                              db2603af55b08538a41c51fc0676bc0ed041d284

                                              SHA256

                                              baa9fae4fb8939e0b5fe0c7f393ab1ca40b52534f37bf2158a9a36331a221e75

                                              SHA512

                                              9db864dbd194885b46f7bed9875f1e531e48f7644ce4494b8dc482c7516a6f783cd35129d2565b272dc674491a08c844a6da88bf9fa7843fcf89c96b4e0af799

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_kok.dll

                                              Filesize

                                              28KB

                                              MD5

                                              ca3465347e57624ee2a5dd2299d4f4cd

                                              SHA1

                                              551a151a8d49489c90400e18c34633aa2c2b8a4b

                                              SHA256

                                              5b9509a1ae34d89c89c8e657742495037d28cd03e1cd48aef4dfaa7aeebe29f0

                                              SHA512

                                              a4bdd458a7628a9f0664e1000512e056718cc924510a21704ff8c69b0b251a5a1c7f6f267d66325cadda1536aaee78440348be128d082112c71732e485ac93f3

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_lb.dll

                                              Filesize

                                              30KB

                                              MD5

                                              269e84b82973e7b9ee03a5b2ef475e4d

                                              SHA1

                                              4021af3bfde8c52040ad4f9390eb29ae2a69104b

                                              SHA256

                                              c3fb0cae3dc5cdd86518d60f998c3adec1c0c5804a74ffbb9a346a73d598af07

                                              SHA512

                                              db716e2f6527af2dfeba4c22ff00e159d7cc0b482fc126e87b8b3d35b714bb382676066097352b6ebb87c8dfe7f6144e83100f0c9a9990b0d23c810b6c575c21

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_lo.dll

                                              Filesize

                                              27KB

                                              MD5

                                              864edbc77831a64a3e3ab972291233bb

                                              SHA1

                                              fa1f3eb3320c1b1a329cbe786abecf2a8e625cbe

                                              SHA256

                                              aecab1eb46075d1a1432b3e14537f860a2ded49a13ca82f17fac44b40ad2da51

                                              SHA512

                                              3d54efd01d6317fb4746b55db2c847a506f594cff055f0db84a72ede02dbe3aa03d8e65ea06c5ae365f44312a26cdbc45ad5f9a0de46d2b9c878aeeb24566b89

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_lt.dll

                                              Filesize

                                              27KB

                                              MD5

                                              7071c732cf3e4b3144cf07c49d8eb44f

                                              SHA1

                                              3800bf304b44d9d27ac26bed6ccc899669dc3b4f

                                              SHA256

                                              9c75ef5c3f53c643d7bb8c5907a0cba6ca2d1d64e6bea39ce06b4ad5a20454b6

                                              SHA512

                                              be3a0942e2af843adeb8e9b6acc7cd8adec956b761f71d8eb0a02835ee5be115ac064fda7088b0813d40ec3a24e7bb77816e9b67ef0cbdce1562c36880b15049

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_lv.dll

                                              Filesize

                                              28KB

                                              MD5

                                              30849a9c16061b9a46a66e8e7d42ff81

                                              SHA1

                                              2d0e86535d964acce8912c6bef3cc12346b22a6c

                                              SHA256

                                              b8075c09d33cc6b6ff22fdb29ccc3dd319ce867f4b77a1d165f6f8d8cb4977e9

                                              SHA512

                                              298ee10ff6cab7ff38d31e3a7826dedeab8e9ccc616eae4ca2e5ec333f42e5c6744650857031d8bf35034bd46c7c01a2646362ffbbef1f421995c73ba999ff0b

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_mi.dll

                                              Filesize

                                              28KB

                                              MD5

                                              1866ddadd9397dbf01c82c73496b6bff

                                              SHA1

                                              b210a9df7d6a5e116fe7a9ff8d455b6cbfb5663b

                                              SHA256

                                              9b4bb2ca3366a1935b4869796efc0601f94356b45e8613d28e023dd516f48d17

                                              SHA512

                                              76fa5cade101d79d012e00904bf18692f85967ceea0ed7e81da4df65b85afc125a00127d9e06c8c59ffbfd2dcdc88488157b61922960559fa17d13dedca3ee59

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_mk.dll

                                              Filesize

                                              29KB

                                              MD5

                                              064035858a1df697913f06c972461901

                                              SHA1

                                              b6be99ae8e55207949076955389bc8fec81937fd

                                              SHA256

                                              4850260d2cbb4b4ff3490eb90ce55a412268ad699f946b1cd686ddf9f0403bd6

                                              SHA512

                                              9459056e919854213117b874e61b526af4ba35c3c3e195b204c5c3e59cc4dfa2b4a45c32551e1de144842844f246f5e0d025cdcc78dbf7265ba5e26e7209cd91

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_ml.dll

                                              Filesize

                                              30KB

                                              MD5

                                              7e90d4306c5768dfd1160ad9e2168a19

                                              SHA1

                                              4f7b17843ad226d51cfb0090235b55a29b5a674a

                                              SHA256

                                              8ebe88477b1493733140f1fced91903276ec69c7302deed3281054b49573eb3c

                                              SHA512

                                              f6d8b538915fa70bfb784ea7e6d4047759d8eecc822e4b76ac9666997a41901c8269a8185f29e5472bcfaa87e4b97483bd544f3fc8f656b60dca71d63b44d291

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_mr.dll

                                              Filesize

                                              28KB

                                              MD5

                                              468a420700d239a0cd90b95896b0d6da

                                              SHA1

                                              ce57e3abf57c7ae13e99546b2a5e19dec03cb9b7

                                              SHA256

                                              24b304bd40f8e63848f8d2a1ca6ac8bc032b7a700161efad61ad445787650c87

                                              SHA512

                                              604c4cc8132c520da70c4870514610364648ec6446afa47128ac3aa8a9157932705da93e8ed4e33d56f5191d611b26b76aeba1514e9dff1a13dd32693cfddb8b

                                            • C:\Program Files (x86)\Microsoft\Temp\EUF491.tmp\msedgeupdateres_ms.dll

                                              Filesize

                                              28KB

                                              MD5

                                              51230a1b9ab0dad791e583b7ee57afe4

                                              SHA1

                                              957ba3e5d9b2df16ea3e099aab5b7e74d2055e46

                                              SHA256

                                              a47fc6a9a75875e75f3415f068c357dd499e533849381b875272d5994c163670

                                              SHA512

                                              5a3d754cefa1ab28748cb38021b5cbebd93fe513da0f4a7cbae98c0938acb10cdda939171d0842b09e97cb4c73f19272be665f767642ba1c5b25c709b5417edb

                                            • C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe

                                              Filesize

                                              5.5MB

                                              MD5

                                              d81db68ce340e4b9ff903d6d9e3b2b21

                                              SHA1

                                              083a061fb32eca3d0fae2d7120a80ea2ce6cd8cd

                                              SHA256

                                              c808dfbf70edf83c353cd8735bc23c026d6727260fab83bdece6801a0cc727d0

                                              SHA512

                                              9a92ea92ab3d3b3271b92d9cc94f4be8fde169310f7545838f566f0da30094ee0042c373389801c26b1c5a6dacb6d34dc125010c9a4708444e090fb4e5764252

                                            • C:\Program Files (x86)\Roblox\Versions\version-43ad1853ad91427d\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe

                                              Filesize

                                              1.5MB

                                              MD5

                                              610b1b60dc8729bad759c92f82ee2804

                                              SHA1

                                              9992b7ae7a9c4e17a0a6d58ffd91b14cbb576552

                                              SHA256

                                              921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08

                                              SHA512

                                              0614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4

                                            • C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\@[email protected]

                                              Filesize

                                              1KB

                                              MD5

                                              f2416b8b8ba3a7e7186363cd5ad44ae8

                                              SHA1

                                              514eecf9aa0a422a1fc89a22212d21d910fe9965

                                              SHA256

                                              ef59a7197c9ba2a6862f39ea3e64c5f5aee3ad4f12f8ddcd8158e517c4f4d028

                                              SHA512

                                              b230033345fbe1eae9f0146867fea7db02a0b995648814dad35aaadf8c2a89b41528a8b9b01a8b7638f923709a0e916df58c2e6d809927abad02bb588c16ea7a

                                            • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                              Filesize

                                              15KB

                                              MD5

                                              53caf0a3ffff73220880237473dc5873

                                              SHA1

                                              bce77e869233e322a42100348d40af8dd5d25ab1

                                              SHA256

                                              b23dea947ac15402f5dfdc413c7e8ce9bc3c7f7375bc3dcce1a630a1ab04a39e

                                              SHA512

                                              643d770e111a4fb777f730313f72afb9fc91f27de5ef9b77f36b2f15ad3f25fb9b2c0c9ae1e7ba9d0561f00a1a9ca765eb3aa3edd231824c3ff4f465567e04c7

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              b0177afa818e013394b36a04cb111278

                                              SHA1

                                              dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5

                                              SHA256

                                              ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d

                                              SHA512

                                              d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              9af507866fb23dace6259791c377531f

                                              SHA1

                                              5a5914fc48341ac112bfcd71b946fc0b2619f933

                                              SHA256

                                              5fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f

                                              SHA512

                                              c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

                                              Filesize

                                              62KB

                                              MD5

                                              c3c0eb5e044497577bec91b5970f6d30

                                              SHA1

                                              d833f81cf21f68d43ba64a6c28892945adc317a6

                                              SHA256

                                              eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb

                                              SHA512

                                              83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                              Filesize

                                              67KB

                                              MD5

                                              929b1f88aa0b766609e4ca5b9770dc24

                                              SHA1

                                              c1f16f77e4f4aecc80dadd25ea15ed10936cc901

                                              SHA256

                                              965eaf004d31e79f7849b404d0b8827323f9fe75b05fe73b1226ccc4deea4074

                                              SHA512

                                              fe8d6b94d537ee9cae30de946886bf7893d3755c37dd1662baf1f61e04f47fa66e070210c990c4a956bde70380b7ce11c05ad39f9cbd3ea55b129bb1f573fa07

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                              Filesize

                                              19KB

                                              MD5

                                              76a3f1e9a452564e0f8dce6c0ee111e8

                                              SHA1

                                              11c3d925cbc1a52d53584fd8606f8f713aa59114

                                              SHA256

                                              381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c

                                              SHA512

                                              a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                              Filesize

                                              41KB

                                              MD5

                                              58756d99d2376dcfbede6057dd25a745

                                              SHA1

                                              76f81b96664cd8863210bb03cc75012eaae96320

                                              SHA256

                                              f5d0da7b010b28a7fe2c314724a966c44068a8c8fa7e9a495e1284aa501067fa

                                              SHA512

                                              476e35c3da0cf223e773c2d26403c12f8c8d034273cca9e3c4cba9359f8506159c2a5267793c8bd9982b636191ddda62e9119593f5599053894c7027a58acc10

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                              Filesize

                                              63KB

                                              MD5

                                              710d7637cc7e21b62fd3efe6aba1fd27

                                              SHA1

                                              8645d6b137064c7b38e10c736724e17787db6cf3

                                              SHA256

                                              c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b

                                              SHA512

                                              19aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              3KB

                                              MD5

                                              860d18a924f47dcd4d846dae42d84eee

                                              SHA1

                                              d646d541d55528bbe277180cbbd86822bc149389

                                              SHA256

                                              a9001b4163f39e29eed1e15f14eeb61b60cdb600d4e750064a0c701375e63901

                                              SHA512

                                              df55712479cf0ed472b3d3789cb544125eca29c10413780de26bc22b75e7ffd5b4076ba4207d58b4351013fec7e93a6e53045178b9b84e9c236c63ae73b4e2ce

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              3KB

                                              MD5

                                              b987502cd23f44ad33f18509d199c1eb

                                              SHA1

                                              d53f1a638ab65b1bf243ff04b4bb02d739d7dec6

                                              SHA256

                                              782284cbc31e4b6ea19287444c85b8b6dc3c9d3801d2d6d5f8629f46ad129494

                                              SHA512

                                              3f9d497fe430d2639180451092fcfb8b635b301be9077255cad8dae02d4ad0667ab303ed352b7d6e61ba72eb710198292f644be2aff275241ed25102a4dc1c45

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              940B

                                              MD5

                                              468b001b8729ffa08b11678238a03bd8

                                              SHA1

                                              4c78f41d76dae3d3a267ed1880e110e91b1e7d13

                                              SHA256

                                              261c40265a8b69dec72091ed9a436650ea4a4fb8cb8c3b24ddd3b452fb1d7684

                                              SHA512

                                              756a3d015061723eae659f7acc757dfa6e8914f30ebcd9170562268152e21f3e82e422e31b69538c46406a168eed8c16cb6c04fbabe065bff3aa0887a6247d6e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              502d59140f24f33fd9cb9c8ac714ca6d

                                              SHA1

                                              9e74b9e07a295387bfc7a6185ee68acba41d064f

                                              SHA256

                                              da9534357f16d7254eab9543a03166a5432271902c82c07fd406b3b451d00675

                                              SHA512

                                              28d0c54603c3f4ae88b5d363ccc99b43d2425ff6951ed59e350f8a7ec665669b850de4bb3d0ed0690639e647ac0036891c440e46a7e4cf3f7afbe3bbfad5c280

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              f19fdbda27d1047c95c550e615d580ca

                                              SHA1

                                              c752ae957d154a885d6a424db53a85f9a3e849c7

                                              SHA256

                                              d99871e97b97b0cdbf03fc78e63e61d97ce8f58b8b443a88e08470c7c79ac485

                                              SHA512

                                              e49d1696b57896c3575cfc9bb900044eb347633f471d0eb80adf85113567fdc18f77df64f3e973b4b6dbedabb3115c08c9d607347562917f09548d0ab60098d6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              8473f44f82e951989252d60f03f1d7a9

                                              SHA1

                                              218120fa51cfc6c70f59499835c1d52258f6ec6f

                                              SHA256

                                              728b03021cd1c7a155ee349c456ff3641d94627d1e845e473490d6337c56ded3

                                              SHA512

                                              e9a17fb96cc2ac719ba8f87eba60968e82478eb585467a84c5a1cca6ece88a904958d648da2871a3dc30de64702222d045ef78e6c47ba773b61fddb833688201

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              3e45de67e5ca075263025e2dcf2f6ba3

                                              SHA1

                                              bf8be4d235a92e1d1c2cc45351473ca929382f6b

                                              SHA256

                                              835e50c3a1147d8d3422cd8e5175720175938fc556faa3c28ddee91504b6621d

                                              SHA512

                                              bdc4c38a900dc83afbd6f78092f6fd222db08649b4b0f0b8c07c600bbe869034198cbce954c259aab02025a5b3950548242166e562cd0a7ae9ef098a53f565ff

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              770a6f216ec8691f135a8ed67c3af973

                                              SHA1

                                              b246232ee1ee75cd4749adf4a828bdef1cb9b911

                                              SHA256

                                              a0bebdc1df4688a27478131f717fffa5fa8dea8763ecd9c3e301f5c763864cd9

                                              SHA512

                                              8ed83fe241bd1e14a1b7f668d85473e13e7afb4025b58f4af012d37607672035d3241a7633ecf856f395d31b47d9e4b9246e0bc6b3b8872acb7a2d9595d4f164

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              64b7007a2aaf736406b54f29a6dd86e7

                                              SHA1

                                              9fcba7a37af149a32f490d3bac70f33a2d9c8246

                                              SHA256

                                              90c6e0cb336cb2eb6c65722a4a4f236062ccae9e9718e908c278e2e72e553bd9

                                              SHA512

                                              6a632c94a9fa9077c664e40d420b0bd316c5cfc4f8e241aeea1c6655c27afdabc81c08f4fe5d3f7dddc82ff4091368aee2ee2b63218f393d9bef91fe357cff34

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              b1a002415cdd9bcdfcff257c1e3d57cb

                                              SHA1

                                              e094608be16ce5193099a2f110abb7e140098046

                                              SHA256

                                              d68190f3b09d8b007f1ce5056b555b63cf12d680058103dfa1ccec687d7bc017

                                              SHA512

                                              dfc0a91e364fe8e9aa4129e18d835f2db9928288ec31249515aa2238ed8a9706ad59f4e0a7c6472c378474587db55097bc7ac60277b62c81c78e355a30224d66

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              364e48d6ac11fedc10ba62b7949154e3

                                              SHA1

                                              809b1b925c8ab8a89ee25c9c43b2edda243df79c

                                              SHA256

                                              9a897c54d75dc3e6f325bef8ba47f9470867937ab11ae8ecadee9b71496b9df7

                                              SHA512

                                              a1980992f9b07337071cd790a9aa0f40cdedef06f667097c08933e421ec9fd5e17b1f8dc481e5c80722b534f588cc2fd84dcf578fe1b47753d3b91df36371c34

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              392027b6bfcd42a859ced16fbf776bf2

                                              SHA1

                                              e005d9c19821fb2a073ea9a449e60fe081933c21

                                              SHA256

                                              eab5c41deeaa127baeda4f103cedec0356a072fd3ef71e64e1b31974696be3dd

                                              SHA512

                                              7c04c4474f5fba3c2e4cd93031a2d43112f739152dd2e5c3d6270146ba2af72d17215db31d498208dc3f3ac3693d1ddc5f447bca98225e0a9ddac2d64987a93a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              623133945bfbb1c973fcca1a3ad7b235

                                              SHA1

                                              587a95c44347ca3ae364133a24eb7d204b773292

                                              SHA256

                                              31ee5e5f9d62058dd97235d78d25f249dbb3ca44f5a728f0c497756011dfc5f3

                                              SHA512

                                              f9de2be3d73af612acd3361e82090cde4c573e692a81c41cd15208e47158eef28ab9a6049e6cac02a14cce9266c60fb1d2e590b4fef9a2d623bafd449addc07f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe595d2a.TMP

                                              Filesize

                                              538B

                                              MD5

                                              e5c6af47a929ddca1dd7bcc65c658e4b

                                              SHA1

                                              3e787ffc0af5e203d1d4eae2faa39f1ad8c9ed69

                                              SHA256

                                              d890102d2c8c61bdca38823ae651bc6330446be3c453540350d76207b9e1b4c2

                                              SHA512

                                              9d07bd1a0c38ff16841dadda99456a5c199976eb11e4d04cdbc3b90d64372b2c1d25de911b8c42eb6f32643dda14490451276e8ce618fa1c84b5b3c88d86e30c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              7b130691861cecc04b9f2c205b51f0e5

                                              SHA1

                                              555f794f401135371b00b85f46606c018bb7cf48

                                              SHA256

                                              1a8293174d2f6fe7b2bb80fea058f87b9f1ffc98db084dd5b81b3834b59ade4b

                                              SHA512

                                              78fea3fa3193ea6f77b8813ed78e5a1a0f4cd7f00cacd89a900acc7826bb3c9ee0cd07a27c52cc3a1cc997a4a67bbc2b6a3dba8815d25bc6f3ef82e37cb6b4ac

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              a24f559e9f3a26856ee150278c10addf

                                              SHA1

                                              1541c38add72801db8ead08da116aa5c8790b6f7

                                              SHA256

                                              f88f3d49d94740589ed629116e97ee4e5777bb824fd3fbac4a1564200ab24c03

                                              SHA512

                                              5e08f75f516d1ec9a53c18f33a5f185e1740899ed38e963d552eda8d4afecc2900ea12f4c5a413dfe09003393f3828e4ddb81ddd0262a546ac8bd27181966bc9

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              7e6e0e5a6c2d7ffe5e09b7239ebc1d18

                                              SHA1

                                              654c58863c07aafeac67d20dc8a288973b80a662

                                              SHA256

                                              672ddbf2d24d21b6d0000fd18e8dea1cefd5962d278febc66784074bbb53ad57

                                              SHA512

                                              83c36f13821db777f781af861d4e77c047a1f737420e712ea546caca4b84923ec12bc4fc588006abd2dc2108f7fb7b7a23091ae082cd560e7da9eb54fbc48aee

                                            • C:\Users\Admin\AppData\Local\Roblox\Downloads\roblox-player\797706739a30b33b492db91f27663c44

                                              Filesize

                                              5.9MB

                                              MD5

                                              797706739a30b33b492db91f27663c44

                                              SHA1

                                              44980bfc6ee691920cf08396d899758954ca522b

                                              SHA256

                                              d54eeb1cb983c99fd3d7ff77f99ec8cb9940b20b0eaeb8ed0dda408627e080f3

                                              SHA512

                                              78732213ad3b4f49d854dc13dcb4deca6e04c62e893393d8ba9f701239dae07ef90b06920bc2913dbdd5637f1b4df94aa23693faeac786dc87984ea35b147229

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\3c2fa3fe-2679-43df-87e0-9431ccf1928a.tmp

                                              Filesize

                                              16KB

                                              MD5

                                              7bc015a7857a25626e2769bf84a7cd6e

                                              SHA1

                                              bffc0af94386df23e3c4596b62614ad1124ba597

                                              SHA256

                                              318c078fc5730866dcf7fc6b4ef76d662b9670757d86583bb15e037dadb61e44

                                              SHA512

                                              a2b330659df1ec2e3397781d7686e56828d897af9659b666af4208833e4718c45780438dd5eab9a77255c5b84cb2aae7c1d7a4efc980709b0ff8b36451df3b08

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Crashpad\settings.dat

                                              Filesize

                                              280B

                                              MD5

                                              2a53e4ac9bc623067f2f62b3b05971cc

                                              SHA1

                                              8f68b76bbe39d2e6512d59ebe2a561512e25ba04

                                              SHA256

                                              d6ad2732110eebbd5b3f9357241f3d65db0f88ed6af2a69791996742b00fbe3b

                                              SHA512

                                              3f7e33bdf0b0add42e2e5cb2f01933a31cc46b6d0c24280223420f03268efe68d6e3f966d55949feba67f81e995b2884c7286a4a99c6e9fc0cc4d112d1a4d1a0

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Crashpad\settings.dat

                                              Filesize

                                              280B

                                              MD5

                                              5c87d9f9a2d4555874593bca88ac95c1

                                              SHA1

                                              09aac2b71da4775b345f3d6e4d0ceafe217e8d64

                                              SHA256

                                              55139501c190efda271a59992044e72a95e98990576bef7d5a4c90b599d1509d

                                              SHA512

                                              359254727d31160dc9b2b6c895a3c9b0df0b376027e15bacdd49395be1033f759794a86f9dcc96858f42a116c64e5969e8c36e0f41a8c0d02b7996d5d97c09db

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              2KB

                                              MD5

                                              88c35a267134dc88ca987fe946e3d8cb

                                              SHA1

                                              b04ab9efdcc39398494f4e83405da8180c5cf214

                                              SHA256

                                              448c25ff45728d02dbd598eb84803931ac55a9c75df211effb2bfc6c4d437fa2

                                              SHA512

                                              52b49da6dc003cdcf4013020b6113c6f31acf931052a76fb39d523a7256979b290dada235ad2ee5c21af0da5217057c192608896695c448eb3654b9712c936e0

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe5b9007.TMP

                                              Filesize

                                              48B

                                              MD5

                                              8013773065fdb6c948f30fc8b7bc5148

                                              SHA1

                                              3b1551d368663483303e28f9fc9a25f4ee0e7423

                                              SHA256

                                              2a6afc8069a2cb03124bd14925dd578de058f5c70dbc43916127cd67dabcfb4b

                                              SHA512

                                              34405619ac1c77042edd00110db7e9f4e28118766c6147f69a631bdae09e0f6188477ffa20d6754e2eebb507a882f8283ea90acdcbd9adf02ed77bf54fa9086e

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001

                                              Filesize

                                              41B

                                              MD5

                                              5af87dfd673ba2115e2fcf5cfdb727ab

                                              SHA1

                                              d5b5bbf396dc291274584ef71f444f420b6056f1

                                              SHA256

                                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                              SHA512

                                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports

                                              Filesize

                                              2B

                                              MD5

                                              d751713988987e9331980363e24189ce

                                              SHA1

                                              97d170e1550eee4afc0af065b78cda302a97674c

                                              SHA256

                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                              SHA512

                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              d711f65e8edaacbc18bf91791f1c74dd

                                              SHA1

                                              32485b75ed707ef5865a5974d7926d2be9a4307a

                                              SHA256

                                              b9be23999d7f50f83789a1bd7f59ebff5cfd1cbde8d4f5777433ef1018a9968f

                                              SHA512

                                              d1bff81b89b4e3fcc935491a45beccb48240242e186ef24ece01d1cd473fd9fa4d20cadeb71d318079c206d3155d8d54bcd299c99be184c2f6b071360481cf59

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Default\Preferences~RFe5b9017.TMP

                                              Filesize

                                              6KB

                                              MD5

                                              5582224152c4f7ade9f26409919fd512

                                              SHA1

                                              e41cc2057b6a877d4360ca1f81cc5e90c10fd081

                                              SHA256

                                              84ae949c032014c699db1f61abede4b1e4f5bd9e12fe53b2d92749353a3ae0cb

                                              SHA512

                                              a62f1caccac1e0185fa919da316bd3cf142594c6249f18ae1dab32209c02875a44d3ce407b119364552f5742c33d7837916b7a122f3bef06afaca7f0a6eb2b20

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\GrShaderCache\data_2

                                              Filesize

                                              8KB

                                              MD5

                                              0962291d6d367570bee5454721c17e11

                                              SHA1

                                              59d10a893ef321a706a9255176761366115bedcb

                                              SHA256

                                              ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                              SHA512

                                              f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\GraphiteDawnCache\data_0

                                              Filesize

                                              8KB

                                              MD5

                                              cf89d16bb9107c631daabf0c0ee58efb

                                              SHA1

                                              3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                              SHA256

                                              d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                              SHA512

                                              8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\GraphiteDawnCache\data_1

                                              Filesize

                                              264KB

                                              MD5

                                              d0d388f3865d0523e451d6ba0be34cc4

                                              SHA1

                                              8571c6a52aacc2747c048e3419e5657b74612995

                                              SHA256

                                              902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                              SHA512

                                              376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\GraphiteDawnCache\data_3

                                              Filesize

                                              8KB

                                              MD5

                                              41876349cb12d6db992f1309f22df3f0

                                              SHA1

                                              5cf26b3420fc0302cd0a71e8d029739b8765be27

                                              SHA256

                                              e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                              SHA512

                                              e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Local State

                                              Filesize

                                              1KB

                                              MD5

                                              0f829c1cfd235157f0abeb9a1d61e8eb

                                              SHA1

                                              f4f0ffd79cd6311693f63f0ee9b1573bbd88d488

                                              SHA256

                                              9bb6327362b492e7c6e50b6ae72e4b595769bb0f04f9a0871ae8e7460140b75b

                                              SHA512

                                              e18151bbb38b8a9de438bb1d1f1c7fd782221a5949a0610ae8f2bee8877a4c53afa9aa8852b5c30809fdeecbdfc8c6a35c1c599a2924f820e6f4956938a92ddf

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Local State

                                              Filesize

                                              2KB

                                              MD5

                                              371c1006be64467ff22a27446c993b4f

                                              SHA1

                                              dffe104b4073cc29991913eca89758dd7e667f96

                                              SHA256

                                              2c6eba0ad11aac8e41b998f74bd34dcfd1997d6df3fc676d683401cfcfc22d42

                                              SHA512

                                              4b213f7659f130ae3764cae55747711e9285c215c82e2728e042124aa1f302847d3c88d77513c90139063647ef42d1487efbebed17205348b6c79506fd42a676

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Local State

                                              Filesize

                                              3KB

                                              MD5

                                              69f3b517273be5db093a25e53213896e

                                              SHA1

                                              0f5064f6cc518aa6a82381e6688eeab6eac91824

                                              SHA256

                                              c613594f7ff208c04bc112cdce86b6b330270d260d6103024fde1f4b6662c4a0

                                              SHA512

                                              88881cacaf3e0b556d75338100203533fb19fc61f14de5114334ce317447b0078fc2855b47401fde9cf4c5cc5837c0526f6f32f0235da9562be2643b1baa95d2

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Local State

                                              Filesize

                                              16KB

                                              MD5

                                              1309e0bcfc4acad58098d29a6fc2af70

                                              SHA1

                                              cef32fb5f742e25fd0ed8e862cdee4432a42e943

                                              SHA256

                                              3ca98f43a135c7299ef6ec882fe27e035ebc5d2fd531d69b388a22ab5405cca4

                                              SHA512

                                              9c33c7954c87a9aebded236162a61d4bdd843449d8fbaff9dc30afb128856b246352c062bba4bfbfe1dd61504c350f81fea2cc63106fb098b0596b75d85bcdea

                                            • C:\Users\Admin\AppData\Local\Roblox\RobloxStudio\WebView2\EBWebView\Local State~RFe5b65ea.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              a02e2a842458650cceaa05fd174770a2

                                              SHA1

                                              04ace71a066dd2faf30599e1b561cffdd63753fa

                                              SHA256

                                              7eee3511b0ac3a4d713f573ac122d70e8517434e5dab84c98653e7a878c2dfaa

                                              SHA512

                                              ac60733b6c2d99905acaf64d797927b9b8b73af1715edebaa76afc1a54289cc414cf5e1ad46e938dbd5750b093cc62aa4686ce9218d49f9a7fd452ed871cbeb6

                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]

                                              Filesize

                                              933B

                                              MD5

                                              7e6b6da7c61fcb66f3f30166871def5b

                                              SHA1

                                              00f699cf9bbc0308f6e101283eca15a7c566d4f9

                                              SHA256

                                              4a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e

                                              SHA512

                                              e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3

                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\@[email protected]

                                              Filesize

                                              240KB

                                              MD5

                                              7bf2b57f2a205768755c07f238fb32cc

                                              SHA1

                                              45356a9dd616ed7161a3b9192e2f318d0ab5ad10

                                              SHA256

                                              b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25

                                              SHA512

                                              91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\TaskData\Tor\tor.exe

                                              Filesize

                                              3.0MB

                                              MD5

                                              fe7eb54691ad6e6af77f8a9a0b6de26d

                                              SHA1

                                              53912d33bec3375153b7e4e68b78d66dab62671a

                                              SHA256

                                              e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb

                                              SHA512

                                              8ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f

                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry (1).zip\msg\m_finnish.wnry

                                              Filesize

                                              37KB

                                              MD5

                                              35c2f97eea8819b1caebd23fee732d8f

                                              SHA1

                                              e354d1cc43d6a39d9732adea5d3b0f57284255d2

                                              SHA256

                                              1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e

                                              SHA512

                                              908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                              Filesize

                                              2B

                                              MD5

                                              f3b25701fe362ec84616a93a45ce9998

                                              SHA1

                                              d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                              SHA256

                                              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                              SHA512

                                              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                            • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

                                              Filesize

                                              9.9MB

                                              MD5

                                              f6c05f410790b7a0849eb359374464b3

                                              SHA1

                                              50d5d3390807f24add179b64dc06d76d2984215a

                                              SHA256

                                              4cf8f23b273f60e17978af2627a7b4a446f6a4132c343aa6d0e140d44bf1540a

                                              SHA512

                                              e84cfdf77e7c491f3f54039053540c53909cbb891a52599d60e0f95139218d9b5be51874c602f813153e2f3d3ca4c17a03792a2c62636ff50200e25bda02ff59

                                            • C:\Users\Admin\Downloads\Unconfirmed 946941.crdownload

                                              Filesize

                                              3.3MB

                                              MD5

                                              efe76bf09daba2c594d2bc173d9b5cf0

                                              SHA1

                                              ba5de52939cb809eae10fdbb7fac47095a9599a7

                                              SHA256

                                              707a9f323556179571bc832e34fa592066b1d5f2cac4a7426fe163597e3e618a

                                              SHA512

                                              4a1df71925cf2eb49c38f07c6a95bea17752b025f0114c6fd81bc0841c1d1f2965b5dda1469e454b9e8207c2e0dfd3df0959e57166620ccff86eeeb5cf855029

                                            • C:\Users\Default\Desktop\@[email protected]

                                              Filesize

                                              1.4MB

                                              MD5

                                              c17170262312f3be7027bc2ca825bf0c

                                              SHA1

                                              f19eceda82973239a1fdc5826bce7691e5dcb4fb

                                              SHA256

                                              d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa

                                              SHA512

                                              c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c

                                            • C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat

                                              Filesize

                                              280B

                                              MD5

                                              cd88641a4dcc262e38ff7322713d3f59

                                              SHA1

                                              a474a2d67d329479fc9736dcfe14413c4cfcb0a5

                                              SHA256

                                              ff180043f4ecc41cf9e34bf2efddaeb4b4737c95e4e99844a8165220d89908f2

                                              SHA512

                                              4b1bd463271a6763c79bd36248d9c60aedf54422b31b249ce40a16703cae4c46caf86235391f23fe57d3261c8a5e9e1109d9f75fc606408863c6969369675b30

                                            • memory/2896-257-0x00000000005D0000-0x0000000000605000-memory.dmp

                                              Filesize

                                              212KB

                                            • memory/2896-790-0x00000000005D0000-0x0000000000605000-memory.dmp

                                              Filesize

                                              212KB

                                            • memory/2896-269-0x0000000073140000-0x0000000073350000-memory.dmp

                                              Filesize

                                              2.1MB

                                            • memory/2896-258-0x0000000073140000-0x0000000073350000-memory.dmp

                                              Filesize

                                              2.1MB

                                            • memory/2984-808-0x00007FFF09420000-0x00007FFF09429000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2984-804-0x00007FFF09390000-0x00007FFF093C0000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/2984-803-0x00007FFF09390000-0x00007FFF093C0000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/2984-802-0x00007FFF09340000-0x00007FFF09350000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-801-0x00007FFF09340000-0x00007FFF09350000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-800-0x00007FFF09220000-0x00007FFF09230000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-809-0x00007FFF07200000-0x00007FFF07210000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-810-0x00007FFF07200000-0x00007FFF07210000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-811-0x00007FFF07290000-0x00007FFF072A0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-812-0x00007FFF07290000-0x00007FFF072A0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-813-0x00007FFF072B0000-0x00007FFF072D0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/2984-814-0x00007FFF072B0000-0x00007FFF072D0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/2984-815-0x00007FFF072B0000-0x00007FFF072D0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/2984-816-0x00007FFF072B0000-0x00007FFF072D0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/2984-819-0x00007FFF06AC0000-0x00007FFF06AD0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-820-0x00007FFF06AC0000-0x00007FFF06AD0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-821-0x00007FFF06C30000-0x00007FFF06C40000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-822-0x00007FFF06C30000-0x00007FFF06C40000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-823-0x00007FFF06DE0000-0x00007FFF06DF0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-838-0x00007FFF070C0000-0x00007FFF070D0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-844-0x00007FFF070E0000-0x00007FFF070E9000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2984-843-0x00007FFF070E0000-0x00007FFF070E9000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2984-824-0x00007FFF06DE0000-0x00007FFF06DF0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-825-0x00007FFF06DE0000-0x00007FFF06DF0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-826-0x00007FFF06E00000-0x00007FFF06E10000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-827-0x00007FFF06E00000-0x00007FFF06E10000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-829-0x00007FFF076B0000-0x00007FFF076C0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-830-0x00007FFF076B0000-0x00007FFF076C0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-831-0x00007FFF07720000-0x00007FFF07730000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-832-0x00007FFF07720000-0x00007FFF07730000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-833-0x00007FFF07760000-0x00007FFF0776D000-memory.dmp

                                              Filesize

                                              52KB

                                            • memory/2984-834-0x00007FFF07760000-0x00007FFF0776D000-memory.dmp

                                              Filesize

                                              52KB

                                            • memory/2984-835-0x00007FFF07760000-0x00007FFF0776D000-memory.dmp

                                              Filesize

                                              52KB

                                            • memory/2984-836-0x00007FFF07760000-0x00007FFF0776D000-memory.dmp

                                              Filesize

                                              52KB

                                            • memory/2984-837-0x00007FFF07760000-0x00007FFF0776D000-memory.dmp

                                              Filesize

                                              52KB

                                            • memory/2984-839-0x00007FFF070C0000-0x00007FFF070D0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-840-0x00007FFF070C0000-0x00007FFF070D0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-841-0x00007FFF070E0000-0x00007FFF070E9000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2984-842-0x00007FFF070E0000-0x00007FFF070E9000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2984-845-0x00007FFF070E0000-0x00007FFF070E9000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2984-828-0x00007FFF06E00000-0x00007FFF06E10000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2984-817-0x00007FFF072B0000-0x00007FFF072D0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/2984-818-0x00007FFF073A0000-0x00007FFF073AC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2984-805-0x00007FFF09390000-0x00007FFF093C0000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/2984-806-0x00007FFF09390000-0x00007FFF093C0000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/2984-807-0x00007FFF09390000-0x00007FFF093C0000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/2984-799-0x00007FFF09220000-0x00007FFF09230000-memory.dmp

                                              Filesize

                                              64KB