Analysis
-
max time kernel
1130s -
max time network
1131s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-11-2024 07:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://delta-executor.com/
Resource
win11-20241007-en
General
-
Target
https://delta-executor.com/
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Manipulates Digital Signatures 2 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pwrshsip.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\wintrust.dll pmropn.exe -
A potential corporate email address has been identified in the URL: e^^TaUJ@DP
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 4584 Delta V3.61 b_30946817.exe 3488 OperaGX.exe 4508 setup.exe 792 setup.exe 1480 setup.exe 5032 setup.exe 4552 setup.exe 920 Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe 2412 assistant_installer.exe 4776 assistant_installer.exe 4000 ContentI3.exe 1468 pmropn.exe 1592 pmservice.exe 1236 svchost.exe 2908 pmropn.exe 5480 pmropn32.exe 5504 pmropn64.exe 1748 pmropn.exe 424 Process not Found 1960 pmropn.exe 6108 msedge.exe 5604 msedge.exe 1136 msedge.exe 5716 msedge.exe 4560 msedge.exe 5700 msedge.exe 5600 RobloxPlayerInstaller.exe 2028 MicrosoftEdgeWebview2Setup.exe 5940 MicrosoftEdgeUpdate.exe 5728 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 584 MicrosoftEdgeUpdateComRegisterShell64.exe 5148 MicrosoftEdgeUpdateComRegisterShell64.exe 2016 MicrosoftEdgeUpdateComRegisterShell64.exe 1840 MicrosoftEdgeUpdate.exe 3596 MicrosoftEdgeUpdate.exe 2236 MicrosoftEdgeUpdate.exe 3288 MicrosoftEdgeUpdate.exe 4660 msedge.exe 3744 MicrosoftEdge_X64_130.0.2849.80.exe 2160 setup.exe 6048 setup.exe 5492 MicrosoftEdgeUpdate.exe 5620 RobloxPlayerBeta.exe 3516 msedge.exe 6028 RobloxPlayerBeta.exe 5636 msedge.exe 4612 RobloxPlayerBeta.exe 4584 msedge.exe 5324 RobloxPlayerBeta.exe 3604 MicrosoftEdgeUpdate.exe 5864 MicrosoftEdgeUpdate.exe 5044 MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe 440 MicrosoftEdgeUpdate.exe 3640 MicrosoftEdgeUpdate.exe 1464 MicrosoftEdgeUpdate.exe 2368 MicrosoftEdgeUpdate.exe 5852 MicrosoftEdgeUpdateComRegisterShell64.exe 1100 MicrosoftEdgeUpdateComRegisterShell64.exe 5272 MicrosoftEdgeUpdateComRegisterShell64.exe 2124 MicrosoftEdgeUpdate.exe 4412 MicrosoftEdgeUpdate.exe 2728 MicrosoftEdgeUpdate.exe 1092 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 64 IoCs
pid Process 4508 setup.exe 792 setup.exe 1480 setup.exe 5032 setup.exe 4552 setup.exe 1592 pmservice.exe 4204 rundll32.exe 2908 pmropn.exe 5480 pmropn32.exe 5504 pmropn64.exe 3264 msedge.exe 5432 unsecapp.exe 5376 Delta.exe 3324 Process not Found 5740 WerFault.exe 2692 NOTEPAD.EXE 4584 Delta V3.61 b_30946817.exe 3044 Process not Found 5832 Process not Found 2840 msedge.exe 4552 setup.exe 792 setup.exe 4776 assistant_installer.exe 5032 setup.exe 4508 setup.exe 6132 Delta.exe 5204 msedge.exe 5232 msedge.exe 5400 msedge.exe 1960 pmropn.exe 6108 msedge.exe 6108 msedge.exe 1512 powershell.exe 1512 powershell.exe 1512 powershell.exe 1512 powershell.exe 1512 powershell.exe 1512 powershell.exe 5604 msedge.exe 5604 msedge.exe 5604 msedge.exe 3036 CompPkgSrv.exe 1136 msedge.exe 1136 msedge.exe 5716 msedge.exe 5716 msedge.exe 4560 msedge.exe 4560 msedge.exe 5700 msedge.exe 5700 msedge.exe 5700 msedge.exe 5600 RobloxPlayerInstaller.exe 2064 Process not Found 2028 MicrosoftEdgeWebview2Setup.exe 5940 MicrosoftEdgeUpdate.exe 5728 MicrosoftEdgeUpdate.exe 2484 MicrosoftEdgeUpdate.exe 584 MicrosoftEdgeUpdateComRegisterShell64.exe 2484 MicrosoftEdgeUpdate.exe 5148 MicrosoftEdgeUpdateComRegisterShell64.exe 2484 MicrosoftEdgeUpdate.exe 2016 MicrosoftEdgeUpdateComRegisterShell64.exe 2484 MicrosoftEdgeUpdate.exe 5940 MicrosoftEdgeUpdate.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: setup.exe File opened (read-only) \??\F: setup.exe File opened (read-only) \??\D: setup.exe File opened (read-only) \??\F: setup.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 234 discord.com 227 discord.com 229 discord.com 230 discord.com 50 discord.com 217 discord.com 218 discord.com 219 discord.com 220 discord.com 231 discord.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 api64.ipify.org 50 api.ipify.org 65 api.ipify.org 66 api64.ipify.org -
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
Checks system information in the registry 2 TTPs 24 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kbdolch.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\installservice.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\msvidc32.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\maprouter.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\ntprint.exe pmropn.exe File opened for modification C:\Windows\SysWOW64\wintrust.pdb pmropn.exe File opened for modification C:\Windows\SysWOW64\dll\ieframe.pdb pmropn.exe File opened for modification C:\Windows\SysWOW64\dmsynth.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\portabledevicetypes.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\wsdchngr.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\mrinfo.exe pmropn.exe File opened for modification C:\Windows\SysWOW64\ortcengine.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\en\authfwwizfwk.resources.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\frameserverclient.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\dll\wshbth.pdb pmropn.exe File opened for modification C:\Windows\SysWOW64\mscorier.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\rdpendp.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\settingsyncdownloadhelper.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\Speech\SpeechUX\speechuxps.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\wpnapps.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\adsldpc.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\ntshrui.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\auditnativesnapin.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\windows.media.import.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\kbdsora.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\msamrnbdecoder.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\twinui.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\dll\atlthunk.pdb pmropn.exe File opened for modification C:\Windows\SysWOW64\jscript9diag.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shlwapi.pdb pmropn.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\prnms003.inf_x86_4540e16c07f9c1ad\I386\printconfig.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\schannel.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\windows.storage.compression.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\msobjs.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\opcservices.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\reg.exe pmropn.exe File opened for modification C:\Windows\SysWOW64\dll\wsock32.pdb pmropn.exe File opened for modification C:\Windows\SysWOW64\dll\spinf.pdb pmropn.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\iscsi.inf_amd64_92707498edba0868\iscsilog.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\nlsbres.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\radardt.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\windows.internal.ui.shell.windowtabmanager.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\comctl32v582.pdb pmropn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pmropn.exe File opened for modification C:\Windows\SysWOW64\ddisplay.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\ieproxy.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\mmc.exe pmropn.exe File opened for modification C:\Windows\SysWOW64\userenv.pdb pmropn.exe File opened for modification C:\Windows\SysWOW64\bcp47langs.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\locationapi.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\msimsg.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\wmsgapi.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\webio.pdb pmropn.exe File opened for modification C:\Windows\SysWOW64\kbdru.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\mciqtz32.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\wmerror.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\downlevel\api-ms-win-security-lsapolicy-l1-1-0.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\kbdur1.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\xwreg.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\downlevel\api-ms-win-core-threadpool-l1-2-0.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\rasautou.exe pmropn.exe File opened for modification C:\Windows\SysWOW64\winsatapi.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\kbdinmar.dll pmropn.exe File opened for modification C:\Windows\SysWOW64\textinputmethodformatter.dll pmropn.exe -
Probable phishing domain 1 TTPs 1 IoCs
description flow ioc stream HTTP URL 5 https://delta-executor.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8e0c7fa7da62641f 3 -
Suspicious use of NtCreateThreadExHideFromDebugger 5 IoCs
pid Process 5620 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 5324 RobloxPlayerBeta.exe 5604 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 5620 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 5324 RobloxPlayerBeta.exe 5324 RobloxPlayerBeta.exe 5324 RobloxPlayerBeta.exe 5324 RobloxPlayerBeta.exe 5324 RobloxPlayerBeta.exe 5324 RobloxPlayerBeta.exe 5324 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Menu\buttonHover.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\VoiceChat\MicDark\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\api-ms-win-core-heap-l1-1-0.dll RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\BHO\ie_to_edge_bho.dll setup.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\system.identitymodel.resources.dll pmropn.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\places\Mobile.rbxl RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\LuaApp\icons\ic-more-builders-club.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\LuaChat\graphic\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\TixIcon.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\VoiceChat\SpeakerDark\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\AdSelectionAttestationsPreloaded\ad-selection-attestations.dat setup.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\hostpolicy.dll pmropn.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\GameSettings\Arrow.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\libaccess_output_file_plugin.dll pmropn.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\system.io.compression.zipfile.dll pmropn.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\msmgdsrv.dll pmropn.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\XboxController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\TopBar\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\VoiceChat\SpeakerLight\Muted.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_x64__8wekyb3d8bbwe\zh-TW\pad.console.host.resources.dll pmropn.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\TerrainTools\icon_regions_select.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\omraut.dll pmropn.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\msolap.dll pmropn.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\psmachine.dll pmropn.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\LuaChat\9-slice\[email protected] RobloxPlayerInstaller.exe File opened for modification \??\c:\program files (x86)\premieropinion\dll\wldap32.pdb pmropn.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\microsoft.visualbasic.forms.resources.dll pmropn.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\j2pcsc.dll pmropn.exe File opened for modification \??\c:\program files (x86)\premieropinion\symbols\dll\ncrypt.pdb pmropn.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\PlayerList\[email protected] RobloxPlayerInstaller.exe File opened for modification \??\c:\program files (x86)\premieropinion\DLL\wkscli.pdb pmropn.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\windowsbase.resources.dll pmropn.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\appinstallerelevatedappserviceclient.exe pmropn.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\InGameMenu\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\ImageSet\AE\img_set_2x_5.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\system.numerics.vectors.dll pmropn.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\TagEditor\lineargradient.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EU95D2.tmp\msedgeupdateres_fr.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe File opened for modification \??\c:\program files (x86)\premieropinion\dll\fastprox.pdb pmropn.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\system.diagnostics.tracesource.dll pmropn.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_mp4_plugin.dll pmropn.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\uiautomationtypes.resources.dll pmropn.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\presentationframework.resources.dll pmropn.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\mojo_core.dll pmropn.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoxev.dll pmropn.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\libinteger_mixer_plugin.dll pmropn.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\system.net.networkinformation.dll pmropn.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\oneds.dll pmropn.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\microsoft.packagemanagement.coreproviders.resources.dll pmropn.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\system.xaml.resources.dll pmropn.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\system.windows.forms.resources.dll pmropn.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Trust Protection Lists\Mu\Entities setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Settings\Help\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\XboxController\DPadRight.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\LuaApp\ExternalSite\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EU84A4.tmp\msedgeupdateres_ca.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\msvcp140_codecvt_ids.dll setup.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\vgx.dll pmropn.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\advClosed-hand-no-weld.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\reachframework.resources.dll pmropn.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\fr\system.workflowservices.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-unimodem-config_31bf3856ad364e35_10.0.22000.318_none_f079a874a3c8e596\r\serialui.dll pmropn.exe File opened for modification C:\Windows\WinSxS\msil_multipoint-wms.dash..addintabs.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_399d31c4536fe281\wms.dashboard.addintabs.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-c..esources-mrmindexer_31bf3856ad364e35_10.0.22000.65_none_551f7cc91fa8629a\f\mrmindexer.dll pmropn.exe File opened for modification C:\Windows\WinSxS\x86_microsoft-windows-ie-winsockautodialstub_31bf3856ad364e35_11.0.22000.1_none_1e414e41150fe0a1\url.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-iis-webdavbinaries_31bf3856ad364e35_10.0.22000.1_none_c09510ee34feb3ac\webdav.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..lographicextensions_31bf3856ad364e35_10.0.22000.348_none_93da27dcfc1b068b\r\holographicextensions.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_netfx-accessibility_b03f5f7f11d50a3a_10.0.22000.1_none_7fb2b3f4d466e57c\accessibility.dll pmropn.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Messaging.Resources\2.0.0.0_es_b03f5f7f11d50a3a\system.messaging.resources.dll pmropn.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\es\system.windows.forms.datavisualization.resources.dll pmropn.exe File opened for modification C:\Windows\SystemApps\Microsoft.AccountsControl_cw5n1h2txyewy\accountscontrolhost.exe pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-inputprocessors_31bf3856ad364e35_10.0.22000.282_none_956bcad602fe2368\chxapds.dll pmropn.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-taskkill_31bf3856ad364e35_10.0.22000.1_none_861646fd953a616a\taskkill.exe pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_addinprocess32_b77a5c561934e089_10.0.22000.1_none_d7534de2f1aff751\addinprocess32.exe pmropn.exe File opened for modification C:\Windows\WinSxS\msil_datasvcutil.resources_b77a5c561934e089_10.0.22000.1_ja-jp_fcf0ae1758c8fcdf\datasvcutil.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-certutil_31bf3856ad364e35_10.0.22000.434_none_bb381a0becef4d51\f\certutil.exe pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_netfx-system.runtim..ion.formatters.soap_b03f5f7f11d50a3a_10.0.22000.1_none_7214432c1779e895\system.runtime.serialization.formatters.soap.dll pmropn.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\it\jsc.resources.dll pmropn.exe File opened for modification C:\Windows\servicing\cbsmsg.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..drivermanager-trace_31bf3856ad364e35_10.0.22000.1_none_d5b72a1f46431939\odbctrac.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_system.numerics.resources_b77a5c561934e089_4.0.15806.0_ja-jp_a312e1c20bcbac1a\system.numerics.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-w..sition-coreservices_31bf3856ad364e35_10.0.22000.120_none_2df96bf03880dbcf\esclwiadriver.dll pmropn.exe File opened for modification C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-security-tpm-engine_31bf3856ad364e35_10.0.22000.376_none_e3d46ddd928fc934\f\tpmengum138.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-wcfcorecomp.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_9990ce76313b5130\servicemodelreg.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\msil_microsoft.web.management.iis.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_b163dc596899ca26\microsoft.web.management.iis.resources.dll pmropn.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel.Selectors.resources\v4.0_4.0.0.0_es_b77a5c561934e089\system.identitymodel.selectors.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..n_service_datastore_31bf3856ad364e35_10.0.22000.1_none_27722e523ac8cac3\iasdatastore.dll pmropn.exe File opened for modification C:\Windows\WinSxS\msil_system.web.dynamicdata.resources_31bf3856ad364e35_10.0.22000.1_de-de_cca21925c24a80a4\system.web.dynamicdata.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.282_none_5faf7b34bce42c4c\wsearchmigplugin.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_hyperv-vmchipset_31bf3856ad364e35_10.0.22000.282_none_d06426021204b128\r\vmchipset.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-n..xcorecomp.resources_31bf3856ad364e35_10.0.22000.1_it-it_e6711d1f61447071\system.drawing.design.resources.dll pmropn.exe File opened for modification C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-m..nt-browser.appxmain_31bf3856ad364e35_10.0.22000.120_none_f759261c81fa2ed8\f\microsoft.diagnostics.tracing.eventsource.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-devmgmt-ueficsp_31bf3856ad364e35_10.0.22000.1_none_699e2375ad220f2c\ueficsp.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-resourcemanager-client_31bf3856ad364e35_10.0.22000.348_none_6fd3cbde5103de73\r\rmclient.dll pmropn.exe File opened for modification C:\Windows\symbols\dll\msacm32.pdb pmropn.exe File opened for modification C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\amd64_microsoft-windows-mediaplayer-wmpps_31bf3856ad364e35_10.0.22000.51_none_90c9d3c457cee0b4\f\wmpps.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-narrator_31bf3856ad364e35_10.0.22000.100_none_b998a9a728d6401f\f\narrator.exe pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-wsp-spaces_31bf3856ad364e35_10.0.22000.469_none_617bfbac32d0b2ac\r\mispace.dll pmropn.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-f..utilitylibrariesext_31bf3856ad364e35_10.0.22000.1_none_d19c2b1de078a28a\fsutilext.dll pmropn.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-mediaplayer-wmpeffects_31bf3856ad364e35_10.0.22000.1_none_59e62f3fc89b8893\wmpeffects.dll pmropn.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer.Resources\v4.0_10.0.0.0_ja_31bf3856ad364e35\microsoft.appv.appvclientcomconsumer.resources.dll pmropn.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\1036\vbc7ui.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_netfx35linq-system.web.routing_31bf3856ad364e35_10.0.22000.1_none_51585f589ed88858\system.web.routing.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..s-appexecutionalias_31bf3856ad364e35_10.0.22000.282_none_fd76a7acd25795d0\r\settingshandlers_appexecutionalias.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.22000.318_none_9b6af6ae8c0ac6cb\dtdump.exe pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_system.net.resources_b03f5f7f11d50a3a_4.0.15806.0_fr-fr_9932a16d2e143536\system.net.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-a..ionmodel-lockscreen_31bf3856ad364e35_10.0.22000.1_none_0f7a14e46bf85fe1\windows.applicationmodel.lockscreen.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-h..nter-shellproviders_31bf3856ad364e35_10.0.22000.1_none_eab1bdf3f4a61ae0\hcproviders.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-kernel32_31bf3856ad364e35_10.0.22000.318_none_8f35ec27db69b18b\kernel32.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..estartup-change-pin_31bf3856ad364e35_10.0.22000.194_none_ecba39f8d9cbe846\bdechangepin.exe pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..handlers-workaccess_31bf3856ad364e35_10.0.22000.71_none_bfde2b3783be2b8a\settingshandlers_workaccess.dll pmropn.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Controls.Ribbon.resources\v4.0_4.0.0.0_fr_b77a5c561934e089\system.windows.controls.ribbon.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-deviceflows-datamodel_31bf3856ad364e35_10.0.22000.65_none_fdd025b7f32e98a2\r\deviceflows.datamodel.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_dual_halextpl080.inf_31bf3856ad364e35_10.0.22000.1_none_8854b12d5c04b0b8\halextpl080.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-c..hell-desktophosting_31bf3856ad364e35_10.0.22000.120_none_f61b419f416b0b54\r\windowsinternal.composableshell.desktophosting.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-t..lishing-wmiprovider_31bf3856ad364e35_10.0.22000.282_none_305eac6918e57702\f\rdpsign.exe pmropn.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ES\system.transactions.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_jsc.resources_b03f5f7f11d50a3a_4.0.15806.0_es-es_1831c83d01ccf1b6\jsc.resources.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-fsrm-common_31bf3856ad364e35_10.0.22000.1_none_1ff2494d6598fe58\srmclient.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-mapcontrol_31bf3856ad364e35_10.0.22000.71_none_f594a3ae26649204\f\mapsstore.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-p..ncetoolscommandline_31bf3856ad364e35_10.0.22000.1_none_b7671877039e31c8\typeperf.exe pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..commonresource-core_31bf3856ad364e35_10.0.22000.1_none_9d98219d958b5ddc\mqutil.dll pmropn.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-w..sition-uicomponents_31bf3856ad364e35_10.0.22000.1_none_25381cfb8a14a984\wiaacmgr.exe pmropn.exe File opened for modification C:\Windows\WinSxS\msil_microsoft.security...licymodel.resources_31bf3856ad364e35_10.0.22000.1_es-es_d2477ae8899ae081\microsoft.security.applicationid.policymanagement.policymodel.resources.dll pmropn.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\Delta V3.61 b_30946817.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe:Zone.Identifier msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5740 5376 WerFault.exe 140 5832 5600 WerFault.exe 263 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delta V3.61 b_30946817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OperaGX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ContentI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language assistant_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pmservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language assistant_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheckNetIsolation.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1092 MicrosoftEdgeUpdate.exe 5664 MicrosoftEdgeUpdate.exe 1840 MicrosoftEdgeUpdate.exe 3288 MicrosoftEdgeUpdate.exe 5492 MicrosoftEdgeUpdate.exe 440 MicrosoftEdgeUpdate.exe 2124 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 44 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\ClassGUID pmropn.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\Class pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\ClassGUID pmropn.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A pmropn.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Class pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\Class pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ClassGUID pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ClassGUID pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pmropn.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\Class pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\ClassGUID pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\ClassGUID pmropn.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Class pmropn.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM pmropn.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\mfg pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ClassGUID pmropn.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\mfg pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ClassGUID pmropn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Class pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Class pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\mfg pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Class pmropn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\mfg pmropn.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge\WarnOnOpen = "0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge\WarnOnOpen = "0" setup.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates pmservice.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" pmropn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History pmropn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P pmropn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ pmropn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust pmservice.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" pmropn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" pmropn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software pmropn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople pmservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft pmropn.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass.1\CLSID\ = "{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ = "IPolicyStatus2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ = "IProcessLauncher" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" \"%1\"" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{3316A154-AC5C-4126-9021-B201E9C33D7B}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32\ = "{3316A154-AC5C-4126-9021-B201E9C33D7B}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods\ = "12" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc\CLSID\ = "{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ = "IPolicyStatus5" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService.1.0 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine.1.0\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ = "IApp2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\CurVer\ = "MicrosoftEdgeUpdate.CoreClass.1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebMachine.1.0" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E3D94CEB-EC11-46BE-8872-7DDCE37FABFA}\InprocHandler32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ = "ServiceModule" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32\ = "{3316A154-AC5C-4126-9021-B201E9C33D7B}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0\CLSID\ = "{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1AFD8852-E87E-49F5-89B4-4214D0854576}\InprocHandler32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3D94CEB-EC11-46BE-8872-7DDCE37FABFA}\InprocHandler32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback\CLSID\ = "{E421557C-0628-43FB-BF2B-7C9F8A4D067C}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A8AED8642F8AB55F26212D915C615BDAB8C0DE7D pmservice.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A8AED8642F8AB55F26212D915C615BDAB8C0DE7D\Blob = 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 pmservice.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A8AED8642F8AB55F26212D915C615BDAB8C0DE7D\Blob = 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 pmservice.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A8AED8642F8AB55F26212D915C615BDAB8C0DE7D\Blob = 140000000100000014000000c04d850dcd7a8e9bc67e8f20375eb747fd3d397e040000000100000010000000d7331d40fc0ca9d2f4e45d8a280a5810030000000100000014000000a8aed8642f8ab55f26212d915c615bdab8c0de7d0f000000010000002000000059b45fa897dc38a658a39e65922901f06e83ad128e69a13503a586f0ddb29c762000000001000000bf040000308204bb308203a3a003020102020900b8bc215aa037539d300d06092a864886f70d01010b05003081d9310b30090603550406130255533111300f06035504080c0856697267696e6961310f300d06035504070c06526573746f6e311b3019060355040a0c124469676974616c205265666c656374696f6e3131302f060355040b0c284469676974616c205265666c656374696f6e20436572746966696361746520417574686f72697479311e301c06035504030c154469676974616c205265666c656374696f6e2043413136303406092a864886f70d0109011627737570706f72742d7465616d406469676974616c7265666c656374696f6e70616e656c2e636f6d301e170d3139303932363230303231305a170d3439303931383230303231305a3081d9310b30090603550406130255533111300f06035504080c0856697267696e6961310f300d06035504070c06526573746f6e311b3019060355040a0c124469676974616c205265666c656374696f6e3131302f060355040b0c284469676974616c205265666c656374696f6e20436572746966696361746520417574686f72697479311e301c06035504030c154469676974616c205265666c656374696f6e2043413136303406092a864886f70d0109011627737570706f72742d7465616d406469676974616c7265666c656374696f6e70616e656c2e636f6d30820122300d06092a864886f70d01010105000382010f003082010a0282010100d54e84e4ff6a497854211480176680c606b4e72935884775798aed7f7480686feeb63b1389feccf931e081c22000052094a03d257cfefa99dec2669f2ef4b79bd593dc3ad1e934156ffc803118f25525e055fce0fb21ba59156f915dd1bf73e5070940542be08d2ffe9757a07d9767086872503996a84f4576a4baea04c007326dfdd7d4742b9e17d6218a2f63fe2967a446792e4c1fda227fc6ca1efbbff315d88577d27bcc555e40af8f888caba76dd92dcdd3bbcbb8c0a1ac9153cc3661278858627666d8e4afab2b30ad19e6eb593c3e2febe478a5bff871cd29616bff8b1ce371fbbf375fcd8e869f89062167d855354803291513fb9668d7afbf24b9cb0203010001a38183308180301d0603551d0e04160414c04d850dcd7a8e9bc67e8f20375eb747fd3d397e301f0603551d23041830168014c04d850dcd7a8e9bc67e8f20375eb747fd3d397e300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d250416301406082b0601050507030106082b06010505070302300d06092a864886f70d01010b05000382010100bd8eb4a6bf99cb1d410709db71e2c933bfd76226013472f23a52da23652ab968e946bfdb495a20736b86ffb900f5ee2ccb1be25ae5eecec9ee47bfe75ccd143a76909febd45d3e240d4492e2b81d66622afb5de284683eb8455570961fa2b7ee899ff19d2f30c31d450a64d4f80b0658a37ebd37e9331f5eb9add40df722a141526c089bf7ce8f7559f766562fded7c78ef0ca231bd006db812b637d56e56805cef2106cec8e388b8d30e1510a1f00e45a55dad1859a6d7907fe5dba2465ec757277b85479dd8e3af211e6d247d51b3144705c7e18fc5bf7ac83f0e2e2bc080f6c27efe89c997156339e7d482411f34c401678651f2ea3c9ca4542769a28beeb pmservice.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A8AED8642F8AB55F26212D915C615BDAB8C0DE7D\Blob = 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 pmservice.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A8AED8642F8AB55F26212D915C615BDAB8C0DE7D pmropn.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A8AED8642F8AB55F26212D915C615BDAB8C0DE7D\Blob = 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 pmropn.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A8AED8642F8AB55F26212D915C615BDAB8C0DE7D\Blob = 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 pmservice.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A8AED8642F8AB55F26212D915C615BDAB8C0DE7D\Blob = 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 pmservice.exe -
NTFS ADS 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 817716.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Delta V3.61 b_30946817.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Delta V3.61.zip:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 1013.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe:Zone.Identifier msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2692 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 3264 msedge.exe 3264 msedge.exe 2232 identity_helper.exe 2232 identity_helper.exe 492 msedge.exe 492 msedge.exe 3184 msedge.exe 3184 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 1468 pmropn.exe 1468 pmropn.exe 1468 pmropn.exe 1468 pmropn.exe 1592 pmservice.exe 1592 pmservice.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 3568 msedge.exe 3568 msedge.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 37 IoCs
pid Process 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 4204 rundll32.exe Token: SeDebugPrivilege 1592 pmservice.exe Token: SeTcbPrivilege 1592 pmservice.exe Token: SeDebugPrivilege 6132 Delta.exe Token: SeTcbPrivilege 1592 pmservice.exe Token: SeDebugPrivilege 1960 pmropn.exe Token: SeDebugPrivilege 1960 pmropn.exe Token: SeDebugPrivilege 1960 pmropn.exe Token: SeDebugPrivilege 1960 pmropn.exe Token: SeDebugPrivilege 1960 pmropn.exe Token: SeDebugPrivilege 1960 pmropn.exe Token: SeDebugPrivilege 1960 pmropn.exe Token: SeDebugPrivilege 1960 pmropn.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 5940 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 5940 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 3604 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 5864 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 3640 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4412 MicrosoftEdgeUpdate.exe Token: 33 4340 setup.exe Token: SeIncBasePriorityPrivilege 4340 setup.exe Token: SeDebugPrivilege 4340 setup.exe Token: SeDebugPrivilege 2728 MicrosoftEdgeUpdate.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 3264 msedge.exe 3264 msedge.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 2908 pmropn.exe 2908 pmropn.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 4584 Delta V3.61 b_30946817.exe 4584 Delta V3.61 b_30946817.exe 4584 Delta V3.61 b_30946817.exe 3488 OperaGX.exe 4508 setup.exe 792 setup.exe 1480 setup.exe 5032 setup.exe 4552 setup.exe 4584 Delta V3.61 b_30946817.exe 4584 Delta V3.61 b_30946817.exe 4584 Delta V3.61 b_30946817.exe 4584 Delta V3.61 b_30946817.exe 4584 Delta V3.61 b_30946817.exe 4584 Delta V3.61 b_30946817.exe 920 Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe 2412 assistant_installer.exe 4776 assistant_installer.exe 4584 Delta V3.61 b_30946817.exe 4000 ContentI3.exe 1468 pmropn.exe 5480 pmropn32.exe 5480 pmropn32.exe 5480 pmropn32.exe 5504 pmropn64.exe 5504 pmropn64.exe 5504 pmropn64.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe 2908 pmropn.exe -
Suspicious use of UnmapMainImage 5 IoCs
pid Process 5620 RobloxPlayerBeta.exe 6028 RobloxPlayerBeta.exe 4612 RobloxPlayerBeta.exe 5324 RobloxPlayerBeta.exe 5604 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3264 wrote to memory of 2840 3264 msedge.exe 79 PID 3264 wrote to memory of 2840 3264 msedge.exe 79 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 5100 3264 msedge.exe 80 PID 3264 wrote to memory of 2680 3264 msedge.exe 81 PID 3264 wrote to memory of 2680 3264 msedge.exe 81 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 PID 3264 wrote to memory of 2476 3264 msedge.exe 82 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Executes dropped EXE
PID:1236 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://delta-executor.com/1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0xdc,0x7ffc687a3cb8,0x7ffc687a3cc8,0x7ffc687a3cd82⤵
- Loads dropped DLL
PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2732 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3556 /prefetch:82⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6712 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7088 /prefetch:82⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6864 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Users\Admin\Downloads\Delta V3.61 b_30946817.exe"C:\Users\Admin\Downloads\Delta V3.61 b_30946817.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4584 -
C:\Users\Admin\AppData\Local\OperaGX.exeC:\Users\Admin\AppData\Local\OperaGX.exe --silent --allusers=03⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\7zS0ADEFE09\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS0ADEFE09\setup.exe --silent --allusers=0 --server-tracking-blob=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4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\7zS0ADEFE09\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS0ADEFE09\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=114.0.5282.159 --initial-client-data=0x334,0x338,0x33c,0x310,0x340,0x717d8c5c,0x717d8c68,0x717d8c745⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0ADEFE09\setup.exe"C:\Users\Admin\AppData\Local\Temp\7zS0ADEFE09\setup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --vought_browser=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera GX" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --server-tracking-data=server_tracking_data --initial-pid=4508 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_20241111071818" --session-guid=eb54fcde-1ddf-4926-b8e6-33ee1716e30d --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=4C060000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\7zS0ADEFE09\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS0ADEFE09\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=114.0.5282.159 --initial-client-data=0x32c,0x330,0x340,0x308,0x344,0x70898c5c,0x70898c68,0x70898c746⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411110718181\assistant\Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411110718181\assistant\Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411110718181\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411110718181\assistant\assistant_installer.exe" --version5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411110718181\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411110718181\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=73.0.3856.382 --initial-client-data=0x2a4,0x2a8,0x2ac,0x280,0x2b0,0xca4f48,0xca4f58,0xca4f646⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4776
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PremierOpinion\ContentI3.exe"C:\Users\Admin\AppData\Local\Temp\PremierOpinion\ContentI3.exe" -c:1538 -t:InstallUnion3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4000 -
C:\Program Files (x86)\PremierOpinion\pmropn.exeC:\Program Files (x86)\PremierOpinion\pmropn.exe -install -uninst:PremierOpinion -t:InstallUnion -bid:3HhY3ReQkY_qUBwI3iPOGG -o:04⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\link.txt3⤵
- Loads dropped DLL
- Opens file in notepad (likely ransom note)
PID:2692
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5544 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7180 /prefetch:12⤵PID:472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6720 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6288 /prefetch:12⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6656 /prefetch:82⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=7220 /prefetch:82⤵
- Loads dropped DLL
PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:5936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7284 /prefetch:12⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7340 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7524 /prefetch:12⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7836 /prefetch:12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaService --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=7264 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7804 /prefetch:12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6928 /prefetch:12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6764 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7580 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:5700
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
PID:5600 -
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Program Files (x86)\Microsoft\Temp\EU84A4.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU84A4.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5940 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5728
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2484 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:584
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5148
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2016
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Mjg1RUUxQ0YtNTg5Ni00NjZBLUEwMTgtRTEyQjUzMjAwRURFfSIgdXNlcmlkPSJ7MTVGNERFNjktQTU1RC00Mjg1LUFCQjItOEI5QzcwN0FBRjAyfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InszQTBGMUQzNi1GOEI5LTQ5MjktOEY3My1CM0QwQUZFQTIyN0N9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE0My41NyIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9Ijg1MjEyMDI5MDQiIGluc3RhbGxfdGltZV9tcz0iNjA0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1840
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{285EE1CF-5896-466A-A018-E12B53200EDE}" /silent5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3596
-
-
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" -app -clientLaunchTimeEpochMs 0 -isInstallerLaunch 56003⤵
- Executes dropped EXE
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:5620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5600 -s 8123⤵
- Program crash
PID:5832
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7804 /prefetch:12⤵
- Executes dropped EXE
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵
- Executes dropped EXE
PID:3516
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:pAyo61nbgBd_woYuPcKzVubr-989zHzzuF-rvqlYcdD9uD1nMf4Fp86JkUOZ0ZUk8QdkCMkbwfXEcFWn8NZMWS1SiMHizSJqsl2X2L5h6oWX3WIv1Gbz2lRGcbVN9Ih5c20kVdxIptuLg4R4lJ7CKKjPpcmtcFtUYwImiDmXlECUK7Xem5GKUyPcr9suxD_TM2ShWg0UlygkQ57C_EpKLVdk8XdRiRgRmEX9XB-PBUc+launchtime:1731309710692+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1731309613333005%26placeId%3D5771467270%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D94c7229e-089e-444c-9ca2-faf18b01e3d7%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1731309613333005+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7856 /prefetch:12⤵
- Executes dropped EXE
PID:5636
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:7OO83I0KmDbTAn4x49sYP7jzujBOnr3BlVMYORmdTfBSjhp85hlXxwVPYc_VS8LOBnQMJd_a747rlhzNZYO63vtkWXaTA32nf4742Gy9CNNf1kLJUUJvB08H6b_fZyEGIzQIroH51M1OnduIaHYfb1GHiAow-iRzFtleUSIPvR5s4YCKobB-2q5W3S4kG9-TDhwKdolJIw4yDNi7Csg461eCLy1mCQYdUpLfKTvok9E+launchtime:1731309710692+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1731309613333005%26placeId%3D5771467270%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D94c7229e-089e-444c-9ca2-faf18b01e3d7%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1731309613333005+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵
- Executes dropped EXE
PID:4584
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:3SHFyO6Uv7F6db97J3O6yzCWqwKcFw951t9FQWOy8-GqDmtegZS9mssVKEvMjSuXfmyLI9L-3XOwYEfshkPc3yA8S0AD2Hx9pQn9Qqz-FLzlc2Bkpy3aDSvLnvM7l0EloDwNAKCtsw1mfR3wvxA_705goOKZ_UaUHLRUGWjfdLfct_gvPo02lH1NSp5YADXN-JyKAHUXtwZVEYf4brD5TsmccRKAKdbCp5mhs8TKP0w+launchtime:1731310047120+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1731309613333005%26placeId%3D5771467270%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D27f5ca45-aa97-43db-8321-43b6732ae1d1%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1731309613333005+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17943363795627778856,6228083158264593068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1136 /prefetch:12⤵PID:5300
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:KSGLLNTqBXw0YOY5-D1Tou6w-g5EA-kYX2B-3LsFBH1W7xeiCEO4ipEpfkvJjYtCuP13_7e1yS0GF939D88fFleLS81-85pVTivbJLV4-MEiTmHg0XRFT9ZZKq2ZOzRlqSs0bRK3Fxzug6kHY5RygnBH57u8gltbqKpW-wrSJA9-RlPxEQKVZpQ0puchYC0r6TgBtX2g860vxoJQISuoIL6SjSakQf-JPxRs6KWfi6Q+launchtime:1731310509714+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1731309613333005%26placeId%3D5771467270%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D9d535aab-5b60-41cf-a694-dd746b7cf808%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1731309613333005+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of UnmapMainImage
PID:5604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
-
C:\Program Files (x86)\PremierOpinion\pmservice.exe"C:\Program Files (x86)\PremierOpinion\pmservice.exe" /service1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\pmls64.dll,UpdateProcess 12362⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\SysWOW64\reg.exereg.exe EXPORT "HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{eeb86aef-4a5d-4b75-9d74-f16d438fc286}" C:\PROGRA~2\PREMIE~1\RData.reg /y2⤵PID:4880
-
-
\??\c:\program files (x86)\premieropinion\pmropn.exe"c:\program files (x86)\premieropinion\pmropn.exe" -boot2⤵
- Manipulates Digital Signatures
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -s3⤵
- System Location Discovery: System Language Discovery
PID:6140
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -s3⤵
- System Location Discovery: System Language Discovery
PID:5348
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-AppxPackage3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exe/C C:\PROGRA~2\PREMIE~1\pmropn32.exe 29082⤵PID:5456
-
C:\PROGRA~2\PREMIE~1\pmropn32.exeC:\PROGRA~2\PREMIE~1\pmropn32.exe 29083⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5480
-
-
-
C:\Windows\SysWOW64\cmd.exe/C C:\PROGRA~2\PREMIE~1\pmropn64.exe 29082⤵
- System Location Discovery: System Language Discovery
PID:5468 -
C:\PROGRA~2\PREMIE~1\pmropn64.exeC:\PROGRA~2\PREMIE~1\pmropn64.exe 29083⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5504
-
-
-
\??\c:\program files (x86)\premieropinion\pmropn.exe"c:\program files (x86)\premieropinion\pmropn.exe" -updateapps2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=1527c705-839a-4832-9118-54d4bd6a0c89_cw5n1h2txyewy3⤵PID:4652
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=e2a4f912-2574-4a75-9bb0-0d023378592b_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:728
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=f46d4000-fd22-4db4-ac8e-4e1ddde828fe_cw5n1h2txyewy3⤵PID:5192
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.aad.brokerplugin_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5248
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.accountscontrol_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5324
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.asynctextservice_8wekyb3d8bbwe3⤵PID:5356
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.bioenrollment_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5412
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.creddialoghost_cw5n1h2txyewy3⤵PID:5652
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.desktopappinstaller_8wekyb3d8bbwe3⤵
- System Location Discovery: System Language Discovery
PID:5800
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.ecapp_8wekyb3d8bbwe3⤵
- System Location Discovery: System Language Discovery
PID:5836
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.lockapp_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5408
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.microsoftedge_8wekyb3d8bbwe3⤵
- System Location Discovery: System Language Discovery
PID:5896
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.microsoftedgedevtoolsclient_8wekyb3d8bbwe3⤵
- System Location Discovery: System Language Discovery
PID:5936
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.onedrivesync_8wekyb3d8bbwe3⤵PID:5888
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.ui.xaml.cbs_8wekyb3d8bbwe3⤵PID:6012
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.vclibs.140.00.uwpdesktop_8wekyb3d8bbwe3⤵
- System Location Discovery: System Language Discovery
PID:6052
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.vclibs.140.00_8wekyb3d8bbwe3⤵
- System Location Discovery: System Language Discovery
PID:6084
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.win32webviewhost_cw5n1h2txyewy3⤵PID:6132
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.apprep.chxapp_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:1812
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.assignedaccesslockapp_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.callingshellapp_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.capturepicker_cw5n1h2txyewy3⤵PID:5244
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.cloudexperiencehost_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5260
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.contentdeliverymanager_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5336
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.narratorquickstart_8wekyb3d8bbwe3⤵
- System Location Discovery: System Language Discovery
PID:5416
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.oobenetworkcaptiveportal_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5660
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.oobenetworkconnectionflow_cw5n1h2txyewy3⤵PID:5808
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.parentalcontrols_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5752
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.peopleexperiencehost_cw5n1h2txyewy3⤵PID:5832
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.pinningconfirmationdialog_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5880
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.search_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5904
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.secureassessmentbrowser_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5984
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.shellexperiencehost_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:6016
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.startmenuexperiencehost_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:6052
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.xgpuejectdialog_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:6100
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoft.xboxgamecallableui_cw5n1h2txyewy3⤵PID:3208
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoftwindows.client.cbs_cw5n1h2txyewy3⤵PID:3068
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=microsoftwindows.undockeddevkit_cw5n1h2txyewy3⤵PID:1192
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=ncsiuwpapp_8wekyb3d8bbwe3⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=windows.cbspreview_cw5n1h2txyewy3⤵
- System Location Discovery: System Language Discovery
PID:5232
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=windows.printdialog_cw5n1h2txyewy3⤵PID:5320
-
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=windows_ie_ac_0013⤵
- System Location Discovery: System Language Discovery
PID:5316
-
-
-
\??\c:\program files (x86)\premieropinion\pmropn.exe"c:\program files (x86)\premieropinion\pmropn.exe" -installmenu:PremierOpinion -v:NONE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Delta V3.61.zip\Delta V3.61\Delta.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Delta V3.61.zip\Delta V3.61\Delta.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5376 -s 15762⤵
- Loads dropped DLL
- Program crash
PID:5740
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
- Loads dropped DLL
PID:5432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5376 -ip 53761⤵PID:5716
-
C:\Users\Admin\Downloads\Delta V3.61\Delta V3.61\Delta.exe"C:\Users\Admin\Downloads\Delta V3.61\Delta V3.61\Delta.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/4TfpR6wUUu2⤵
- Loads dropped DLL
PID:5232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffc687a3cb8,0x7ffc687a3cc8,0x7ffc687a3cd83⤵
- Loads dropped DLL
PID:5204
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
- Loads dropped DLL
PID:3036
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
PID:2236 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Mjg1RUUxQ0YtNTg5Ni00NjZBLUEwMTgtRTEyQjUzMjAwRURFfSIgdXNlcmlkPSJ7MTVGNERFNjktQTU1RC00Mjg1LUFCQjItOEI5QzcwN0FBRjAyfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntCM0NEODg2Ni04QTFCLTQ4NUQtODU4Ni0xMEZCN0UwNUZBOTF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9Ijg1MjQ4ODI3NjUiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Checks system information in the registry
- System Network Configuration Discovery: Internet Connection Discovery
PID:3288
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A7B0D10F-F2FC-4910-A205-DA84B3BBD619}\MicrosoftEdge_X64_130.0.2849.80.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A7B0D10F-F2FC-4910-A205-DA84B3BBD619}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:3744 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A7B0D10F-F2FC-4910-A205-DA84B3BBD619}\EDGEMITMP_15B56.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A7B0D10F-F2FC-4910-A205-DA84B3BBD619}\EDGEMITMP_15B56.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A7B0D10F-F2FC-4910-A205-DA84B3BBD619}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2160 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A7B0D10F-F2FC-4910-A205-DA84B3BBD619}\EDGEMITMP_15B56.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A7B0D10F-F2FC-4910-A205-DA84B3BBD619}\EDGEMITMP_15B56.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A7B0D10F-F2FC-4910-A205-DA84B3BBD619}\EDGEMITMP_15B56.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff7ca4ad730,0x7ff7ca4ad73c,0x7ff7ca4ad7484⤵
- Executes dropped EXE
PID:6048
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Mjg1RUUxQ0YtNTg5Ni00NjZBLUEwMTgtRTEyQjUzMjAwRURFfSIgdXNlcmlkPSJ7MTVGNERFNjktQTU1RC00Mjg1LUFCQjItOEI5QzcwN0FBRjAyfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InsxMDdERDQzQy03OTJDLTQwNzctQkI4OC0wQ0IzMkM5MTEwNER9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMzAuMC4yODQ5LjgwIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI4NTMyNTMyOTg1IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-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-2⤵
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5600 -ip 56001⤵PID:1712
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵PID:1460
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5864 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{270D9AAF-E985-4207-A9FD-0260FEBA7AA0}\MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{270D9AAF-E985-4207-A9FD-0260FEBA7AA0}\MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe" /update /sessionid "{72D5926B-70BE-44A2-BD7E-B8BC5C1314FD}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5044 -
C:\Program Files (x86)\Microsoft\Temp\EU95D2.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU95D2.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{72D5926B-70BE-44A2-BD7E-B8BC5C1314FD}"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1464
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2368 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Modifies registry class
PID:5852
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Modifies registry class
PID:1100
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Modifies registry class
PID:5272
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2124
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NzJENTkyNkItNzBCRS00NEEyLUJEN0UtQjhCQzVDMTMxNEZEfSIgdXNlcmlkPSJ7MTVGNERFNjktQTU1RC00Mjg1LUFCQjItOEI5QzcwN0FBRjAyfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins5NzA2MzY4Ni1DNjBELTQwQ0YtOUJCNC01RUExNEY3MDRGMkR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTcxLjM5IiBuZXh0dmVyc2lvbj0iMS4zLjE5NS4zNSIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExNTU0NDc4OTY4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExNTU0NzkwODI3IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExODI0MzgxMjE5IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy82OGQ1NzdhMC0xZjRhLTQzNGYtYmRjZS0xNDhlZGMxZTRhNDA_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-PC9hcHA-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjkwLjAuODE4LjY2IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzc1NzgzMTkyMzkzMTc4MCI-PHVwZGF0ZWNoZWNrLz48cGluZyBhY3RpdmU9IjEiIGE9Ii0xIiByPSItMSIgYWQ9Ii0xIiByZD0iLTEiLz48L2FwcD48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iMTMwLjAuMjg0OS44MCIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIHVwZGF0ZV9jb3VudD0iMSI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0ie0NCNTlFMDRFLTQzRTgtNDVBMC1CRjcwLTk5NUZGRDVFMzBFNX0iLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:440
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- Executes dropped EXE
- Checks system information in the registry
- System Network Configuration Discovery: Internet Connection Discovery
PID:1092
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\MicrosoftEdge_X64_130.0.2849.80.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵PID:5064
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4340 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff71fb6d730,0x7ff71fb6d73c,0x7ff71fb6d7484⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Modifies data under HKEY_USERS
PID:808 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff71fb6d730,0x7ff71fb6d73c,0x7ff71fb6d7485⤵PID:5952
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵PID:1360
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff66884d730,0x7ff66884d73c,0x7ff66884d7485⤵PID:1744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level4⤵PID:4600
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff66884d730,0x7ff66884d73c,0x7ff66884d7485⤵PID:2464
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMzUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7M0MwMzEwQkQtQzVBOC00NjEwLThEMUItOTVFM0ZFNTkwMEVFfSIgdXNlcmlkPSJ7MTVGNERFNjktQTU1RC00Mjg1LUFCQjItOEI5QzcwN0FBRjAyfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InswMDNCNzM5Ri1BRTZDLTRCMDgtODM5Ri0yRjRENDMxNjI5NjJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjM1IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9IklzT25JbnRlcnZhbENvbW1hbmRzQWxsb3dlZD0lNUIlMjItdGFyZ2V0X2RldiUyMC1taW5fYnJvd3Nlcl92ZXJzaW9uX2NhbmFyeV9kZXYlMjAxMzEuMC4yODcxLjAlMjIlNUQiIGluc3RhbGxhZ2U9IjAiIGNvaG9ydD0icnJmQDAuODQiPjx1cGRhdGVjaGVjay8-PHBpbmcgcmQ9IjY1MjQiIHBpbmdfZnJlc2huZXNzPSJ7Q0RFRTQwOTktMzA0Qy00RUM5LTk1RTgtMEIzOTYxN0Y0RUEyfSIvPjwvYXBwPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSI5MC4wLjgxOC42NiIgbmV4dHZlcnNpb249IjEzMC4wLjI4NDkuODAiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaXNfcGlubmVkX3N5c3RlbT0idHJ1ZSIgbGFzdF9sYXVuY2hfY291bnQ9IjEiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzc1NzgzMTkyMzkzMTc4MCI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSIxMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTUwMTk2ODc1MjIiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTUwMTk4NDM3MzciIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTUwNDg0MDY3MTkiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTUwNjIzMTI3NjkiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIxOTY3NTciIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1NTg2NjU4OTgxIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iNzk3IiBkb3dubG9hZGVkPSIxNzUwNzY5MjAiIHRvdGFsPSIxNzUwNzY5MjAiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIyIiBpbnN0YWxsX3RpbWVfbXM9IjUyNDE5Ii8-PHBpbmcgYWN0aXZlPSIwIiByZD0iNjUyNCIgcGluZ19mcmVzaG5lc3M9Ins4OTBBMDlGQS0xM0JCLTQ2MjAtQkZGMS0wNTYxMTI2NDI2RUZ9Ii8-PC9hcHA-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IjEzMC4wLjI4NDkuODAiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBjb2hvcnQ9InJyZkAwLjM1IiB1cGRhdGVfY291bnQ9IjEiPjx1cGRhdGVjaGVjay8-PHBpbmcgcmQ9IjY1MjQiIHBpbmdfZnJlc2huZXNzPSJ7NjkzOTJFNEUtQjQ2Ni00NzFBLUI2NDMtMzcyMDBDRjNCMDREfSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5664
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
5Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Share Discovery
1Password Policy Discovery
1Peripheral Device Discovery
2Query Registry
6System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bac045fa2209f06c4483831e685ebb33
SHA1cc295497e2e39057fa89b6a578559be59882b8b7
SHA25623f8d6e43e9ac9001328020a07dcc8184f79973f4f5c8f75f8e1e0650033329f
SHA5120e23d40e4d06c473948e7d462ffb3ae71f749812fdebbef1f2f94220698ff6c26405c3315bde5890abdd29d5a585602462fb607e98fd65ee1cbcf9de623c5498
-
Filesize
3.1MB
MD539d79081d053c786328f09ccb448030f
SHA1e5901cfedf9566a3b6ae8c37621e6f7fee62c56c
SHA2565e139d6b4d66b6c1dcaad36701ecef1098876de33c1c45adafa5e76e960445b0
SHA512d26032ff9b364f5d69fbe6f073659092eec6e90a384d7889cdcfacd4640edd22e8c4ece1cfdc2bdcc3ea4d0b15f2c4f08cb6fc049d869ffc0c2790bd558e92a6
-
Filesize
6.5MB
MD5b621cf9d3506d2cd18dc516d9570cd9c
SHA1f90ed12727015e78f07692cbcd9e3c0999a03c3a
SHA25664050839b4a6f27d896e1194e902a2f7a3c1cab0ef864b558ab77f1be25145d6
SHA512167c73cf457689f8ba031015c1e411545550f602919c35aff6fd4d602bd591d34e8c12887a946902b798bf4cf98aadfce3c2de810bf16c7c24a216bfd8abec19
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.195.35\MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe
Filesize1.6MB
MD5dc1543edd0dcd56536304bdf56ef93f1
SHA11a8b2c7791f2faa1eb0a98478edee1c45847075c
SHA256ccbb3d9a4877999a55b2ca6b8128481e91c4b56780f581226f916c0fb2db0772
SHA5122a6b4aa39bc3e4d234909077d5c6d75b9968c1778d505cc12431afd7aebd01eb65ed2f6f0c53c67f18eed7e97b67a93bab8c44574e3918ccd5cfcd8681767056
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1CE78A66-78E8-436E-BA00-8FD03D191FF0}\EDGEMITMP_9A4E0.tmp\SETUP.EX_
Filesize2.6MB
MD5958befee6afc25fa51e4bf538d0894c7
SHA170a2f157988f6cef27048bc2b3c81e8ab4b41552
SHA2565422f0b35bac6fc926c6f537d42cfa4aaa7985e89e4e680acc467d804071a006
SHA5127ecf452f007d849268b4cc2644ecb239b2a4309a80f4350dfb215f6fc34950cabf1bb233f43bc6678547931af7b427517ed8c88cd214aa0358122777a5a8cce2
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
3KB
MD577eb3ade4c5b0db67c6e8a26f131073c
SHA1ad9e8c00174cc2e707f59df671f89a9d7fc2ffc7
SHA2569f19e7a7139cca8373b516ab1ae49c644aa1c8048e8c7aa5784774a081dcbb87
SHA51220eb7d34c80bb8d8a415bcdccf8e46cb36396c095ed1468b69c0cb91da915e3a14c7fd55247f68e64ff71cf8d336cc286c3662710ca6281840fdc2f1eb7ac6a1
-
Filesize
885KB
MD550a0c6c01cdc5d2690ccd1f1541f6670
SHA1c5e017a468efb70eabb1f861784edac62acb0e17
SHA256f9a853830949bb22d6f4d128d71a0ab923d9b5549c0dc8785c7de7d1a4eabf99
SHA512028d5a56c581d3751628c7503e83aa52c332678495943c3648049ae0b26a7190e98395ad205cf60896140d1a802c14a346a2d1553e7b53090c3f5beefd66e9b1
-
Filesize
1.1MB
MD5aa56cb7fd83150c3a75cd6a0de97eb78
SHA134415c5c8e57cfe9a7b4a498eacfe1403f3191ec
SHA256034e066829d28bbc81604250f6df721a35ab1c0898ab82bef6305ffada240765
SHA512765f12e5e060db934d0f4e8159bb9bd10cdbe797d79488a0dc88215a73e49101e279ca69e10c1775a5e161bb4dd02585724c7c87bbefdcdd047adb4277804fa2
-
Filesize
807KB
MD59d96ccb0d5ab5541b61d5c138d91796f
SHA1cf3ee3e66c8f9c23e3efd29978215461347e650d
SHA256379a1f1f02c8cb704f248c2f1ff79c8986f73c350a3bf6d9bbc93aeacd286e36
SHA51269ca7d96896d872eefa63f0c0bd9613526a914e99c4cf12b5d221315277aa64894d99d0f5ce9c5e0ef640d61c9202cd3d51ddb2ab4c55f8fdf60d24a8c1ff6ac
-
Filesize
6.7MB
MD5f27f98c1a877f9ca6f06c23bed4014ca
SHA125a231319659c30d6f86a5c9cdd1747d7c471542
SHA2561ed47933c9f33c4860ecc0bf1ba7525212aa00054037a9a51a8d8f5ce3b821bd
SHA512f054a618d2f8e7a829c26548312b436e21058ee1ff64b40e7c19be2bde037003c21332af3c60e2fd92675af80526ef6faf84b8c1d7a095bb2c4d0b799e66599c
-
Filesize
245KB
MD56e4d6b68e9565c4cc7791b00c2094ff9
SHA1965a00a5a8bb05b35fbaa357951779ea3b71e392
SHA25665d6f18e1b366aff5343c3f6628041329e7c1375d18ba57076b19bf5f48bc483
SHA5120cb1396822c7350057cfc7280e1c67ccf1e1a2206347a10025e285f00e9364563685ba5282775960a9329511fd321a631222c87ae7ca8106eca00fb78722b20f
-
Filesize
304KB
MD5ae5bbcc69b05359d0d5cc72ca6a1262e
SHA16843bd883d50216be44065411a983a4bcccdcc91
SHA25612bfd1007634138b22c56ead24db02a1fe3a4d4b7fe04d30cd07a0ff5d4c8425
SHA5126417aaeb4ccd86504bc1f83e32c91a60920e98fff833c02fdbef974819a3288cab0c96d6b114ceed4432c305d49120cacbc7e0da69c911f4035aadfbec7a91de
-
Filesize
6.7MB
MD5b68e7f7ae52ef8e962723c7ddda4f75d
SHA1686bdf2057cdd7b16877fb5eec0aff150fa074d0
SHA256d779b2acc52b4b3e72c1461dbc7e950f0b650e924b3799db425942f64624e94d
SHA512cb0ecf531c95d657019b0188e648520b36b8386516d2e640239d99972ae44439d21ec6fcbe7902fc59c6f65db3571db0944e48f2207a442f3be5d10c9655bbb1
-
Filesize
14KB
MD5d54b5c811a779858bf408d63121043b6
SHA18cacfafe58581b076d5345cc46c90f5b6d4789d2
SHA2567abcf21ea92b08321f50283af7475cde57a099cc69c9a676950d249a6c9a8596
SHA51248866a8bf614f9f86a64f07bb3d65c6416152705435553499dff57687267656dcb5a3edd4acfac91af1fe43c7cc40df6dca5eef06644b5fa17018f81f9483da8
-
Filesize
1KB
MD567e486b2f148a3fca863728242b6273e
SHA1452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD504d68a878a1114a69a74fc3c2c268506
SHA1e73482e85f76a00e763644d137ab884366e48cd0
SHA256d936ae2422ee09392f3db3fb05ac383c00c56559a5a041c6fd757225efba088c
SHA5123f9b10d642d378db3f8acd1b3e1ca91f92cfe2794a3808f68d572e3939aeb6fc5ac9ee1b717acd9e1cd255ceaf6b6f6d059fc9d281636aad9822665cd7e5d41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5244a0c13590fe89513a686f53e34c4f8
SHA1a838846844b239a72d85a4c6ee393cbc702e9801
SHA256e2d7ada655ba66432b3ca19b1c241574d6dc578a3ce4488ea896bf7c0a23428c
SHA512a7f8e13b895e2baf8d704742bc1a472eaf64adf84287b5d514970321db410c047208ba0db52d3d878e20c35b9f23c561fd5c6fa61062238c6fc09d13fede9c14
-
Filesize
64KB
MD50083b29045af4f4d3ecd49f5fd541bfe
SHA183b92c5187e7b93298f86d83826c73da1098850c
SHA256cc62ff55c91b10f17b0543d59486a3fb907d7be658043a3b23ece70dbfac797d
SHA512006257f5be6341184434d071f7c38984d9f1aee74602475f38ca0637c66a5169856e21603d758c3f3a47fbf1aa65aa5f798e2e49b598f75147c4fd47207bbc51
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
992B
MD52e56822cad031b72223f47167d62bf5b
SHA11403ee99a61e9ae9d15a22106700044e30873b91
SHA2568200a2554862473fb558df7f62dea2553e92d883ff9c808aba22d7c9572185fa
SHA512852b024b63259d5a6b6690f94761faed40bac758662f23496fb1c3839e99062fe37d6487b423cf1d145265e1bbdfb3d4bda37b3e74eaa136bd5b8e61838d5817
-
Filesize
152B
MD5aad1d98ca9748cc4c31aa3b5abfe0fed
SHA132e8d4d9447b13bc00ec3eb15a88c55c29489495
SHA2562a07cac05ffcf140a9ad32e58ef51b32ecccf1e3ab5ef4e656770df813a8944e
SHA512150ebf7e37d20f88b21ab7ea0793afe1d40b00611ed36f0cf1ac1371b656d26f11b08a84dbb958891c79776fae04c9c616e45e2e211d292988a5709857a3bf72
-
Filesize
152B
MD5cb557349d7af9d6754aed39b4ace5bee
SHA104de2ac30defbb36508a41872ddb475effe2d793
SHA256cfc24ed7d1c2e2c6585f53db7b39aa2447bf9212487b0a3c8c2a7d8e7e5572ee
SHA512f0cf51f42d975d720d613d09f201435bf98c6283ae5bc033207f4ada93b15e49743a235a1cfb1b761bde268e2f7f8561aa57619b99bff67a36820bc1a4d0ec4a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6ed214b9-dd1c-4a70-990b-82d65487b6ac.tmp
Filesize5KB
MD584a304a8a11790a30d3ba8b1f58a3f11
SHA12012638c8c2b7a7153653d1e7b184302fb0f67b8
SHA256ef719a732f04e1ddabb06584765cbfb63daf45341bd311a60a037a49978684b4
SHA5123f03435c87d6df18f4a02b82068b2f47198ae4b6eb2b524c3c8e62ef47d82b79d74367d15425f70bbe199055af40e9fb2d7e6b39bcd306c49745ee21e9ec6aa5
-
Filesize
32KB
MD551da7ce00c201752e3703845ff55bf5e
SHA1b4a1dc1eb28945b6c7eccfbe8920918c168e81d5
SHA256120c5e791aa9f91ddb99fe3ea88c83b7f1f60caf8336307af747439e56bb8967
SHA5126602f1860b4178ac3fb4d90f43dc36929f4b3b76ae2ae800f830964a0521c41fbce6675e469146c5a909196df302ab9a5a99417be628078573037091ae6c1e34
-
Filesize
92KB
MD597b9940ce8ba7b3f3eda7bb55435f3d7
SHA1b1f6aec1ccde480c2901c791c678fdafd8e2c7fe
SHA256d96902ab2818db4cc66aa586715f1bea2b011d51dd5b90cb05b20b0decb58e2f
SHA51201eee053051102b2f2c2f640cfe136d744380bfaea62caa63c84f63c85283a430fc48f4bee0ed3c9c0ffe441a2ae265ca670ed050f6cd05e2338208fc250c47d
-
Filesize
51KB
MD5588ee33c26fe83cb97ca65e3c66b2e87
SHA1842429b803132c3e7827af42fe4dc7a66e736b37
SHA256bbc4044fe46acd7ab69d8a4e3db46e7e3ca713b05fa8ecb096ebe9e133bba760
SHA5126f7500b12fc7a9f57c00711af2bc8a7c62973f9a8e37012b88a0726d06063add02077420bc280e7163302d5f3a005ac8796aee97042c40954144d84c26adbd04
-
Filesize
6.7MB
MD5da5705f4ae30d837139cb7380d941e1b
SHA108ae6cb9b2703df17b2bf554586a36f4b73502a6
SHA2569f205a55a45a2a45d2ebb98afb21499b191a4b2e26f4311568d0337b32faa1ca
SHA512f3042947d05222aff5facc14ac6123380d502435e98608dc6d053848997cdd0fb22b121a381e67df893c15ae14ed836a58fca5898540ea5dfb0a0da32ed8dbef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5476c9d3258a0e50aa31a0b6fe56e422f
SHA1dfeff3661a3aa55439b1d74434d313d462697f47
SHA256b636ea4b27a8a3d30342af376730834f2e76655e05f3035f85f4392a170d1393
SHA512a607a192f1b356a345a0c754c7bd72e40a6b9f02bfdd3fd2cb76913be75f11d3376f6ea9253b1f19498e5fce151bad2564ecd307be53e846342a55c20081045d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD53048840113eceabe72e09d36be5a1cd9
SHA14bb7b3c28c63c4aaca203ff62183c1365012d8d9
SHA2565d32c573dd7e14597934257ef90ad66365f1f527001bbaf7c0008f8d17649266
SHA512200fe519066df242c511ff433d0651267be00ed4baaef060ebf1ba37b5e672ee424b7f6ab8b7eab4b49664993fc298a190b10f477786f103dc848493d75b20f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d58c631153869d4c8e5e7021d1df97bd
SHA1961272f9f64b579e376a0ca4b6148991b062fe6f
SHA25612a8d061bee3fa746593e2249d1a1c4a15eadc89d0592ac91da0343e66407027
SHA51291968b1dec1a55bdb25ec656fcc92f2ba772f342979959be264793d901af6af555a40a943f636c1adf23e1106ca5dc1604cf899309e57d96c94f4a34142af66b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD56f49a62853958965da4f997c8839f829
SHA11ac0cb9e9267123e07644b81ae80cb8ec30b0400
SHA25614edf4dd9da508c5f0e32ee8d5b5289505a4444b270b67c19057ec3ef72e9675
SHA51286e2921a43a488f525b870453b307365c12bbc747469c2ffad6511b99775ac9e2bb4580d1e0e55f9fbb9641df32bc409bd9725937159544c005d1fe6d172372d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5d701a43904911036b5eb53384408a68d
SHA1e1b1489578bec335996e6b6d69e8cbd97ffbc707
SHA2565a06c7ae1f446cb114b5bd8f3aa5847521bd30a8172f32d481014a9b899856b7
SHA512be95cbb4f872e6eccd72787f849ecb85f4dc0e33a1aa376b88592bb814bbbed9374023098f1bbf588f99a6360f80fedae4820e55e35353a4f1bfdb6223101124
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\000008.ldb
Filesize707B
MD57e1aa108d3b92c4dc915e1ae140a68ac
SHA16383f1c980845eb989ca70b974ed504374ffe25b
SHA256c5394c73292465b0d48a60c23912583a4a2621da4050106cacc054e8848c26f6
SHA512458a11ee015804a9894f7ba489fe91a974719ade8ca29f4a9350304b31aea00154a0823dbc4863604460d36350203cfcf73b9b0cb14579e4134d46f3447226aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old
Filesize753B
MD59077c5dfe7762d54e05759e9cfe64b78
SHA124dbd884bd5ef1bac8a7fb84d725db945af25b5a
SHA25696f99162fe961619b7729362e2ed9e4550810e2ec3df6f91e7e552fa81e20271
SHA512659d054c06a9d936733f16f8c2fdbc3ea982f7584432a22e1189c65a1413cfb063d48af315651423e96a4a3a4bd37c7305a703574bf417d1b881e6ee509b13bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old
Filesize752B
MD569d708f81d6708e9e39a2cc4da7baf97
SHA1f666d379189ab41fd90c0b81a31277c4053efc30
SHA2562d847857a74e2ed765de53315d60b50f20a91ac9c7b9988462d9e940c7c82a51
SHA512e80c3682cc8d1e940900ab072acb5607a23c1238192594fe0e52e929cea47b2c39951587efac8732377e7b817d18f62319dddf97a2216bd38f9cac03d8db0b58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old~RFe5c0651.TMP
Filesize1KB
MD5baabcb796ad5cdec8fcf2c3dc1c3798b
SHA17b27b6e2250e68e77b08931cf48dc87731e79c0b
SHA256bceda5ea4d9fc73e957dbc709eef7044d56b66a09ed1714f2f903d3339b1cfe9
SHA512d7829c36885625f8d1f7ee265ef026b02160ce7c72845bd6a85e003af34492f0e1a49bb34b17640cf3fe197da02b9fd3d52c329e1d48a564a108b59a4ec04e6e
-
Filesize
5KB
MD55c66534fb881fafa025311df59877635
SHA19b53187ab550bd82c6a4935ba0fc956f44b44a8c
SHA25658cf3fbb67db33c9d674a19a638c7fb7f085545bfd3b4968590536fb0b451f0d
SHA51211d8803085fce983d298e708340226131b2fc8b627596feecf3e9c7c4754ac95c4dc2d2f05a6dc5588ce48b97c34569dc9160543173c5001c166a55c843a9a27
-
Filesize
5KB
MD5192ad50877dac86c350fed8cbe66c920
SHA18124b924261ccffc4b29de336b7b9ffbefb307e8
SHA256eefd43389d939414e028334e40dc200f49c47e3c5fa30a283a4503ccc0e078f3
SHA512de3d385073e75dfdf08348709cc7eb5ee100e92383ea5d501bec213aa8081d7e8aff7a1f607d848286e06f754d1910128ed3a464cdd0e2ddfb5f02b1ab3dbfab
-
Filesize
6KB
MD5b6656afd1599049207e61093c9830541
SHA1955ea26e84ca366da45bc9c659c79878a90d52af
SHA256683d60ce99647e7dbdfb1b234e546f36fe9506fad33e919b6cb64d62b1df8c0c
SHA512a4c0ce6e7c236b909c7c2e0e2a3d0d5d982a8d4d0f7c3a12703587cf5891e1dc559adc77061489258b4f4925781df032bc3cabc08bc66d80700dedcfea20dc9f
-
Filesize
8KB
MD541d7e4bc49982a130aaf789ff0e52918
SHA10ae7e7b0851db49c6893260fc08dae756ed083fd
SHA2563f733c056b91107f0f41a82c196df5eee40b7b63caf4047295c63c19281716da
SHA512dd7b4783671b833cc917f1334402d662f1bea1cf3a17ec4258fee4bbe3fe8a695d09e7feaff12337bb948d5a2d53383d4dd3967c99af1f2e0037aa9e8ab00b33
-
Filesize
9KB
MD510e6ae2b4898be71ee40004ae3dba1d7
SHA16c7df7445e8e148d4dd785f5f3b864e2d4d91a90
SHA25638638fd14f9b460b7864827f43d887ad037c14ff5d8b71099fad4d60b574b680
SHA512a50b16cee941a4fbaa800b5577e4ae234f193f65f6548e60ae0d3bf94a44ba7b7d0ef6b434edac24d8cd08ab6aa2f80780624df3606a8982fa017b92daa2804b
-
Filesize
9KB
MD5242ce96bcfcd64e9e1f0a0a0b5abc718
SHA1e84e7c555c8cb859512c0f627d8eb990c667b9c4
SHA256e08db71151ae47c45e26c555c51450a544fc979b761d726749e4209df205460e
SHA512c65bb4b63d8d91e2c1ee8bb8add349637aa3e48913ac0470068cd2373c1cbeb762bcd6c3c82640aca9fa485177b7d688454c5f1be357f34298f944b359ee786e
-
Filesize
5KB
MD5d4327c740b0575bd89b9468497e6f838
SHA186368583c37049e59038c4d699b2b77f36264e5b
SHA256f12bfd10cb1b3d71f5bac008e90c0f4999a1739593d73635cd7b007d105497d2
SHA5126b3255762fd934eb8ecb54e0be6d535e34a74b03b1b06813139efc221050a62950da8dbe73c7946ba5d83fe4750938d3ec7604996135ecf96e0a90650cb7a68d
-
Filesize
8KB
MD52382dac2238d5141c41173437152b8a2
SHA16047cccc385c56633a43bf6c54ccff0809522189
SHA256cfce4ed52cb8307a270473b119550ecdce27d876136b2e39eb9a4e24171d1101
SHA512aa2150239f4fdd066e02d0319a89820bdba70da73b2c118bc920eb0b002c2792e7a3e5beec8d4a40ead9ce32dcdb2a40e104d034bbb28bb37a7e07049f5b5ca1
-
Filesize
9KB
MD5961bd9c928529aedf7a3fff3a125ba2e
SHA1645f4de41b2047eea7c34fbd303c424e1e32d468
SHA2563558b7953301f4385e7e855efef9bee94777cfa6c10afc39ca27f7d342d57735
SHA5129bdd966a5490248f7f2936559b6f4591239f85490bdcd34db4daea7094b20ef9bb289464541414f9c47cdc1e30537a238d0970f50a47562bb36cc9bfc975efc0
-
Filesize
9KB
MD5a5c315bf4da3c79ed49bda34456f0b7d
SHA1c7448d8346146573272e9e6c331014e26e257f04
SHA25638e5fd984e33dd2d9b7b93f218b9a6ae02c0af46833df707774d89339f507a44
SHA51282f842c816a2b365f0b93d7fac2cd427d0e690224e08edbb40b9f968b03b716e35111e64d89447d391bf21d61a63ffdec3c7ac4c769cd00bcd8d01a6414ce4c7
-
Filesize
7KB
MD52528c3a0a2a4f63360bb7a76d85f3216
SHA1ca09320738d89e1c4aff28b6fbe3fd67f57e5b48
SHA256b3469769314ace16a3a0f6e2ca52372021b57f10a2bceab692bc7bd6ea32dd6c
SHA5124995ee3e311a792e2c3963489916579aba7a421e0268ba7131e934e9045b7ae3d137ee16b2c21a4d33463e181564bc256a13893cccab7d50935c2ae3005229bc
-
Filesize
8KB
MD51ed4a33b855c8561277fc43020eadf18
SHA1e643241fbc5f558d6a9d14492e2251be5dcaa53a
SHA2562b5c4237ed9018d43ac38e867147342c0a2ccab139999b7b0772be8634be61e0
SHA5127f5430c3b48be0034e8b222b749c1a02f866172257b9ef05a6433dd2a548ee4d075650009b5c0f2bc40a5aaa3dd2f0ed715213e8780ac48bb5b6f3e6107d1b6d
-
Filesize
9KB
MD5f60dbf8e8dc5b668d7a24b027a3db6b3
SHA1bc6d2cf9a82dc0c4fc6c5d2feb251bbbdb6a2f72
SHA256542073a2df91cd015bb0b3495929b0ca4a7bc64339ebe3e33a4f78c31d6dd61a
SHA51215f8cc4f4713e6c571f181af7f88e892236d475bcd86016cd504fca42a4726cd938d02e25334dea2c0716cd21f78130add38b21edd9f1a73c87a6d16940ae691
-
Filesize
7KB
MD544efeee4e0dd6996103e1956d45b8ca4
SHA1de3f291b7ab841b00834f266a5a23daebf246490
SHA256e62795f6f851da314800080ed38196bf9819aba8f200ac87d560d3f6eca8f235
SHA5120d3ae71f87fbb9357d15af14213d1d8bd4731422289bcd41a2efc2ada1ee9290d22fe5cc6431ada427c14cdefcc59847e5aa3c3814d1ac91351af667ca2f0251
-
Filesize
5KB
MD54915e5bd9841e5a4c4e913b400277805
SHA178a72b50f14ae93611ff86d2f258e0d9fb10256f
SHA256dfab08f7d97d0b938ac2733937b35cada35e99e64036a369e42ba3afc4282587
SHA5121cbaa6e1867eb4d101df9f44da188fff7d1aa4333eba53c2d7766e3370a64fb49214feddda0ecdadef2e24c59850126acd893555e17ab61cabc81810eb557686
-
Filesize
5KB
MD5386df2d4e4bff252d9a87854015390fa
SHA1a135d48330f8ff5acceb75865b817d44ff8ea45b
SHA25623c5da3898d875e98ad9d58194d283989c35422dd9db3c2a8ba4e60d06ffbd07
SHA512d194b5e8def86a5861f38486e52cf53ed2ecd4a6308d8cef0d8bb06e87a333ebe4ee3365900c575e216bba063ece41fd8b4b119a0139147afcf287aba4ddd0eb
-
Filesize
5KB
MD537ec7239e23ac007f644814e47d5a09b
SHA1c11225a5defaaf7bc80dd915f4ca944e0df97e6e
SHA2562ae4f93bfaccadb44d68323945b2a0eff4ef66e14f3fdfe15f2d8cde92e21c9d
SHA5120127da67919072291b67fc27a8eb74c6bbecba64e7912faf1bdc0a17de082c451e72df860ba4dc5a81b4e37146281b983101864723745b60a5e9e98eaeec2583
-
Filesize
5KB
MD56b07196788ac1b241a0a2ef2fbb528bb
SHA1e887c680d7a3d02ef49e87631a075be69174f91b
SHA2563f1a10d1af5ee7f0e9402ec1463df542cb5a8d86fe244706cbd12553502c5dba
SHA512f534cc57b04c1e2abe1c2347aaade65203f6def84bdbaa3f687ac6333a3a50c1322cb3122927d9ddcb8fe4860b5dfd97c5519ae5dd8d3456f68649197c3d537f
-
Filesize
5KB
MD5a4a6da91a6d92da5929f2872dcfab2c5
SHA17a6c81a9333bcbaca11cc41a30ca474ba5ed5b82
SHA256233f8d5d0f48fc8f9ec40403506c7129ae251c026952c33f895aa08d2e5e2b14
SHA512f122b501d5c7d1fbea02c116a05ed76b6e29c8eacaa44a3bd26f523d8f3de2ea011e91f66f194b49327b763aae546cce33c8f9e76f50f8273f914b69caff12be
-
Filesize
5KB
MD5bafb7f56851decd5aa8ff76a56b2e116
SHA1f34d8acfb67315a1c882646c89a0ffa8ad35a0c2
SHA2568c2d444b262eeb477e69b4ea5112aa4f99ca7fcc0acbc4c79dc6df498160239c
SHA5120673a49005f8e3b9ac11d731cb56ae9cd7898560f32d4de518dbea890c551ef2021e64ca99a1a1509557d78c62baa700edbf1e43105dd135e42105755c6ea41c
-
Filesize
5KB
MD5f110c98b992a273d2384421e7896ddef
SHA177299e97ab4d449eb5522f851ad8d3a93bc80f15
SHA2563e2ec27f5be66ecbc7b69456255ba8c484bced16c01d21d6aad4e52ce98fd446
SHA512d283761c2b8de8727f73fd182fcd11a8a16b99932a78539295ae669c8da32e99c6f245f519b118d2a6ffec380360c188f661e012e3af9fd266ba69238a2090e3
-
Filesize
5KB
MD590f0a175196b24aead86f4661c54336a
SHA156022335d7e8291bfaf9a95b873bae41e99454b3
SHA2567efd4d60cac88743779c270696b645c04d6a6169f3f37afd8e3e4f5a06565ca2
SHA512395fc81edac82b233e5b92b6885ecaad11fc9fc076cf95a3c0f6124fe9613690980dc5e49e5b02571b2b8c73fff9dd6323368a1065a73c9015596ebf2b203d5b
-
Filesize
5KB
MD5ecdb739e8df6383bd3d15715e1e97138
SHA1347daafdca088328675a568f9cd8ed568e8d11c8
SHA2561d509bcc825d6c62bdfe385d100b3f579e5981c52e44f97b45e3dd3d7dea6513
SHA512ea4db05f0d58cdb8f595c97800da8ad7665da5d022ae2f7c299580f0c8a589d79b1c27c485183edf2e54f1d8592f45743dec10a618f1c1b46ac9b7b60ee61c00
-
Filesize
5KB
MD504848c942cc47eded6ac737a05a1536d
SHA17255e9cd12e65a4c68525f87e071b8413df1aca2
SHA25678f3275d2c9ef29ceea6fb78ec912e982a54992a6888588e8edae4c1877ca6f0
SHA5127ea932cb4e22039d69dd2f4413483dd5bd0fe2f59995eaafe68d8d5cb6da50ba412ea8a6b6e5892ea1f589dfc5e096bddcc858a99cdde34479f5add8e36a5752
-
Filesize
5KB
MD51647ac392c5828816cdbd635aab95681
SHA111c369b1471b12b215ce02fd02f2ef6ddb43ba9c
SHA25609fe934327cfe6faa57c1f41a7e361177f0bd35e5bfc1a8cc44bb15ecd902d6c
SHA512b137a6181a58bc24b200ed4766ee4af7238c0e09cce95d03762b1f12c591466c7d5d71419ff971741b39521186395e2c04c25acda2e48f95761f567ae2de7ecd
-
Filesize
5KB
MD59a37c19ca02825d9041ad0ca1bda18f4
SHA15261214f3a21a498d7ddfa0d7373b3c08c33b331
SHA256f962ea20c7606cdc323c7c95aeadbc3c831eecd4d3840528a23df9a8293498ca
SHA5126e5f09eb0c73be52511bde3d5deba665d84b4752c4292aeb3d0a000fbff6539745e7c7661cdc27cde387557633decdcf3839088f9cbf726dde13b03f9dd5e829
-
Filesize
5KB
MD59de350828d2775bdea53a0c9f91990ca
SHA1572a0757432a9f5fd123dc049665faefd666dd65
SHA2566b72e3dbfee1b9e3666a5ef53ca54432a6c3f1a94b9a4b49990381fec43c5165
SHA51259b90b0e371d09f56e3225ca458d8bd33f950e849895a2c35c151c489e698f7eb739edbc77525a8ddd0f889c6d434d9cdc204f42c84654dd8111fa05cd7090e8
-
Filesize
5KB
MD5c70819ce1ca766f02bc38306ce9ae5ff
SHA15d716980e52f0a7563a615a9fa3b5c1bf27cbab0
SHA2566cd157f1ff407edd3ce6a56d5e8be3c4c20a4ed60e68ba887c5222d3172e38eb
SHA5125a80c4e4b3a394140e8671f492027b20a97687a2ce43fb546b5ef8f7b670613d24e2cff3f1e3d681a09c73be38e9dc2941e4e2df4c07db09d5b7443f8f0cb0a0
-
Filesize
5KB
MD5d4e75c43b0d7da2dc38f9766dde23a84
SHA1dc0ecc9d2d74b3b93e0ae20b40ac4ddc97d68246
SHA2567077badb8663ae56fe99d922c9e1cc32ff3e11c98e37d929881372824e5cbdf0
SHA512738004b5ce3b997893dc86b626394906ec27f121f39cf7bcd51bd57293702b266f3f96c19a04d0b18b21cb91d508fb1f37b1f8bf20484a327618e4248d711286
-
Filesize
5KB
MD54f7cac74c27bef12f74ef2221a3845b2
SHA13132f507d0c88670a5356d6ba3dcfb7d3e5abd75
SHA2568e927d37a8926d88d94c05e4ce234e71cbfb6587b28c64fd2cdcd78049e899b9
SHA512c2f120f832eff8d186a2133a3b342264a9970d7522593bcc539a2621c20772a71060a64f7184590bbfece377898d65b7ddbf994d34f08fb30c40dc1a4a5359f2
-
Filesize
5KB
MD5257825af6cfa4e2deb16229257607591
SHA19a3b043231266ccf65d6f37e61645f40dcadd1a0
SHA25612c07162ca1bd14988cded2305d81d0852541c48fbc7510153c050a73226c6be
SHA5125067b5835d5c98677ba54376703cc1aa740e1e23810101273692d22da850ddb494d6d39f973f217b0a80a71e154bcb496a99e8399ce97c6924cdf533daec1eed
-
Filesize
5KB
MD57e79cd77dfd8a7b2c17ae338465fb94c
SHA1ec8f0748b5dd9fa2d59a5a40a212d472bb43345f
SHA25696a2312afedc742a2b5a54f613024ea5c4b13333dccb9e3ce9a27eb143b0051c
SHA51299a459f1eb41ba4a9f7cd16fe229e1ed6507980b1f557437922234668a7e6f007a9a2d7b7be8df278c17e3c508ae587c6fc18fb51152dc430412d5cf04656f65
-
Filesize
5KB
MD5f59c480437e04acbcb532876e4747114
SHA1b8bdf94a750a58671e37bea3fe8a87b3a102a724
SHA256cd251db77121e0e62943aa4ea52cc19ace5e036e916f91c267ecf33fbec9de34
SHA512c9e0cbee59163824943875437296544183b2c22f76e5d5c74a2eecf023790560b2f6b6e169f4e438cfffecf178620a4ca1f4cc7fdce733ce3186410186e5af51
-
Filesize
5KB
MD5cb99a4adb8f34e9b66ef2612e31aa15d
SHA18bfe12b4327d1041df26a75126c0578f7d3998aa
SHA256e01392d1abed486855cdf390b9ca702dfb8fbec1c00ca2e0b5fbe22a6607279d
SHA512a920fc421d193229fcf9de45103267915deb2974384bfca3c055eec48adbb0355face05923581cfcaff9b1b0fa82212fb89348e77566ad6452d8cf382e52a320
-
Filesize
5KB
MD501fec6ec1a9f0d43009dfe1dfdc0f549
SHA1edf7f6b6971a35a4566eea6504eb71a2e50bf3ec
SHA256df3853065577bfcfa263df3b5db873cc2aeb979994d190c98d687e9be7147e71
SHA5122b9d47179887ff527d95d6d4b8bbdb7b60014d1d4869df7cade933172ece9ea607a388e437f7bb34647dea841cd0ba97848739d9260b1c682b71237dc550cfe1
-
Filesize
5KB
MD51b23cfb3709b5fa73e35a098e5f43193
SHA11bffd746c1da6470fab6a6e9d539dcdb25b738e1
SHA2560899418634c163d4ffd82f7deead21a08e5a2a6bb6d55748647fc99e5f3bcb7d
SHA51223bcd2425db1a8f923c662a97b457e6b39b6e77429fe9f6151ccc1fbe93c9dad822a3d0642256155160926cfcf0fe84392e77983df08273d1035c3e8df8085a9
-
Filesize
5KB
MD5e51de2d0c214c087c98223f986305c41
SHA1a1c35b4a06ab1c78362e63a0aa98703401bd31c8
SHA256bf2524f340fa9f06841bd80290473a240aafa5df2d1c169ebb3724d1def19d09
SHA512189e88c87871df477a7c28ce3b8ec8d6296d58ea7b8ace7e02ebfd69e0e307a4e5d73a4eb6b7cc870d42c38690914cfa41c187ec5097fc5eda76b042f2d80816
-
Filesize
5KB
MD58f957dd5c81fb50d91649f8bc07e0431
SHA16657a12aa8a2b4a92601e70e5e927f0bd3120e3b
SHA2566ff3f6c65cfcf27a43b228ecd4b05dc15a47a6872a31fe42eaddc0b9c92ac5fb
SHA512069bce33f9644af0734bcaca56a10ebde501c2761728d6ec2c28e059926f5282b77b36e0b7e757ba435ce4183350f6208c0a0d6243dce4a959a4cb42ac93fcfc
-
Filesize
5KB
MD53212138ff3c05f86b5421110860b19ff
SHA121f2265808dceac761026d2842ece5a5d1d66315
SHA256465328267e3d7b044a471b03bcc7993fbc9f8865e139a23ae2a66a1e8ba7773b
SHA5129fa304661f93c9f1334dd7b970b9ab779ae7c121bf50c3de9e836b96f02a0dc84378f9d41ea14f75b0b55a93eb5b97d8269e2182519e36f09537bb3496edf354
-
Filesize
5KB
MD5d3a37e009548f920d41b4841a5c07beb
SHA1a56cc0b2d648d1b0bf878681ba3af5d1bc7efd5a
SHA256a1171c4892a9ecfa590aaaa9cf022390a47aa01779da2874371b09f1a5351598
SHA5122bc1033f46b16dc40e871a1d5eab3894fbf08269ea70c7e809ce83f8586ef39cde60c974a6a92e57ff2a7ae6fd3bdf4da6676769402223a2438d8a7db09d6fe3
-
Filesize
5KB
MD511f0c8122a4b465d719a4689b9ef9dcf
SHA1485e654c9ca35d675092cb1620a023a3ac79a5cc
SHA25682367ddd9efc6f4e8d98fa47b86d09241793f2381c76607a6b5b70506d34fd40
SHA5127ba1ba9db6efb846ed261e848390188a05dc2f8b321c2a34969b46e9b8e8bc5c3803c55e4264790e565bccbeabe8e9f5d76d20152e11b7bcf5d5f01742d8a443
-
Filesize
5KB
MD5f6ad6a831d033c204c3a86ad03892d6f
SHA199a60b89179adec96029af74515574e529cca5ba
SHA25641c5e49af33354813dbd18b4175e4d764ab394cc9b095316d7a49471dc43451d
SHA5122d84ebc20910a680fb91ff8736220984ce33421d918e37e5280604ec0acdacb6a3cc586567ea08358b8fa45f92cb11994bcc3e80693eefad00974494a8fe2db0
-
Filesize
5KB
MD56c58e5f4cb01b2b2a97109f695376459
SHA1826292d3f9e8ea7f52a4b93f7fed3c9abd7dc066
SHA256b350c4f2a7dc758e68ccb4df2c18717d641fcd22f519374c8dd82bf12ef2f8fc
SHA512777dd4e004d873afaae3c8f95dd658d17a2f346f2827f24f9f0a64d0d71a186e16cf4b2298d0a54098ca897cd4fd5fb0819280396cfa8431034ad772ed9e24d4
-
Filesize
5KB
MD54cfb0f080cbcb3134050c7fc664dc5a4
SHA110ac9d6f9173f2ae73a8265a78bb34a65c92148c
SHA256c06c6561ec9f6d6dab96ba42a43d0876effc0d580cd5964f8ff249034074e23f
SHA512628fd9ead9d308c1aeb73452ac17f273b4f20a037638bd26eb65e1da0f8ec8f7564511e909bd51411fb739fb36e88d58438f3fb4a346a5cb5f2b0abf0811bcc9
-
Filesize
5KB
MD58ad7fead65e96c14417beb0bc54ca125
SHA161a75990db6436decdbd447c4f8b56c3a91f4dcc
SHA256841068e9ed99e1396198a0522936f391cf63740cafd02f09e5bdc98b8164115d
SHA512da637e7f8fb7474ba4201488585894576c9cc465dd60eb0f1d7e802c7a8f2e01830eaee60023f501898666e4b53c439957ff82e719fc7b0e5c5c872ad6c5fc0c
-
Filesize
5KB
MD5a8f0613df6a3ec1cc66fdb34c3cb64e5
SHA152da34d7580a816f0a94644ec0055fd237a6cfa0
SHA256b1fc99f3ad350c87017fb63bfa715e424e2e6e57efafe528ec197b4f2ae9ea37
SHA512d44927cca992af9ce4e52e23e1789d08f418bfbfb6f2d4d3d5ba546026d41e032249ae3ed20932d1a227e1dfebbf33c5bb6547bc5f40c1122b9f6ce1790608af
-
Filesize
5KB
MD57f6e8c22fd68bb517d4b9fe6a5d8d997
SHA1f3444e9355f2e46c20a6802e91209e4696fc61b3
SHA256497c0ff62e91507929c94d06d02f18c6e5a407475dbd4c22e50f994c8b107734
SHA512394283e52015e4a935a7d8e54b02cd822c3fa498ca802255202f376346aec143cf0999480750517559f977133c4eca321be3c24296dabf0354b0c91ef76b240e
-
Filesize
5KB
MD5c2115bbd500a9cf603545c0e2fb04777
SHA1e89a8296bde64886934eee8b1ca84c1066af4be7
SHA2566db9ad06b509b970997c6b518b67ce25dcfb7df8e7108355f82394e445ec4cf7
SHA5125f609e839ba3e7bbf830e5af8cd3849e274824133e6f90803b74835c1e7b25d8cb9807899295d0fd2126fe17f31f5233452cbf5f66c66c9c48db0feb8d356d63
-
Filesize
5KB
MD5f8f03fa9b1ec55d9c49867e67b522389
SHA1a4ff9ac47cf921c4aa55dc2894a616e2d9cd7b6f
SHA2569f2f43f4e509202a74dee02188acf2cc1796969d1e87c7da1d1fce3bb7cd766b
SHA512be0a6543b48bcb70b9b6a37d6a4d449cb1b531b9d4ed68d52a07f74bd0b735047fa8090c024263670053eb6940fdb30609d9a2632902224a3c64bb7a0218ba65
-
Filesize
5KB
MD5abc51065f1d85b9c9dcd3795998aad85
SHA1a76b26dc8204c80e36998fa2c72d806a0d06df45
SHA256805148541d1718a334d9b242779a88c99c494a3458730bc43e107ffa371a070f
SHA512c3b77d0a2e2704fef85b17380c7127cfdba1831ff9de8b010e4f0e26588bc40b3f697978e02ded08b1c07d1d00bcf5c87b22bf5405e43306a045d80f510725ed
-
Filesize
5KB
MD51dfaaf8259ad070b3d275c81d9511794
SHA1c07276001534db5a6a3e2a8736a8a8a9a0728822
SHA2562d2ee699c2b6c29b57f01a62f9f57b7b6ed03d66816699701fac5b300c25c938
SHA512e88aa89d33c5f7dddea35ecd5d6e210ff83aa1361816cbf127f9f91f165d33ec903a792713ef403bcb367c157596f0bdfb44d5195edbbe92e75b056f588a70d8
-
Filesize
5KB
MD59720ac38d6cdc03b821750cb7d1c3fd0
SHA1aa830c262773608e30c8c752ed88b7768e63623b
SHA256211858bba00ccc45b3c73b60e41346375220ee53ef888f07e13770ce2886c235
SHA512f8b83625f9170bf48ce6ff54282de4b3ece5c1755a53afea116171023857fa8b08beb0f133e4198cce8ebddefb01faf2900e2fb6c38633dfddb2f300378512fb
-
Filesize
5KB
MD504f72783c15bf4d110cf42033962c26b
SHA1219d9c6b5887510599d421dc91c57dbc6cdc7d70
SHA256886387fe53a74c3b7f8d871276156ada3834f5a1c9b2a67ad78c7ddd4fbd1eaf
SHA5121ec84e10ce1a55b40762347968c8b1f6d29ae79498d3616c14b661873d8e8c64337737033b9834a41936ce759eb82a8ca501d60f1f6ff586c904d828fa8dd5a8
-
Filesize
5KB
MD58b52f2d0756e74aca0d6ef12524af163
SHA102a44e88d8a26af02ba581c0806f34d75a82fa29
SHA256035e165f6aa4aaaa4f00c8f97ed0c848c79023d1f57b2bfa8c311fd634df6e3f
SHA51214652f87a6af210142cd969e7984390a69456962655479d1bb02aed082e5d0c628987f202c9578d1548e8458fabad27eb606ef1aa9885889c5dc1e2596813eb0
-
Filesize
5KB
MD5df4e1629d14a89666bbd5da376f411f4
SHA1a91151a2e62e22f2f6c54891f8ec91dcb1b5c72c
SHA256519bf3174df49d0e85b0fcc941f483bd00f59699bf6e586425f47dd4e1ec8355
SHA512ee3b9c69f0962cce1d99891fbc51628368babfecc33df0386efda431ce60a85ed4f1c3e330b413b230d305cc55670637a95b72176c55b46a7fd1ed603b049e19
-
Filesize
5KB
MD5e538721a4cd7d08f11e6d044f6da0c00
SHA119636a38daa21f9d72053ea7020d479d95753266
SHA2560db1f741d99358950a13cfe45648e25007e21e02fd9aa7d37ba87bba8f62842b
SHA512f0acb82558189bb3f6697b6d74183d6f8bac5b6a9a16b9d550dc91d2ab8981284397526846647d740c4a81d676d4adac03971c4debc69cce1a1776943a3e15b9
-
Filesize
5KB
MD537db12aeb27b0ccf119356b16dc751fa
SHA1a8bdcd77433e34cfdba461458c397a89734baa6e
SHA256507ef41d3697337a89d154574575c0cd40faff286cc39fce8544fbc61d85fa10
SHA512444ad325b42727a75a371b9bf5501d3ec0f783ef597f47f9b20c94c024a2860b5c92ffae891583475d58259d31a79326458c470da00f12df5f7dd63aa0046720
-
Filesize
5KB
MD5c2685573ef2d5d3113754efbc21fc699
SHA14604b534d87f90279d464a62e330b71f39251c64
SHA256887d89e25a3e8d844e531320f1e1fce2cc61bc31b9ec0ead42ab42303a007412
SHA512644c85720bd096c25f2582069700f4a1a569a192e7d8f1d40e8e3acf4ce3dbf67d45f95e6ed08bfe15b1962a5af2746b184a8a61d5d0191bfda7cf13899956e2
-
Filesize
5KB
MD5768a7e52a6765458f9df6ba98122132b
SHA1da98c7493f36b3617392c70467ce5c006f627b04
SHA25664314814cbd2b27b553cb0005bc0d8510de3ef3532212a3acd2096586cd98616
SHA512ea0153b32959f9c95e0537e3ce84729cdad61e951b4ff61af0fdf8a5cc070ba14ebb0224c16ec3b466db336639b7d9180f961c6bb1a2ccf3f7222d1a947389e3
-
Filesize
5KB
MD515b184cd13e1f3917e42340ac31f4c20
SHA168363d61ad84c84e11aaa7b38a8092a1b8dab5d7
SHA2565f91670b8e3958a82450315f627be0e4c7d8a6bd2a266c938f357c0532844439
SHA5128bc207eb9f330da219f25857f3a20c95b8ca86ffca73684a4c2f5b899ff03a2b1d7923abf579a96e75103528d78baa73f7f6507959a0edd61a9d2eec92ba3e04
-
Filesize
5KB
MD5f55f595c2d2eed0b7a29eb238fa0206e
SHA1d444219b248b785cb8ca2cc3cd2db5a027379380
SHA25678af499072127bada53316729ea953c7ebd2c0f8237ffb92a6fa3d579a225907
SHA512cf2274476104d937a1bc11f1942380986bd3b065927f3cf46647387d1b0413e441a282eff7a2668688926fedfea1daa3598a00785f2edafdcaf0c9756f96838b
-
Filesize
5KB
MD5f2023db302538bc2bf6f6d29f59fe14e
SHA1ae99df3121187efff45f348a166db913852056ca
SHA256c7aa20c0303ac463215d439b7c3359c61612e6ab66541a87e65ffe9cfa231e11
SHA512bfe3619dc4974beefc5e0e5e14860cb52625c98a44f6c6b4bd30b8de5a6fcbbbfdfc506b0d664fb5ccea2d177563466ebf7bc02d8995fdc601641474aa2e7a54
-
Filesize
5KB
MD53ca2cdfab216e4219de382588aba68df
SHA1e6c7e78add937f9dffd991d232a23a254fc9655c
SHA256e976a1f0aa9910d90d2ce442b499bb8b20da159887d2beb340766d3aec8a7912
SHA512a3c986b59e6ee50915eca52b837bedfbf25f2b48976ce66713f03bc5e6a1e78ea9d2ff5c54918d49e4970dba106b5cc01dadff75bf0b11557a95269a1cc37eb1
-
Filesize
5KB
MD51bd373da72435372a6a98e29a279186e
SHA170a860306bb50ce141e4450b733c4b14bdc9f7e9
SHA256fb5fd4cad97b72d923bafc9bed60ec7d169eb6e1d83c183b67570f00df564d8e
SHA512fa5d5bda5ba7e29604aa297210934a65f106bed3b2aadc8e979a42795963720b9d34edfe17e7ade64665ee78ab6b13b81799f0645f395015c1b430621668a1dc
-
Filesize
5KB
MD526ffbe46c3b7ea93ccbfa458cec92bfa
SHA16d7f86c26c3177549f555c9b7faec8a8977d9157
SHA25618ce8eeb9c4d1bdbd7431765a3bc81d3b38519a4d513f592b8e806088c9c9708
SHA512d5615bac39856adebeb6a5a200d0cc59d7ed2ff76fc20fe6cc5067ea934bf491a481023d242ddddee3972bb6edef5492e71041249a45711e16e0252ca154a8ba
-
Filesize
5KB
MD56c3e7c380ce849dc30f68263e6948361
SHA197cc4c804e659c780110325d078b29ee4f56f78c
SHA256f953324a08a509c5e726bec36513c27bb4f4c85475f955b2f774df438a853fb5
SHA5122b45e88acc27d769118c76c610dbcaa11bb64fa22a2c0ab268dda4047d08f4371d31e02851ef143ee48931984e8c0867036ab7bf7fdb33b6d8bcb7fa80312b9d
-
Filesize
5KB
MD50e89cf4195d1a442c44678ab29dab642
SHA11a7e8b09d4b3112cbc28f1dc840466899873a606
SHA25642f4569c98c0f69b0407c3f9b3162ae26f0c2194e51245c56b1b2ccaafdd3ecb
SHA5126eb1f3b764bd28c41ac2c8def4bc8dc8e9d19efedd9608365c4f8fa0c97d77b9dd68cb2ae1a5f19ec4c5f88d5524e8beab8556e025fb5e283ab916a0018cdde7
-
Filesize
5KB
MD52eda5d1199e39241e272c356fcddfd90
SHA110c06c078025bc3acf28c996c8b8b2f4c086f942
SHA256648479f9c1ddbc1a866b1aeed91847e52afe15801c1a311a7af8c3aaf3199308
SHA512258324ca5b8576564f9250bbc688b4923f7168bec357e25e89814dfa3e2359128b21b5a1ca0bdb262d04428d80b7a1b27f2988d883351d1acb7e5799649efb9e
-
Filesize
5KB
MD58f8cdbe887492fb3edcd43721ee2f3dd
SHA14bf09f6716f8797e8c3b1caaa2ef85a0777e1e91
SHA2566510d4a744c8d8acdda2df8bed45174544ef52e83fd832cedbb0125818838bf7
SHA512e242d8305f9d3bec4890638b88ee5f626e451fafd2ab83279fcb4d5bd5ee97b3173095953255a177d44d8bd1bb14c542007c5f341ded281a918af8f14df25c07
-
Filesize
5KB
MD5ab38d3b2d0a399ae798f0592564ff9f2
SHA1b84215fc942540377eea432dd29e0fd63b6f0412
SHA256dbbf43cf6f0fc5d9c407d35359d69974225d9d616ac8a86c3aefce63141845c1
SHA512c79757ae9aa54e6c19a4a9bb56e866873ee11666aca50f4bbfe4ae9bc1b6560603a64f7899db10acd0ebb61f479ed7a679166ce3a8c318e1a3fb119491392591
-
Filesize
5KB
MD526ecc540f1a585bb0fcf82a18019e38c
SHA17f472b41edd3ea28ac019de61d3ef5958a2dd887
SHA25627a521bca63315fd1c8cf5941817fc71cacbfbbbe60531b5762f8b4da6b6def8
SHA512158f62b9cdec45ade62d5f608d206c7899ad29c8dc19ae515106d07538e0e589ddd5b23445c822a6354ae36c476c5aca8e47602b62e75c5b751a84e397a8b160
-
Filesize
5KB
MD5234a201634f16d523b24c5958d24193e
SHA1833755488b7455fbf7612d9f1751b02864129ce1
SHA256a126dfffa46ff39044369e9b29edc80cca8d328bc7cbe559795e9811ccf17873
SHA512cb8c242f9141a09cf52c619a83eea730670b00e232b53063e24c37aefbbcfe25a042af256b09b51df803db33635623e3b57a76dd8b8be674434f3750b135f4e6
-
Filesize
5KB
MD558a2a0a83a828ddfab239b346c561ebb
SHA15f44f88ae87ac88ad1171feb72f6bc2fc1d38885
SHA25664a5bc071469be6fd3ad5797648370af7ddd1d0e6edebd133b10933b21e5765e
SHA5121bc6a0a1760dfe0bbcaa5efcb7449dce4a4ce1e83cb233d6d9c61f00f1a52e8e377ea92169242e5c57dcf7d173f6175d4f80dc2de1309705408b6d13e243e835
-
Filesize
5KB
MD5665c5a1d16c4ebedafd44de701e72948
SHA1c14895bbca685589fbcd0322d5970390dc64ac73
SHA256e6700913e5a291e6b1500ac0510bd472e06d8a022e7831a8a811fed68f48a5cc
SHA51224b75ab9dbb43be27867530bd5a48ef87b3ca75512eb77a0c6b83de08e4af980dc53b77c8fa529e43817d22071369e2debdbfcbfef5a94ed51ef0fa278322de8
-
Filesize
4KB
MD59d14cdb3854cc27852413ca28e31a099
SHA10eef78ed90c5d1ac6cf3a40f069cb8bb440be296
SHA25695b6b5d3b65a3a930ac09c8e5dc511ac7d0b3bcfb75bc2ed92498f71de16623c
SHA51220e6bdc8440f490f288f19bb5ae1d831acc41d1afeb40881018cbfee8433019b9f994fd16f6f1a54cff3b83f91c44c359a90761e43d3b4c9127428979368aee2
-
Filesize
4KB
MD582b14cffc0e275b08df234040af41427
SHA1f338d8e63b75edd22fd5b670f037702ee590282a
SHA256a4794c4ccd3025dc8bc7f4c43fcaf631938ef8178c997af2352544d636f750bc
SHA5123498e6d27ebfed13447d06c9d89ef387f93533796a5dc05b3a69e42f002bf0b09b85ef8ff8fe8a14df0b3aff9dd1fffc3fdfa53ccb58c92060d7d1d7ceeb5d9c
-
Filesize
4KB
MD55a254333d9a8fb756a0208f4a0832b23
SHA1dfe57dcfbb1c93e2a2d7ef25c1b83ed330a00313
SHA25685f738a2cc273ee2bd5be97be25ca434b88b078346ff382a8c4d6f2edf26134d
SHA512a6add28da0cda0f1904a82334b969e87c8888a0287d409d846ba086af79a58c46bde935ecef5096858746c037ed219ae9a4fe447bde2b21b56fe0d2d6837ec0b
-
Filesize
5KB
MD5526e685583c751e1cad3f1c0ccf0bfd2
SHA125b19ee5e55e7e9c53a146c2bf045ca2215f771f
SHA25623a5b73c216df209aa58a2457a3351964adddfbf6d97aa463db68ce5c5c42f60
SHA512d40168beec81c2591db6e9c2419198a0d809455bf074ae141978e773493f25646dbceaf3e81dc56b3ca77101445c583ab41065ad660c075bf02c341c18ca3ec2
-
Filesize
5KB
MD5bf6453b7a5e4db5b0ef19b5aba983140
SHA1841c3b5dfda36423e1bc16059e4bc03f37c4ffed
SHA256f4c999a40a10edbba7842720df25a408e13eed951be6eac2d3eb2ca91374f2a2
SHA512ae0e10d38ad77c10215ee6d63c0a1a0b97614a50b809c3162441fb2729b3eac55551ee4ad14c9c213150d81960276fe3b87664efdca27bd1b3fdc1580b2912a9
-
Filesize
2KB
MD5ce184fa7e7a9625b6f84ad5bbb00877f
SHA1fbef458b7cf9e0bfd41145b798824d9936f4af8a
SHA256856db4f3cd782716740d30fcd95bd2a8c0559ae3cf6b1ee47c1da8e2a95c55ad
SHA512a3447e9e85dc9e7624a098a1e2fc426711ac9393fd95597809600fc8c8b70dbfaebb53ebaf796c999344ba3390238ff21c2ebf450533073e8a3902014d519a7f
-
Filesize
2KB
MD578824f84fa999c12434ae1c58bf437fe
SHA1d018ce11c75fee9541d3e829be99b768980547f5
SHA256b975509e2c9a8c49e8ead5d3bf23ba423667e76675f8e224f232e5e6141a2e2d
SHA512ceb111972dc3658d970a7d556afb6a64e923aa7c08f57356c57c76090064afcb0804605479d8eec679c7febe88fc615700a935ba7deb56e209c4e2f3d7d03546
-
Filesize
2KB
MD5cac157a60e6e5466ee211dd4c4522c82
SHA1a328fcaccd0659f93d65b8ae6c389fd5163daffb
SHA25671a3633d439daeb97e3c86230a1ef222651151a8b0075639f4d46702efad0af0
SHA5122da1bc7e964d9a7080f26dc019a4ceca8819af48a0bbc8139566a4b10a45614be55b5e78b5f6ea1cab9454693c932cec3d5faed4e5692375210aa2aabb6ce7e4
-
Filesize
4KB
MD5b4ae287db3e220f5bb8f720469aca6c2
SHA12f00ad3338f8d6240885a911ba2f2d2e4701f457
SHA2561e76da18a7f93eb67634f3c90ea4928a6e73c3c102dd41c1af1240312ce8ba6b
SHA5123ea2069cd8c7b5cbbf325f638759412201cd9173058d2d7c486116fcf931868323bd85bd0c4ad8cb53fb5f56fbb6282644ed067b49f05c69290a9c198c084e5a
-
Filesize
5KB
MD5c94638dade0f26a918c49cd71810aa97
SHA1f353871abf8db100b19fc190d5ceb63d21d01184
SHA2566ff08f00619a4db089e64c08cb267ddf07e55ea29b1c47e54a2cb45b06e78bf1
SHA5124da0e23f6c742efbc574ea742a02248f18d12f32275021f394555ad897e65cd02566deb0ef34cce16a118828c74ac5aceebf19b380a85e9b59077226a32a955a
-
Filesize
5KB
MD511ec50b457453e69ae7dc389f0362b87
SHA1fe10b1c7e2454d8f1d4878b89a59e8c3c10b9341
SHA25634d6b9246587af3673219341ed42ab92028eb5d9ab30e8a429b09e65397012e6
SHA5120e8c2d2be8d57a83bf94820ea037f102f681586c54707bc0a5b24aa62e74110ce2c1ce142520036145914c0ca963a776e1cfd24e4d498a49fcff498208f4e9a5
-
Filesize
704B
MD59bcb7bb77cb78dc6e28621c1cc065130
SHA1c5271dd53198ca9a0b926f5f857c2f335c9368dc
SHA256cb8e8e811dac37e6783a177571720e5d3cacb38916dd8ce4a6ff3948a4e5ae10
SHA5122d377c2537a36dbd6755675264f645fb6d6064f7501cf97f1ae9f10414998a7954c59a1136c800cfa09f3a6d1b841623ba26fed55face5bc990b086a7a7ccf12
-
Filesize
1KB
MD50a482792eb86d3afc203da8b2094b6a9
SHA18fadb00eaa5199208fa778f551c8734d8273ed25
SHA256afa00373d5672bf94522dddd8755f03700f6e370d6db49ab03bb5390d9e8b9ff
SHA5125fc84317b44f5b589597f63d661d7eac898286c4f6186fbb3d12f1ba42bf50d8b84c1bf3eee65048bd906dd0d7b09bf5472d2ba7c74157a89d98c317319d2b7d
-
Filesize
5KB
MD52b387712c1cc86c363484078500114e2
SHA154b04bb699fe74387f2cecd4f06185111480ff23
SHA256f4f78936abcaa8f6bedb8ba31c7d753532d71758b67a52853f5a7b8ff26c633c
SHA512c908e06ac1bf1ae9757e86549b756d4ec59146e1b816f6c4dae00ac5a1138420c215630309ae94045dd388def64ce68703f8724d83d4c32c4dbd5e13542cdb9b
-
Filesize
5KB
MD5d576788bc0413923eafb475827389e9f
SHA145fda298a6c8ac7fd21b3fbd1f7f1a24c165d1bb
SHA2560d6f1a6d6f8ef5254a29d4a28b5533ee87163cc3adf312a5b04f5936814936b1
SHA512bfed526fb8f872983ded833f2ba256fad4b7c04eca1673f3200abb5bef3298017fea4dd5579272c65130bb76825811b93b50ec8edd3b25dc3e51e4fb6e08f0cb
-
Filesize
5KB
MD5a8f1fb37ed0ab25ccf85a3e48da6a01a
SHA1892fa0080cda29940f47a46b6d844c415be75cd5
SHA2567a5aaebdf58c0057a3edb0c2a76213f4d94492f6b9e45c600515718c44a72939
SHA51218278bb363fcd379181fcaea3efa904fbf540ca7db72be3c0e5d31f0d6e0cd42ceaae9a1b981778a678a4921d707ec744d0704746b881fc5648fb071d7b8ce51
-
Filesize
704B
MD54954281769a922bd4627d95ef96f1346
SHA1503c7ba3a72a0e96101ff1c8d157a5d860a81c03
SHA2566854a6b7305f6b7f42ff5ad198fe66c76c461864899f0ff98f6a2ec3669fdd86
SHA5127d5367795b1c84521d6b95499f415757acdc47bc45cbf553e1f39c8e21a35938f6a262b0ff8bb7d7b186710d012e3952b48ddafbb0dc00bf1259ee174ae403bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d25e00a8-34de-4205-9db5-449fbfd47e96.tmp
Filesize5KB
MD5b2510de3b67c3fb4efab9727d86d993d
SHA144d569950554a70e46740e8957d281a97d9f7164
SHA25600a8cba5e610ba207e2344111c96c2d234666a5e28fdcd480b03a43d325abbf3
SHA512514496994bd6a3b40141a2f44b7ed88f63b28dfc2d782229e3e1a0e976f0b6d4639d88aeda63315d63749d5e29ec3e784583d8ee9b95d2edfcb83f7b1388a451
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD565f4b60162ad5c6197c9c918341cea7a
SHA130899404cc1977e2ac8706c65593f6e9047f49a0
SHA25620add6be93bb0eda26cf72d04075bb028314d5e595fec46dda45400cdc1f62ca
SHA5124931f3ca21cc7acaf6a042a3601b26c5e64d3ec9616ad7482966c0a4591700d2ff0d986e52f3577aed86f6cec4824de15ad794952d7f32472a23329792061575
-
Filesize
11KB
MD588362fc1a04454410bb6fc334b362bb4
SHA1cb972b8204eebd4ccb444d2907ca5dab216f5bb4
SHA2561f864cb81f215b26e486087f5395f25637686916eeff73fe9b3eca5131bb4343
SHA5125c8a860706240d836bdabab5a6e6c14c178487de2e416cb752174c03f61f57a567fd7ee7bdf23413af2cc470af5800e223b20389cc5f246e9616a18564321476
-
Filesize
11KB
MD58431175ceeb30759e50478fa4a16af4d
SHA1e47a7cd5e37a9cd143e674ab613cc6e9cf2a5a17
SHA2566b8138678986c8cf64e079b2286bd59cb5c6f914cd09dead2b1bc96ca1c4e921
SHA5127e5e3f9667d826b2f3ec54338c639942fcd7b9382ef647c708eb1747b03f00343af0d4bfe819c5a554ff9fe6ad36e4dc896a7afa1d23b8b54d29dcf59d1614ab
-
Filesize
11KB
MD54baeecd60fad270608e0491080debf63
SHA1052b8b7d55bf56fe0242e70ff59be1f348c48015
SHA256ce20892ba4481bd1b6b648bdf7cf709005447507ded011c9d908417c71f73100
SHA512a1213bbe0d4d2e35a8783eeb886e1013c068189369ee96152e680c6c8d61d7970349c32c8bac8a6fc09587039a2c12d3b6838d36ba2d6b78a13cda32e3ec7ba3
-
Filesize
11KB
MD55e32b2eb4ef7b7cf725e44980e71b35f
SHA1125f62d0265e3a8d5d482eedc204da48c5f6a054
SHA2560701ce2cb9818fa43f0f37a39f6b2c609a497c260c509559acd592c822f62373
SHA512806b62ac49af768fd610eb296299912e9541d4e6d8aa0691ca504a76dbfc3776e3e59d8bd3a722ba37294568d2a839aadc5ba534c08cacfaa72382bb7081fe6d
-
Filesize
10KB
MD5f4a96c627f056ca33c83041154164c98
SHA1bd353ebe41fe62e82b7c83f22b8056af0c62818d
SHA25688ceb16f37cf1abb02ca1f1d1a6f73fc24798b7c778d536d0a41cb46bbe56f91
SHA5126f575617fef2c1af7e8bd232ebcf93e7413194324202049ab464b3a1755376bc52456874b9652180508ab43e979b4899f0fa48ec1f1095dc2484d32765a4c4d4
-
Filesize
11KB
MD51094316e53f49c0342ccd16c79db7e43
SHA14ee1e04540c64ceadf84a727e420f394c6089e10
SHA2568779610ff81c876d2257de0aba2844c0f00989b7c49cbb1e0115f7da3d36a04d
SHA512d8a9e1a1fa5c372a989b72257adc7098ee7468b6bc422b087c635522f91bce0ff49a51db803ac5647dd5065c7df439a6917f747b6d91d6ef8538d71f81c82973
-
Filesize
11KB
MD59d08ef49802248dd148d51e5a63cb79c
SHA1d59e6b4ae2e5c67b35ee7f0ac9f4ea790d0bebab
SHA256aeb7a4ec00673ffc75797cff0c2b313a8310b11205ab0072485ab88f430c50a0
SHA512e57b2c391c4ff393110ce818c6f6fc1be3934028e77517fbe2a21c5e9944064fc80bb6d37c04eaaca91a84f1209371bdbb9f074ed072c9e073c097684b8395f3
-
Filesize
11KB
MD5f81fbc6d680ccf6c0e6838b25e3f1800
SHA18fa1ed337fb90cdb42b0bfda214e61aab8016a97
SHA2568f71b6167f8691a58f168746cea24224f83689c73b2d0869f8151bca81e6936d
SHA512a178612107e640729c5086f2e6d05f471488131147750fad6dab1c2aaf230c1e76a0bff2dae0d73849791ea55d53ca4cc93b9183b0f203aaf81d79af46ec638e
-
Filesize
11KB
MD57cac44665ff9af27a805905486b48750
SHA16002cdf4d806f28bd665d0dc5cd43ff059d94ad6
SHA25652ac30069ac8cae7221cfb9f30b42616ed8dd4efdcd498541519c20aa2dddd13
SHA5120b9b979dfb3d872123ae25956c8e8e7ece9863aa17654871050600c6a69ac588e973dbbbe10b5fe578c67f761ccdfa50822d5283db4f255f71084ee59e52f543
-
Filesize
4KB
MD53ef9efb5c3c17e2b685057beac484e0b
SHA192e7ae0ebf2b57d72ea4091f065f29187cdf76fa
SHA25620b0f94844860501e115fccd5c1462b2e2c932041d7989dc51c6d885b3429d8a
SHA5126631ba4269375b502eccbcf601b0daccc98538f36bc0e1e2e5e48a28b4b9f523e06cb46d14b7ac2c60f70ce258b873fc42e31ebfb5237cb43cba7fb6a428eafc
-
Filesize
3.2MB
MD5b5f1c960a78c15e6bc1e1ad2f6dd924d
SHA16aa83952c863d281857996ded4be5411d6d7bfb0
SHA2561617c6a6ffdf7655f74699172568d3ad03b6268387e22ffae8007bd7be06a903
SHA512a6546d4217922f3f272a936f58d5e6ebfc4b02adc702d201c1fca42429f657d9729c01aaf541fde2c61baf499dff53085ea762a571c76db84f1f4e1d4559bdf3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\3b1f17c7-84dd-47fc-830e-359d83a28912.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
6.9MB
MD57f3632afdee7118812dd116069729b41
SHA1ed116033aff765c3eb24c3059aff6c6fb0be0c0c
SHA2566c98e86a6d732761ef8b8b2df2646f55190657e02201ec8ab8b9137345154c5a
SHA51244948874e9d243c234882ab1db269fd729f57ad5fb36a3b22428e0d78a9fe5a05366ed2eb97d0331caa0ef1b622528130344016e13f809b266dc1bdc10ebf9ed
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411110718181\additional_file0.tmp
Filesize1.4MB
MD5e9a2209b61f4be34f25069a6e54affea
SHA16368b0a81608c701b06b97aeff194ce88fd0e3c0
SHA256e950f17f4181009eeafa9f5306e8a9dfd26d88ca63b1838f44ff0efc738e7d1f
SHA51259e46277ca79a43ed8b0a25b24eff013e251a75f90587e013b9c12851e5dd7283b6172f7d48583982f6a32069457778ee440025c1c754bf7bb6ce8ae1d2c3fc5
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411110718181\assistant\assistant_installer.exe
Filesize1.8MB
MD54c8fbed0044da34ad25f781c3d117a66
SHA18dd93340e3d09de993c3bc12db82680a8e69d653
SHA256afe569ce9e4f71c23ba5f6e8fd32be62ac9538e397cde8f2ecbe46faa721242a
SHA512a04e6fd052d2d63a0737c83702c66a9af834f9df8423666508c42b3e1d8384300239c9ddacdc31c1e85140eb1193bcfac209f218750b40342492ffce6e9da481
-
Filesize
6.5MB
MD5dcc0d15e77a7872758e65deb0bfc6745
SHA11efb89e143bf5edd34d46ae8370ecc13d4c3339f
SHA25687a168a04a254b1cf1adfe732e8b7b08d5c3e76ddca4e8b7fb4e58ebef85fe64
SHA5129cb972bcd99fd03a924bbff79e8989a040d1202a77c9d8f62ea862cc6b1d258778410ad9a4de5f2aab43062f5e9fe17d7ab9baa000de98d22a47f1471d1de778
-
Filesize
6.0MB
MD51b07ce60bc1c77f0cadf13c2e62b1383
SHA1ca70d0ef99ae5d1ebf85880ee669ad1145e4d79d
SHA256e48eb19ca0210f9063f4e77c2f14293ee940eeaef2ecb9efceac7f6336cc203f
SHA51294c358b6dfef0fcb0012a3a43235292b18ebf897043baef0c110570e91cc73721b12f1f771df6d000b4097f3c0cc22dcc65330a9153c7a9643787d24da6108f0
-
Filesize
3.8MB
MD5bf6eed6cdc17a0130189a33a55ef5209
SHA1e337f5a0931f69c464f162385f1330b4d27b372f
SHA256ef2734657b11113a433abb7ebac962e2bf6bf685f05c5f672997f01875430168
SHA51290d23fd84007343e85f9fc003cf826b112fd930216a24d8c1488468443ae2a4b0c3cc2426b91c81a8228e125050e922fce05672e010e65247709fc4a7b856f1d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.2MB
MD54ef95918e313c7ca01084629416fc714
SHA15bdaba6920d3f4d1f8ea47ce693276530b5f2a9c
SHA256303707068aab06ab0341178558c28ce1670d10f16c39522859c4f21097a87ee9
SHA51275861731e9ec1a43741b2b84f60677e9fdf26d5db8d6e4e91297f826fc2c357272c18cede7f64c42798f5459900b33d693ababe4e1140e4cfc54ef7a04af633a
-
Filesize
56B
MD52e9d3a427cb6930acd2659c0ee7b6442
SHA1884021846a57fa95d1e8e12e632ec2837900b090
SHA256064e43454d3c72ee5e250b3425d25677cac58fe82147bba3d5d547766f618a1f
SHA5123820f8c0a07de611c41de1bbbd8b55a352d7f5031b411e3b9f7891e86ecc1c38cde97bb2afd2294e5bd3e9a18e057c389f4ae7a9f8c1b8249206f691a7a23611
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
40B
MD5b65c5c633e2f14819937041a3b8dde55
SHA1b51ede54214fae487c8f21f67a3c9c4011dfa195
SHA256b09a59124969b0a5723154ceab08dcec174c970580534f43d598aabfaab68c1e
SHA512907095ee4625121668f57466d86d30a23defe87ebac57f77742ed92d454f70b714eaf55a7cf16e18b6ac50d6d7268afc1a0f9382f1ac98c00c42ecab3f90aba2
-
Filesize
40B
MD5677618d9216d52cd9bfcb7ababf36398
SHA174a782d62a3ea5cbafa6a0998255f15c1060b2b6
SHA256facf92440b813335ed7e085f90b6fe6ab66a18709ef61675e9b2656469c27e46
SHA5124bbb9b4c426c3c460d50293c3fd062d0fde2082e211d69fac6828d4343253deeac3b1f52da4dcdb1cb03e1140fdebb8c2aa6ea137f576bd3781543a400737b27
-
Filesize
5.7MB
MD515d1c495ff66bf7cea8a6d14bfdf0a20
SHA1942814521fa406a225522f208ac67f90dbde0ae7
SHA25661c2c4a5d7c14f77ee88871ded4cc7f1e49dae3e4ef209504c66fedf4d22de42
SHA512063169f22108ac97a3ccb6f8e97380b1e48eef7a07b8fb20870b9bd5f03d7279d3fb10a69c09868beb4a1672ebe826198ae2d0ea81df4d29f9a288ea4f2b98d8
-
Filesize
280B
MD5de0e4aac2b8623de31fbe1fc42303b60
SHA180c29edc89a3c18f4a666f90ffacfa8fee95d0c8
SHA256dda3a1a6290f404f1dd86a37ed694e590a255e4edcf7841fcd9b046d05540d10
SHA512cb33aad0f77b412f1b6ac949d4b021650c2f74f21095a271157ba995dddc1299a02046c62220b5ea02914813f386ec16d369af40835e00dba91246e0103254c5