Analysis
-
max time kernel
1916s -
max time network
1921s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
Krnl_8.10.8_x64_en-US.msi
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Krnl_8.10.8_x64_en-US.msi
Resource
win10v2004-20241007-en
General
-
Target
Krnl_8.10.8_x64_en-US.msi
-
Size
5.0MB
-
MD5
b837d10b9a71425dbf3d62b2cc59f447
-
SHA1
85c9ba3331f7eb432c28365b0d1f36a201373a72
-
SHA256
76c83d1bebd6b01bab76d9a94f223e1a3cf20f2040b8d58a12625074e2936f7c
-
SHA512
f20999d19c470941c85912725d6f89c5073d475572ece92ce5b8e5425cdf012950f230c353870d86469ab6658bdc504abbb41260cb676f109551860433bcb405
-
SSDEEP
98304:XPky+agPtUpupDeOds+883iSh79bubjnvmu5/qv4eYb2Tqg9EeYImwqPY6Bvv8m:XPky9GtAcdsENbubzSJb9lyw
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\msedge_cleanup_{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062} = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\Installer\\setup.exe\" --msedge --channel=stable --delete-old-versions --system-level --verbose-logging --on-logon" setup.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe -
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 449 camo.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Oxymorphazone (x64).exe -
Checks computer location settings 2 TTPs 18 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation msedge.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of NtCreateThreadExHideFromDebugger 7 IoCs
pid Process 2504 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 5844 RobloxPlayerBeta.exe 4352 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 2504 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 28 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\StudioToolbox\AssetConfig\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\130.0.2849.80\Locales\am.pak setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\advancedMove_noJoint.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\avatar\heads\head.mesh RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\avatar\scripts\R15Moods.rbxm RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\api-ms-win-core-console-l1-2-0.dll RobloxPlayerInstaller.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4432_2040186181\json\i18n-ec\pt-BR\strings.json msedge.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Settings\ShareGame\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EU17F0.tmp\msedgeupdateres_ca-Es-VALENCIA.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\configs\DateTimeLocaleConfigs\fr-ca.json RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\configs\DateTimeLocaleConfigs\pt-br.json RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\MenuBar\icon_leave_highlighted.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\VoiceChat\RedSpeakerLight\Unmuted60.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\avatar\meshes\leftleg.mesh RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\DeveloperStorybook\ToolbarIcon.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\VoiceChat\RedSpeakerDark\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\AvatarImporter\img_window_BG.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ManageCollaborators\FriendIcon_dark.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\RoactStudioWidgets\toggle_on_disable_light.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\shaders\shaders_glsl3.pack RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\InGameMenu\TouchControls\controls_phone_landscape.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\fonts\HWYGOTH.ttf RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\StudioToolbox\AssetConfig\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\9SliceEditor\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\StudioSharedUI\audio.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\AvatarExperience\AxisRing.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\PlayStationController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\AnimationEditor\ScrollbarTop.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Settings\Radial\RadialLabel.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ViewSelector\top_hover.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EU17F0.tmp\msedgeupdateres_vi.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\LuaChat\graphic\send-white.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\fonts\families\Creepster.json RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\Debugger\Breakpoints\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\DesignSystem\ButtonSelect.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Settings\ShareGame\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\VoiceChat\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\chatBubble_blue_notify_bkg.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\particles\explosion01_shockwave_main.dds RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\nb.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\DeveloperFramework\UIOff_dark.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\lt.pak setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\VoiceChat\RedSpeakerLight\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EUA99.tmp\msedgeupdateres_fa.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\sr-Latn-RS.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\PlayStationController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\ExtraContent\textures\ui\LuaChat\9-slice\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EUA99.tmp\msedgeupdateres_fr.dll MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Chat\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Emotes\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\PlayerList\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\Controls\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\waypoint.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\VoiceChat\RedSpeakerLight\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\PlatformContent\pc\textures\water\normal_24.dds RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\DeveloperFramework\StudioTheme\clear.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\content\textures\ui\PlayerList\BlockedIcon.png RobloxPlayerInstaller.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4432_2040186181\Wallet-Checkout\load-ec-deps.bundle.js msedge.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Installer\e57da81.msi msiexec.exe -
Executes dropped EXE 64 IoCs
pid Process 6004 RobloxPlayerInstaller.exe 3400 MicrosoftEdgeWebview2Setup.exe 5944 MicrosoftEdgeUpdate.exe 4556 MicrosoftEdgeUpdate.exe 5176 MicrosoftEdgeUpdate.exe 3584 MicrosoftEdgeUpdateComRegisterShell64.exe 3012 MicrosoftEdgeUpdateComRegisterShell64.exe 3528 MicrosoftEdgeUpdateComRegisterShell64.exe 5248 MicrosoftEdgeUpdate.exe 1540 MicrosoftEdgeUpdate.exe 2100 MicrosoftEdgeUpdate.exe 5224 MicrosoftEdgeUpdate.exe 856 MicrosoftEdge_X64_130.0.2849.80.exe 2216 setup.exe 3588 setup.exe 1104 MicrosoftEdgeUpdate.exe 2504 RobloxPlayerBeta.exe 4448 RobloxPlayerInstaller.exe 5200 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 2880 RobloxPlayerInstaller.exe 2776 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 844 MicrosoftEdgeUpdate.exe 1984 MicrosoftEdgeUpdate.exe 5844 RobloxPlayerBeta.exe 1976 MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe 5396 MicrosoftEdgeUpdate.exe 2896 MicrosoftEdgeUpdate.exe 5464 MicrosoftEdgeUpdate.exe 2684 MicrosoftEdgeUpdate.exe 2528 MicrosoftEdgeUpdateComRegisterShell64.exe 2892 MicrosoftEdgeUpdateComRegisterShell64.exe 4064 MicrosoftEdgeUpdateComRegisterShell64.exe 4508 MicrosoftEdgeUpdate.exe 4352 RobloxPlayerBeta.exe 5256 MicrosoftEdgeUpdate.exe 1640 MicrosoftEdgeUpdate.exe 4960 MicrosoftEdgeUpdate.exe 3612 MicrosoftEdge_X64_130.0.2849.80.exe 3680 setup.exe 3452 setup.exe 5932 setup.exe 180 setup.exe 4084 setup.exe 1408 setup.exe 5872 setup.exe 3196 setup.exe 524 MicrosoftEdgeUpdate.exe 5692 elevation_service.exe 5740 setup.exe 5444 setup.exe 3156 setup.exe 2896 setup.exe 1356 setup.exe 4680 setup.exe 4432 msedge.exe 1648 msedge.exe 3516 msedge.exe 5368 msedge.exe 2596 elevation_service.exe 4640 msedge.exe 2764 msedge.exe 3172 msedge.exe -
Loads dropped DLL 64 IoCs
pid Process 4964 MsiExec.exe 5944 MicrosoftEdgeUpdate.exe 4556 MicrosoftEdgeUpdate.exe 5176 MicrosoftEdgeUpdate.exe 3584 MicrosoftEdgeUpdateComRegisterShell64.exe 5176 MicrosoftEdgeUpdate.exe 3012 MicrosoftEdgeUpdateComRegisterShell64.exe 5176 MicrosoftEdgeUpdate.exe 3528 MicrosoftEdgeUpdateComRegisterShell64.exe 5176 MicrosoftEdgeUpdate.exe 5248 MicrosoftEdgeUpdate.exe 1540 MicrosoftEdgeUpdate.exe 2100 MicrosoftEdgeUpdate.exe 2100 MicrosoftEdgeUpdate.exe 1540 MicrosoftEdgeUpdate.exe 5224 MicrosoftEdgeUpdate.exe 1104 MicrosoftEdgeUpdate.exe 2504 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 844 MicrosoftEdgeUpdate.exe 1984 MicrosoftEdgeUpdate.exe 1984 MicrosoftEdgeUpdate.exe 844 MicrosoftEdgeUpdate.exe 5844 RobloxPlayerBeta.exe 5396 MicrosoftEdgeUpdate.exe 2896 MicrosoftEdgeUpdate.exe 5464 MicrosoftEdgeUpdate.exe 2684 MicrosoftEdgeUpdate.exe 2528 MicrosoftEdgeUpdateComRegisterShell64.exe 2684 MicrosoftEdgeUpdate.exe 2892 MicrosoftEdgeUpdateComRegisterShell64.exe 2684 MicrosoftEdgeUpdate.exe 4064 MicrosoftEdgeUpdateComRegisterShell64.exe 2684 MicrosoftEdgeUpdate.exe 4508 MicrosoftEdgeUpdate.exe 4352 RobloxPlayerBeta.exe 5256 MicrosoftEdgeUpdate.exe 1640 MicrosoftEdgeUpdate.exe 1640 MicrosoftEdgeUpdate.exe 5256 MicrosoftEdgeUpdate.exe 4960 MicrosoftEdgeUpdate.exe 524 MicrosoftEdgeUpdate.exe 4432 msedge.exe 4432 msedge.exe 1648 msedge.exe 3516 msedge.exe 5368 msedge.exe 3516 msedge.exe 5368 msedge.exe 4432 msedge.exe 4432 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 4640 msedge.exe 3516 msedge.exe 4640 msedge.exe 3172 msedge.exe 2764 msedge.exe 3172 msedge.exe 2764 msedge.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3056 msiexec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4508 MicrosoftEdgeUpdate.exe 4960 MicrosoftEdgeUpdate.exe 524 MicrosoftEdgeUpdate.exe 5248 MicrosoftEdgeUpdate.exe 5224 MicrosoftEdgeUpdate.exe 1104 MicrosoftEdgeUpdate.exe 5396 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Enumerates system info in registry 2 TTPs 21 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\BHO" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\PROTOCOLEXECUTE\ROBLOX-PLAYER RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\PROTOCOLEXECUTE\ROBLOX RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = e8172e0d6a474159aa89b420818b5c5ecd75db390a75673a611bccba6a4ed0eb setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 8e1dc482d0c162bab0071da34f6be3b3dec45598c6e2830cfa8166bfa034a124 setup.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 0ef5c3fc3fdb3c9d0c6e72beaff03db77a45b23123c789751d26afd2c98bcdc4 setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 66902e826e6c25f993522c85340f60b97c66925001878605420499ef9798449b setup.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c004d006900630072006f0073006f00660074005c0045006400670065005c004100700070006c00690063006100740069006f006e005c00390032002e0030002e003900300032002e00360037005c006d00730065006400670065005f0065006c0066002e0064006c006c0000000000 setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = f1bcaf7aaf3ed30f7b27429173f6f83995c445562dfad2917ad59d06e9eeb47b setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft setup.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Owner = 540c00007373e32bde35db01 setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox\shell RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.PolicyStatusMachine" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\AppID = "{CECDDD22-2E72-4832-9606-A9B0E5E344B2}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3316A154-AC5C-4126-9021-B201E9C33D7B}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ELEVATION MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3316A154-AC5C-4126-9021-B201E9C33D7B}\ = "PSFactoryBuffer" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1AFD8852-E87E-49F5-89B4-4214D0854576} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\AppUserModelId = "MSEdge" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox\shell\open\command\ = "\"C:\\Program Files (x86)\\Roblox\\Versions\\version-b7eebc919e96477a\\RobloxPlayerBeta.exe\" %1" RobloxPlayerInstaller.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\NumMethods\ = "27" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ = "ICurrentState" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine.1.0\ = "Microsoft Edge Update CredentialDialog" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{3316A154-AC5C-4126-9021-B201E9C33D7B}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32\ = "{3316A154-AC5C-4126-9021-B201E9C33D7B}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{3316A154-AC5C-4126-9021-B201E9C33D7B}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\Application setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\roblox RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{3316A154-AC5C-4126-9021-B201E9C33D7B}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\ = "Microsoft Edge Update Update3Web" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\OpenWithProgIds\MSEdgeHTM setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods\ = "9" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\CLSID\ = "{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine.1.0\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ = "IBrowserHttpRequest2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 841694.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\Downloads\Unconfirmed 94413.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 94413.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1812 msiexec.exe 1812 msiexec.exe 892 chrome.exe 892 chrome.exe 3888 msedge.exe 3888 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 5480 identity_helper.exe 5480 identity_helper.exe 6052 msedge.exe 6052 msedge.exe 3100 msedge.exe 3100 msedge.exe 5300 msedge.exe 5300 msedge.exe 1400 msedge.exe 2252 msedge.exe 2252 msedge.exe 3876 msedge.exe 3876 msedge.exe 4496 msedge.exe 4496 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 2444 msedge.exe 2444 msedge.exe 2716 msedge.exe 2716 msedge.exe 6004 RobloxPlayerInstaller.exe 6004 RobloxPlayerInstaller.exe 5944 MicrosoftEdgeUpdate.exe 5944 MicrosoftEdgeUpdate.exe 5944 MicrosoftEdgeUpdate.exe 5944 MicrosoftEdgeUpdate.exe 5944 MicrosoftEdgeUpdate.exe 5944 MicrosoftEdgeUpdate.exe 2504 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 2880 RobloxPlayerInstaller.exe 2880 RobloxPlayerInstaller.exe 2776 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 844 MicrosoftEdgeUpdate.exe 844 MicrosoftEdgeUpdate.exe 844 MicrosoftEdgeUpdate.exe 844 MicrosoftEdgeUpdate.exe 5844 RobloxPlayerBeta.exe 1984 MicrosoftEdgeUpdate.exe 1984 MicrosoftEdgeUpdate.exe 2896 MicrosoftEdgeUpdate.exe 2896 MicrosoftEdgeUpdate.exe 4352 RobloxPlayerBeta.exe 1972 chrome.exe 1972 chrome.exe 5188 msedge.exe 5188 msedge.exe 644 msedge.exe 644 msedge.exe 3388 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 892 chrome.exe 892 chrome.exe 892 chrome.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3056 msiexec.exe Token: SeIncreaseQuotaPrivilege 3056 msiexec.exe Token: SeSecurityPrivilege 1812 msiexec.exe Token: SeCreateTokenPrivilege 3056 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3056 msiexec.exe Token: SeLockMemoryPrivilege 3056 msiexec.exe Token: SeIncreaseQuotaPrivilege 3056 msiexec.exe Token: SeMachineAccountPrivilege 3056 msiexec.exe Token: SeTcbPrivilege 3056 msiexec.exe Token: SeSecurityPrivilege 3056 msiexec.exe Token: SeTakeOwnershipPrivilege 3056 msiexec.exe Token: SeLoadDriverPrivilege 3056 msiexec.exe Token: SeSystemProfilePrivilege 3056 msiexec.exe Token: SeSystemtimePrivilege 3056 msiexec.exe Token: SeProfSingleProcessPrivilege 3056 msiexec.exe Token: SeIncBasePriorityPrivilege 3056 msiexec.exe Token: SeCreatePagefilePrivilege 3056 msiexec.exe Token: SeCreatePermanentPrivilege 3056 msiexec.exe Token: SeBackupPrivilege 3056 msiexec.exe Token: SeRestorePrivilege 3056 msiexec.exe Token: SeShutdownPrivilege 3056 msiexec.exe Token: SeDebugPrivilege 3056 msiexec.exe Token: SeAuditPrivilege 3056 msiexec.exe Token: SeSystemEnvironmentPrivilege 3056 msiexec.exe Token: SeChangeNotifyPrivilege 3056 msiexec.exe Token: SeRemoteShutdownPrivilege 3056 msiexec.exe Token: SeUndockPrivilege 3056 msiexec.exe Token: SeSyncAgentPrivilege 3056 msiexec.exe Token: SeEnableDelegationPrivilege 3056 msiexec.exe Token: SeManageVolumePrivilege 3056 msiexec.exe Token: SeImpersonatePrivilege 3056 msiexec.exe Token: SeCreateGlobalPrivilege 3056 msiexec.exe Token: SeCreateTokenPrivilege 3056 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3056 msiexec.exe Token: SeLockMemoryPrivilege 3056 msiexec.exe Token: SeIncreaseQuotaPrivilege 3056 msiexec.exe Token: SeMachineAccountPrivilege 3056 msiexec.exe Token: SeTcbPrivilege 3056 msiexec.exe Token: SeSecurityPrivilege 3056 msiexec.exe Token: SeTakeOwnershipPrivilege 3056 msiexec.exe Token: SeLoadDriverPrivilege 3056 msiexec.exe Token: SeSystemProfilePrivilege 3056 msiexec.exe Token: SeSystemtimePrivilege 3056 msiexec.exe Token: SeProfSingleProcessPrivilege 3056 msiexec.exe Token: SeIncBasePriorityPrivilege 3056 msiexec.exe Token: SeCreatePagefilePrivilege 3056 msiexec.exe Token: SeCreatePermanentPrivilege 3056 msiexec.exe Token: SeBackupPrivilege 3056 msiexec.exe Token: SeRestorePrivilege 3056 msiexec.exe Token: SeShutdownPrivilege 3056 msiexec.exe Token: SeDebugPrivilege 3056 msiexec.exe Token: SeAuditPrivilege 3056 msiexec.exe Token: SeSystemEnvironmentPrivilege 3056 msiexec.exe Token: SeChangeNotifyPrivilege 3056 msiexec.exe Token: SeRemoteShutdownPrivilege 3056 msiexec.exe Token: SeUndockPrivilege 3056 msiexec.exe Token: SeSyncAgentPrivilege 3056 msiexec.exe Token: SeEnableDelegationPrivilege 3056 msiexec.exe Token: SeManageVolumePrivilege 3056 msiexec.exe Token: SeImpersonatePrivilege 3056 msiexec.exe Token: SeCreateGlobalPrivilege 3056 msiexec.exe Token: SeCreateTokenPrivilege 3056 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3056 msiexec.exe Token: SeLockMemoryPrivilege 3056 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3056 msiexec.exe 3056 msiexec.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 892 chrome.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3208 Oxymorphazone (x64).exe -
Suspicious use of UnmapMainImage 7 IoCs
pid Process 2504 RobloxPlayerBeta.exe 5200 RobloxPlayerBeta.exe 856 RobloxPlayerBeta.exe 2776 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 5844 RobloxPlayerBeta.exe 4352 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 4964 1812 msiexec.exe 100 PID 1812 wrote to memory of 4964 1812 msiexec.exe 100 PID 1812 wrote to memory of 4964 1812 msiexec.exe 100 PID 1812 wrote to memory of 3100 1812 msiexec.exe 110 PID 1812 wrote to memory of 3100 1812 msiexec.exe 110 PID 892 wrote to memory of 1748 892 chrome.exe 113 PID 892 wrote to memory of 1748 892 chrome.exe 113 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 1700 892 chrome.exe 114 PID 892 wrote to memory of 4892 892 chrome.exe 115 PID 892 wrote to memory of 4892 892 chrome.exe 115 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 PID 892 wrote to memory of 2620 892 chrome.exe 116 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Krnl_8.10.8_x64_en-US.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3056
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6653BA3C9D2E1DF184D8FD47EF85E8D1 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3100
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3096
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffac81acc40,0x7ffac81acc4c,0x7ffac81acc582⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,6882296667077122293,10050821952633206309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2068,i,6882296667077122293,10050821952633206309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:32⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,6882296667077122293,10050821952633206309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,6882296667077122293,10050821952633206309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3288,i,6882296667077122293,10050821952633206309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3684,i,6882296667077122293,10050821952633206309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffac79246f8,0x7ffac7924708,0x7ffac79247182⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:12⤵PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4324 /prefetch:12⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2960 /prefetch:12⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4384 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6496 /prefetch:82⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6744 /prefetch:12⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6608 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3504 /prefetch:82⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:6004 -
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3400 -
C:\Program Files (x86)\Microsoft\Temp\EU17F0.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU17F0.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5944 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4556
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5176 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3584
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3012
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3528
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MjZBQkFFOTUtMTdEMy00MkNCLTlDQjctOUJCNDFENkY4MDM4fSIgdXNlcmlkPSJ7N0UzODQ0MEMtREJCNS00Q0FGLUJBRDUtNjY3MjI2NDBENEMwfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntCQzhBRkMwMy00N0FDLTRGNEUtQUFGQy1FQTU5Mzk0RkY1MUJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTcxLjM5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI4MzgzNDk4ODAwIiBpbnN0YWxsX3RpbWVfbXM9IjU2MyIvPjwvYXBwPjwvcmVxdWVzdD45⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5248
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{26ABAE95-17D3-42CB-9CB7-9BB41D6F8038}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1540
-
-
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" -app -clientLaunchTimeEpochMs 0 -isInstallerLaunch 60043⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2504
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:t05cMZ4KQ1MWmmuOt3cATwXwjCHLJW9Us7U4lWMoAyfqzoEKwdrqnnCGDDW78UyjGxEAlwki_DiX_C3MitM-8A8fLWjqMdbBoOUt4errBhKDF_XW9FGDFJ0PPPBI41CpbQBT1Mkb4Unjg9biyGNP7-C1wu2ijzRSgv2a-nkpOnlKtgrpwXfsDD2Mpc3MEVsdHWNocCZ_yq5HBgfk1yC8rUOgzb5nplDncEudZBLWPW4+launchtime:1731509971133+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1731509561505006%26placeId%3D189707%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D9d5e39c6-c603-4023-a270-28ed8d69043d%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1731509561505006+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:12⤵PID:5520
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:sQ12C2i8yIcL8KGSdef5yJ8hWAZWXdX_IEk33HveK77AMzrD1nl6ORqLk-TOPcw6I1Q9wDo9N4TZsHXKt5m1VNg7jFADdcHRV1nEL28okHpfL8i_wWMfEkFzp81mHiUuKxm4-Jz8yrRbXgnby_bFaLbw2j1lJoMnEKvkv3WwS15AdU6PuA0jMe-9wJ21bUyYovpedUVLA1BdQJP3LagyrDo_H9Yb9USXpBfP-hfH4Jg+launchtime:1731510009458+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1731509561505006%26placeId%3D189707%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D64b64cdf-33c9-4692-8a45-9c0fbb2e5786%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1731509561505006+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:6080
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:0C-6CsVZm8B8wLlZnvUtKWTUJNyUmgXGHImajBSAAAFfK1t_kzH7MRw1i1Y2E7WWtKkun2E0o1idMhnaL_bnb8Wf4-osVzar3vNTOynSpVF_QOg25v3Zq1D_v-0OYKvhXA2aEM_2MaFBw5clfOJde7YeMxVSfGkLTqueq_Y8c-wGZIN8y3jxDXGQka1Be4aMzFzPykZTWxDHltyAac_0mJZg_lxaPqB6YBjBkOoX6DI+launchtime:1731510082904+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1731509561505006%26placeId%3D189707%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D06880e3e-7f33-4535-aae8-b0329ea91e4b%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1731509561505006+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1368 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2784 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:e3OhbYVE-JtsIkWkqC3mCXA-bj55n0kduAck2qiStHJrLph6xdsSOtnfU8yXCuGNrT_waf_C018K5JCZ_ihwZyOpNhwEGfPijBwFnV6vTSdPx9ecgtssD3sOwck8EGAvFcWwwtulK_7VKwqzMeN4eQu1n7FX7INqQOH2UWxod4wUTyECPNp50cfIgXyNjMKK8jOmjRg378uSw12kdFcGYEJMQRr1QT5OOVcS8RdmxTU+launchtime:1731510153386+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1731509561505006%26placeId%3D189707%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3Dde0f80cb-a560-4248-93b8-7cad64512489%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1731509561505006+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6900 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6604 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7144264904446744167,7983652384479284561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:12⤵PID:5840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2100 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MjZBQkFFOTUtMTdEMy00MkNCLTlDQjctOUJCNDFENkY4MDM4fSIgdXNlcmlkPSJ7N0UzODQ0MEMtREJCNS00Q0FGLUJBRDUtNjY3MjI2NDBENEMwfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntCNUY1QTREOS01OUVBLTRFMjMtOEMxMy02QUM1ODg1MTVDM0J9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjgzODkwNDg5NjkiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5224
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3FD884D0-CDEB-4919-BA81-35F79F290EB9}\MicrosoftEdge_X64_130.0.2849.80.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3FD884D0-CDEB-4919-BA81-35F79F290EB9}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:856 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3FD884D0-CDEB-4919-BA81-35F79F290EB9}\EDGEMITMP_1FF15.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3FD884D0-CDEB-4919-BA81-35F79F290EB9}\EDGEMITMP_1FF15.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3FD884D0-CDEB-4919-BA81-35F79F290EB9}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Checks computer location settings
- Drops file in Program Files directory
- Executes dropped EXE
PID:2216 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3FD884D0-CDEB-4919-BA81-35F79F290EB9}\EDGEMITMP_1FF15.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3FD884D0-CDEB-4919-BA81-35F79F290EB9}\EDGEMITMP_1FF15.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{3FD884D0-CDEB-4919-BA81-35F79F290EB9}\EDGEMITMP_1FF15.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff7b80ed730,0x7ff7b80ed73c,0x7ff7b80ed7484⤵
- Executes dropped EXE
PID:3588
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MjZBQkFFOTUtMTdEMy00MkNCLTlDQjctOUJCNDFENkY4MDM4fSIgdXNlcmlkPSJ7N0UzODQ0MEMtREJCNS00Q0FGLUJBRDUtNjY3MjI2NDBENEMwfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InsyNjVCQzZGQi0wMUNDLTRBQ0YtQUY3MS00MEZCOEU5QkM3MTl9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMTMwLjAuMjg0OS44MCIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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_UDE9MTczMjExNDY1NCZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1EUTYlMmJBRTFEcU13dDBYcXRIeENmdnhCeHRxWE9Vc1clMmIwQ3MyQklLUUFXNk1IaVJlZnFNaVFRWTk1cjBmQm8lMmYyS1hjWDVTN1lBN0pHdXdLY3YlMmIlMmZudnclM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIxNzUwNzY5MjAiIHRvdGFsPSIxNzUwNzY5MjAiIGRvd25sb2FkX3RpbWVfbXM9IjI5MDk3Ii8-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1104
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3248
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:4448
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"1⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe" -app -clientLaunchTimeEpochMs 0 -isInstallerLaunch 28802⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2776
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:844
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE3E0B02-B690-46EC-B7CD-AC4F35764B8F}\MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CE3E0B02-B690-46EC-B7CD-AC4F35764B8F}\MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe" /update /sessionid "{60D1ADE4-E7C0-4ABC-BE87-D7E70231714C}"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Program Files (x86)\Microsoft\Temp\EUA99.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUA99.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{60D1ADE4-E7C0-4ABC-BE87-D7E70231714C}"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5464
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2684 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2528
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2892
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.35\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4064
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjM1IiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMCIgaW5zdGFsbGRhdGV0aW1lPSIxNzMxNTA5ODUyIj48ZXZlbnQgZXZlbnR0eXBlPSIzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMTYyNDE1NjU2OSIvPjwvYXBwPjwvcmVxdWVzdD44⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4508
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjBEMUFERTQtRTdDMC00QUJDLUJFODctRDdFNzAyMzE3MTRDfSIgdXNlcmlkPSJ7N0UzODQ0MEMtREJCNS00Q0FGLUJBRDUtNjY3MjI2NDBENEMwfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins2OTQwRUVDRi02NjdFLTRGRTQtQUE5My1BRTIzMUNBM0VCMTR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-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_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-PC9hcHA-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjkyLjAuOTAyLjY3IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzc1OTgzMTE3NzA2ODc0MCI-PHVwZGF0ZWNoZWNrLz48cGluZyBhY3RpdmU9IjEiIGE9Ii0xIiByPSItMSIgYWQ9Ii0xIiByZD0iLTEiLz48L2FwcD48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iMTMwLjAuMjg0OS44MCIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRlPSI2NTI0Ij48dXBkYXRlY2hlY2svPjxwaW5nIHI9Ii0xIiByZD0iLTEiIHBpbmdfZnJlc2huZXNzPSJ7Q0Y1REE5NzAtODYwOS00OTgyLTk5MTMtM0Y1QTY5RTcyNDZFfSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5396
-
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\RobloxPlayerBeta.exe"1⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0x84,0x104,0x7ffac81acc40,0x7ffac81acc4c,0x7ffac81acc582⤵PID:5128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2052,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1800,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:5496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3680,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4884,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:5276
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x274,0x278,0x27c,0x250,0x280,0x7ff6cc114698,0x7ff6cc1146a4,0x7ff6cc1146b03⤵PID:740
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5200,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4724 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4676,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4404,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4412 /prefetch:82⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5040,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5188,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5084 /prefetch:22⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4880,i,7733690782240581774,2566044582708722603,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4420 /prefetch:12⤵PID:6136
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac79246f8,0x7ffac7924708,0x7ffac79247182⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3804 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:5984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2124 /prefetch:12⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5796 /prefetch:22⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:6000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4448 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2056,6242642833508265076,14519011777135665419,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3576 /prefetch:82⤵PID:5756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5256
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1640 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzNyIgaW5zdGFsbGRhdGV0aW1lPSIxNzI4MjkzNDAwIiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNzI3NjYwNzU2NjEwMDAwIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjE3OTg2MiIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTUwMDAwOTY1NTQiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4960
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\MicrosoftEdge_X64_130.0.2849.80.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
PID:3612 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
PID:3680 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7c1e0d730,0x7ff7c1e0d73c,0x7ff7c1e0d7484⤵
- Executes dropped EXE
PID:3452
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Drops file in System32 directory
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5932 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7c1e0d730,0x7ff7c1e0d73c,0x7ff7c1e0d7485⤵
- Executes dropped EXE
PID:180
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵
- Executes dropped EXE
PID:4084 -
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff77994d730,0x7ff77994d73c,0x7ff77994d7485⤵
- Executes dropped EXE
PID:5872
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level4⤵
- Executes dropped EXE
PID:1408 -
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff77994d730,0x7ff77994d73c,0x7ff77994d7485⤵
- Executes dropped EXE
PID:3196
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMzUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NTE5ODU1NjgtOTNDNi00QzhFLTlFOTQtQUVGQ0RENjhGQUIxfSIgdXNlcmlkPSJ7N0UzODQ0MEMtREJCNS00Q0FGLUJBRDUtNjY3MjI2NDBENEMwfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntEM0ZCNDBGOS00NTk0LTQwQjgtODc0QS1ENTE2NzUwOTdFMDF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MDE0NjI4MTE0IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MDE0NjI4MTE0IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MDQxOTcxNDM3IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE1MDU1MDk2NTgxIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:524
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x4b01⤵PID:5140
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\elevation_service.exe"1⤵
- Executes dropped EXE
PID:5692 -
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --rename-msedge-exe --system-level --verbose-logging --msedge --channel=stable2⤵
- Executes dropped EXE
PID:5740 -
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff77994d730,0x7ff77994d73c,0x7ff77994d7483⤵
- Executes dropped EXE
PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --msedge --channel=stable --delete-old-versions --system-level --verbose-logging3⤵
- Adds Run key to start application
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3156 -
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x274,0x278,0x27c,0x250,0x280,0x7ff77994d730,0x7ff77994d73c,0x7ff77994d7484⤵
- Executes dropped EXE
PID:1356
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level3⤵
- Executes dropped EXE
PID:2896 -
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff77994d730,0x7ff77994d73c,0x7ff77994d7484⤵
- Executes dropped EXE
PID:4680
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Checks computer location settings
- Checks system information in the registry
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- NTFS ADS
- System policy modification
PID:4432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2dc,0x2f0,0x7ffac8044dc0,0x7ffac8044dcc,0x7ffac8044dd82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2228,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1916,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --field-trial-handle=2588,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=2804 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3512,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=3576 /prefetch:12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --instant-process --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3520,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4288,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=4644 /prefetch:22⤵
- Checks computer location settings
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5300,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5420,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5480,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5484,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5492,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=6156,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6172 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=6668,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6704 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=6668,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6704 /prefetch:82⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=6900,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6848 /prefetch:82⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=6908,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6936 /prefetch:12⤵
- Checks computer location settings
PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7084,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7136 /prefetch:82⤵PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7400,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7500 /prefetch:82⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7188,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7504 /prefetch:82⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7520,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7692 /prefetch:82⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7612,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7824 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7296,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7592 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7816,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7700 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=6508,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7900 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4896,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=4912 /prefetch:82⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4856,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=728 /prefetch:82⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4912,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=3496 /prefetch:82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7020,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=2352 /prefetch:82⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=6140,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4888,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=4904 /prefetch:82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7036,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4632,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6916 /prefetch:82⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5080,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=896 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=896,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=4860 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4892,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7928 /prefetch:82⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=6512,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=3620,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=1904,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5968,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=3368 /prefetch:82⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5184,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=3548,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6784 /prefetch:82⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=2896,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7932 /prefetch:82⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5880,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7988 /prefetch:82⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4320,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=4928 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=8008,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=4684 /prefetch:82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=3964,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --field-trial-handle=2900,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=8036 /prefetch:12⤵
- Checks computer location settings
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --field-trial-handle=3348,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=3368 /prefetch:12⤵
- Checks computer location settings
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --field-trial-handle=4860,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5664 /prefetch:12⤵
- Checks computer location settings
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --field-trial-handle=7920,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6476 /prefetch:12⤵
- Checks computer location settings
PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --field-trial-handle=7868,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5348 /prefetch:12⤵
- Checks computer location settings
PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7284,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7276 /prefetch:82⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7304,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7292 /prefetch:82⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=3600,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=4292 /prefetch:82⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7256,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7856 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --field-trial-handle=5256,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7532 /prefetch:12⤵
- Checks computer location settings
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7712,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=8148 /prefetch:82⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5264,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7944 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5864,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:82⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=3820,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=3808 /prefetch:82⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=6436,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=8164 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5904,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7776 /prefetch:82⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=8140,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7776 /prefetch:82⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=8160,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6616 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5732,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=1496,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=8156 /prefetch:82⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7800,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7388 /prefetch:82⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4948,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7972 /prefetch:82⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=3808,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5800,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7772 /prefetch:82⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7684,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --field-trial-handle=5508,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:12⤵
- Checks computer location settings
PID:6132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_xpay_wallet.mojom.EdgeXPayWalletService --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4876,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=6572 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=7880,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=75 --field-trial-handle=8436,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7676 /prefetch:12⤵
- Checks computer location settings
PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=76 --field-trial-handle=8340,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=7328 /prefetch:12⤵
- Checks computer location settings
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=77 --field-trial-handle=8696,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=8716 /prefetch:12⤵
- Checks computer location settings
PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations=is-enterprise-managed=no --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=78 --field-trial-handle=8836,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=5636 /prefetch:12⤵
- Checks computer location settings
PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=9020,i,5442611972610212355,5543044071290008850,262144 --variations-seed-version --mojo-platform-channel-handle=9068 /prefetch:82⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2596
-
C:\Users\Admin\Downloads\Oxymorphazone.exe-Malware-main\Oxymorphazone.exe\Oxymorphazone (x64).exe"C:\Users\Admin\Downloads\Oxymorphazone.exe-Malware-main\Oxymorphazone.exe\Oxymorphazone (x64).exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:3208
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x4b01⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Defense Evasion
Modify Registry
5Pre-OS Boot
1Bootkit
1System Binary Proxy Execution
1Msiexec
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD5b621cf9d3506d2cd18dc516d9570cd9c
SHA1f90ed12727015e78f07692cbcd9e3c0999a03c3a
SHA25664050839b4a6f27d896e1194e902a2f7a3c1cab0ef864b558ab77f1be25145d6
SHA512167c73cf457689f8ba031015c1e411545550f602919c35aff6fd4d602bd591d34e8c12887a946902b798bf4cf98aadfce3c2de810bf16c7c24a216bfd8abec19
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.195.35\MicrosoftEdgeUpdateSetup_X86_1.3.195.35.exe
Filesize1.6MB
MD5dc1543edd0dcd56536304bdf56ef93f1
SHA11a8b2c7791f2faa1eb0a98478edee1c45847075c
SHA256ccbb3d9a4877999a55b2ca6b8128481e91c4b56780f581226f916c0fb2db0772
SHA5122a6b4aa39bc3e4d234909077d5c6d75b9968c1778d505cc12431afd7aebd01eb65ed2f6f0c53c67f18eed7e97b67a93bab8c44574e3918ccd5cfcd8681767056
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B4B7543D-3FA1-4461-A75A-95A957FB8D66}\EDGEMITMP_A3052.tmp\SETUP.EX_
Filesize2.6MB
MD5958befee6afc25fa51e4bf538d0894c7
SHA170a2f157988f6cef27048bc2b3c81e8ab4b41552
SHA2565422f0b35bac6fc926c6f537d42cfa4aaa7985e89e4e680acc467d804071a006
SHA5127ecf452f007d849268b4cc2644ecb239b2a4309a80f4350dfb215f6fc34950cabf1bb233f43bc6678547931af7b427517ed8c88cd214aa0358122777a5a8cce2
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
Filesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
Filesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
Filesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
Filesize
6.7MB
MD5b68e7f7ae52ef8e962723c7ddda4f75d
SHA1686bdf2057cdd7b16877fb5eec0aff150fa074d0
SHA256d779b2acc52b4b3e72c1461dbc7e950f0b650e924b3799db425942f64624e94d
SHA512cb0ecf531c95d657019b0188e648520b36b8386516d2e640239d99972ae44439d21ec6fcbe7902fc59c6f65db3571db0944e48f2207a442f3be5d10c9655bbb1
-
C:\Program Files (x86)\Roblox\Versions\version-b7eebc919e96477a\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
Filesize1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
Filesize
280B
MD505c227d3abe64859a9217762cf190910
SHA117583bfb566eb3ea293ae3fd3778efcd8b7172da
SHA2565889ca703225ffd213df1574735ecec48bace8415f10dcd83ec2208a8a562905
SHA512a12ea6dc004783d58e812c1448409b29f36caf52b88db3aa92c999ea9e706553a26ca0bf9ee4f1d1397e636856c9e1806c8926e1e13aa2d983fdb7952d7797d2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
80B
MD5077da41a01dde0173ebbf70d3b7210e2
SHA14b3c3deeb9522ca4ef4e42efcf63b2674f6a5c07
SHA25623bed5c8ebea0c376483374bad7baf633a7e52f3e0a609371c518e06e645bda0
SHA5122822d02e2b3c6306e6d71fa62e7f472b4c3cdf0cbe499b70ac60a0a50e547ed47c394d7de88bbef2e6015920442b9d30cbc0d6869d154e02ec251712f918deec
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
84B
MD5bf39dbda82fce174426dd4bdaf826719
SHA1daae4bc61864730aa4b0a2eeb8bdd5389126d89c
SHA2567d969eedeafcae3a4160c974d8e6f64a9475c0287d646dcfb2dd641031232d65
SHA512a2cfba1ac0f2344e5c4d562f01d3b44a8c2f08b8dcc023ad07c2c8f95d738b33b96932cb430ec8689b7be90cd143fc1a83d4b65500b1536ee1c25063338e7408
-
Filesize
52B
MD5c35841dd7f0a10120e2b6df0dd1fff93
SHA1c2618f5036beb561f6415f20aa1cf2fdba38f9a0
SHA25639296a0d56c1bb9db0a56cc532164266b69802791dfdc2a5161fe614a3ce28db
SHA512a43310a97da427b78d7cd1dffe3d1f21cf4fb0bc7aa80b09ba62fa3ce0052a3260f46051b0a051b26b2826faa30be8861db0d71cd24e54462237ef60bf3681a7
-
Filesize
102B
MD5b3b44a03c34b2073a11aedbf7ff45827
SHA1c35c52cc86d64e3ae31efe9ef4a59c8bdce5e694
SHA256e3649c54fd5e44cbb5ba80ef343c91fd6d314c4a2660f4a82ec9409eea165aa7
SHA512efa957a1979d4c815ecb91e01d17fa14f51fafdde1ab77ba78ea000ca13ec2d768f57a969aaf6260e8fd68820fd294da712f734753c0c0eda58577fe86cfe2c5
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
Filesize
113B
MD5b6911958067e8d96526537faed1bb9ef
SHA1a47b5be4fe5bc13948f891d8f92917e3a11ebb6e
SHA256341b28d49c6b736574539180dd6de17c20831995fe29e7bc986449fbc5caa648
SHA51262802f6f6481acb8b99a21631365c50a58eaf8ffdf7d9287d492a7b815c837d6a6377342e24350805fb8a01b7e67816c333ec98dcd16854894aeb7271ea39062
-
Filesize
118B
MD5cdd8a4852b4b4a484f401b1aa164365c
SHA1902185889ce665bd284de1dff2e2c568aeabf955
SHA256e7cfb97051286090de942050acea088716f4b8c667b80302f361dc915276c497
SHA512d07b5df8e308308c8c4497ff1a131bec28fe295e0ab4ff5c37644a7a2e5fde42c9feadd62e65cfbd84244b9b3a88cfb2c58ca4b55f4032d943364b417629b7be
-
C:\Program Files\chrome_Unpacker_BeginUnzipping4432_2040186181\Notification\notification_fast.bundle.js.LICENSE.txt
Filesize551B
MD57bf61e84e614585030a26b0b148f4d79
SHA1c4ffbc5c6aa599e578d3f5524a59a99228eea400
SHA25638ed54eb53300fdb6e997c39c9fc83a224a1fd9fa06a0b6d200aa12ea278c179
SHA512ca5f2d3a4f200371927c265b9fb91b8bcd0fbad711559f796f77b695b9038638f763a040024ed185e67be3a7b58fab22a6f8114e73fdbd1cccdda6ef94ff88f3
-
C:\Program Files\chrome_Unpacker_BeginUnzipping4432_2040186181\Tokenized-Card\tokenized-card.bundle.js.LICENSE.txt
Filesize1KB
MD58595bdd96ab7d24cc60eb749ce1b8b82
SHA13b612cc3d05e372c5ac91124f3756bbf099b378d
SHA256363f376ab7893c808866a830fafbcd96ae6be93ec7a85fabf52246273cf56831
SHA512555c0c384b6fcfc2311b47c0b07f8e34243de528cf1891e74546b6f4cda338d75c2e2392827372dc39e668ed4c2fd1a02112d8136d2364f9cab9ee4fa1bd87f5
-
C:\Program Files\chrome_Unpacker_BeginUnzipping4432_2040186181\json\i18n-tokenized-card\fr-CA\strings.json
Filesize2KB
MD5cd247582beb274ca64f720aa588ffbc0
SHA14aaeef0905e67b490d4a9508ed5d4a406263ed9c
SHA256c67b555372582b07df86a6ce3329a854e349ba9525d7be0672517bab0ac14db5
SHA512bf8fa4bd7c84038fae9eddb483ae4a31d847d5d47b408b3ea84d46d564f15dfc2bae6256eac4a852dd1c4ad8e58bc542e3df30396be05f30ed07e489ebe52895
-
Filesize
124B
MD5d9a32fb86d280fd18db35f066efca333
SHA1a3420ae19e4aaad515b8f787936e313304240d93
SHA25608e7078ee5df3b6448d7d6afe2781147023fbb169a94a7e8bfe0206755700620
SHA51259556ee828542782fe218773ca7fe9580e2725d9bdffa33c7b7bdeaa719b585d4e5af6ef708e844de843c632d928422410f6cdfa310396331dfcdee004832b32
-
Filesize
147B
MD507e2fbcbbbee9c342bf5f48ff6385e47
SHA15d7119048fb9c4fff1c921cc6fa20abb65270b24
SHA25627f60e1dc23cadee33f7fe5c87d260b9186f460232613761acad2c278ba79aa4
SHA5121629a76db6752ecc574377613c588cf74eda1f6b710cb0f4bb268540a2dbc2f242f221e1070a60d81efbfa686f35fc1bcd7dfad9feeef9d944e5cb5f6210d520
-
Filesize
72B
MD5914c0b3ee0a6ab0b12819d84a6141290
SHA12d085b9dd8d159e3d4ca5112546f8158c30cc03a
SHA256132afb6586bfa2bccef4639b58d1f6f9a5b69d7246843bf90907fc44baf3d538
SHA51285966d27d86055d11926d3197e2138a0cadfad8b9b4f2264c4b04ab33aed4a0dcbb86975a4ea1c90427d9071537357f3cc71252ea33c5306596e03389b1adc69
-
Filesize
119B
MD5e3e5c00b60ec66398776dc4a5873d242
SHA1d700e16daea32f180e2f672f421cf5193df86c9d
SHA25600163e3b077b87d9e63934a1505140f03323359fb097e2c173b908ebaefc45c9
SHA512c63dfce7e991bf1a554900ed7ad1cabfb797e86c2d150da08249460b454abaf176a23b671b2d4d76aac5f5e2bc88bdda82dcb2172c1fa08264db13bee3179007
-
Filesize
116B
MD52188c7ec4e86e29013803d6b85b0d5bb
SHA15a9b4a91c63e0013f661dfc472edb01385d0e3ce
SHA256ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62
SHA51237c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656
-
Filesize
237B
MD518523c9a98b600517f8afdfc625cf774
SHA10dbfddb10adc8d01b5c70fda0453d4e71cc79c38
SHA256b2cee416ecd3701967e43f1147076ad5d53b0292960121e9d42bd6c0ba424505
SHA5120b3bd36b95bc79b83abebce78ddaac25a0f77a633ee39ea7f79143dc884d0c223bf2beb8b0468ec5b52609e47ae211770782305e1f4198fe60bf70678ec24c37
-
Filesize
176B
MD5e81c1acde0363d05f6da551cb9464139
SHA144cfb7f33f86dee96adf5c81704feb9b5b98895f
SHA2568950349f6e295d5b5c041d1c50fb5452214d1a9090e1f8d6ec2a3100977d3a08
SHA51278300c28ca192fe1832c93cdbd59c5ce52a188ecfecf70e6aebf6b46f5834f0a1b130278e3e0d47634d3d57670aa24ed8730d5dcc52c229380e1a18216f209d4
-
Filesize
135B
MD54055ba4ebd5546fb6306d6a3151a236a
SHA1609a989f14f8ee9ed9bffbd6ddba3214fd0d0109
SHA256cb929ae2d466e597ecc4f588ba22faf68f7cfc204b3986819c85ac608d6f82b5
SHA51258d39f7ae0dafd067c6dba34c686506c1718112ad5af8a255eb9a7d6ec0edca318b557565f5914c5140eb9d1b6e2ffbb08c9d596f43e7a79fdb4ef95457bf29a
-
Filesize
79KB
MD59ba80f5b356de8ddd451b5376a856764
SHA176b274de0ebe25b21670c8a69eff58d320bdad44
SHA2565ec05767d6bc422b2e76595e6547d8fdd6a25aa67c7a9ed1b2d98018bb180f17
SHA5126f0e14ac4f084fd0a9b2536455a51d3df29b2d9991d655b3c53dbc961f0146784e1ead45bdd4ea90cf86a55390bd68e5558a5b38792d8aea51752c22e2c76b59
-
Filesize
40B
MD5186ccc6761714f7e88de1fff069b95fb
SHA1c7dec1fff5e2f359cccf94875265f96757865b34
SHA256abb5c7113a03fa5d3a4d6d25007f875d5189c85054252a03a3c9d2cc64a5f59e
SHA5125f346abd0068d56df1bc7236a8f8ae6e0397cd35c7e8a6554f90724bc4936ed6a1f127aef797391d34ab458ba9ff3337bade05334155aae7473e6c463b0499c9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5d7ff4a4-550c-4cc0-8a93-27dc236509c1.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD5f3f0eae0c602ecfed30f431dc3880958
SHA18fc18b85bef220a72c60c0ad87507a8804f40dbf
SHA2568599fab3a927f804a82de9d0229b695f7f6c9b17bfb2bbddc369932b10d0db6a
SHA512e5cd1adf1b18fa23da2f50e7fdfc0f6b2daa75b1ca292c2ee7fddefe5a58e270f49ae926d20f27936464af5bbb1e11a0402f13d0b47a1502aa3667172ec79875
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
192B
MD560e84b1f136cad1c587851d091f72f25
SHA108a388b4ebd880ad7797f90bcfcd9b91e7ad0a05
SHA2569d831ebb044c8d0071847ca6822ad23d22aa6545a0aeec329716845fc56846ec
SHA512a0c93b078a408b7a7a685fcb6634ebaeb403bc57c6dfdbb2ba9ec8c809c7341554851cb30cdec82deb81de502a8fa73dde5e930ccc188cdfc5503f33f78adeff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD54406d20888ef3b6accc49acb3facd1fc
SHA12330e2b47477eca9eaa8606bf995880ffe82f2d8
SHA25645ea6c2f1a1d6609d62ef18c55f7133d84459c417584e4e7c4722a23b78d37f4
SHA512819b1e3a6ec55e0aedb5c07346b26be1e1b2b3550370642a0a2174bc5ca57acdde19dc3bd83730bb2bccc2ff08afd1fedbc7b200eb2c45a7f7b14274b20581bf
-
Filesize
1KB
MD560cb756bda164c5321bd242beda26722
SHA1abbe632861552700eaab3c86ab93ff9040ff141b
SHA256f776a3bfef7601036a2b7ec6f8d6493832f1db714509c0700f6fe22963beddb9
SHA5127614045f5037b7a1ea060d06425cd40efddea9c0f179032173892be97ba46d300adf071a48f3f70a98aa32f14bc5559a8422b3f3591f9ff52ea812671ef78cd5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD56547fd56c885c424c1bf2c63284f3bb2
SHA16ec461669796ff8bfd33b968e54a2a22ba276215
SHA256b6dec62aefd3b5709f6dee3fdccc2245d647febd554783686235d75ede5f89e0
SHA512ef0d14596fe35f25cbb359eeadd05806d7d72e8e917cf294565854621779910358f5361ef511804f1d9e0ed293e56469528b4f6086247382d44bf5b0c2c44449
-
Filesize
354B
MD51a044e1a5831e7f918c27320d59b5985
SHA1ebca2d81f1be6d772ecd36e7ceaf9190645e70e8
SHA256f97d559403d94f0faca22e275c14969ce5cbd90d4cbc9255b5f7464a01a004fb
SHA51221c4166a42ae9d423ef7bf37d8187be2ff74e0e8af500be2163f5d6c72bb0c1c0fa75fab69b263e6fbf2f757ba9b4ac6a64320147a8c0cf5c8641df266163d1c
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
9KB
MD5d532797b4ddee448add882297b0b9a6d
SHA1e5731d915cd7a52112a84ded5cc16452b7598deb
SHA256474d570aafba4b32d7ae77b121029aeccd877be345b37d401aeb7482f83b3f3a
SHA5121d6eef0b9eed9ce797e4d033ce69d80613c872c547da71f2bd398840e0ce9300ac2e841d1b093260d99e226f3cf01edf06116fbd036999eb7028b34c9eb6beb3
-
Filesize
8KB
MD594f49aa04a48ccc2b0214ef91f26d23b
SHA18a7cb91ec94a0f8db638201d6def63dbf09e7411
SHA2562112aadc55e0297af94d220ae4f74f6149181fde108a77d7eb3272d635b5461d
SHA5128302ec8aa2ff6a8f3b5c634ef43929037ab81bfbdbbcb6c91368aed110e5c3d595d74bfcb4fb6f21caee7bc0a2d89eeba0f98a6a259043c04912a51eed24b987
-
Filesize
15KB
MD532bc32608a785c91c831edb0c0c1d9f1
SHA1c414cac013088b564a2ad7c08b5c8e2f8383a2bd
SHA2562842a23c9b07b33461be4a3d61dac9e1f33ed30b99eb7c63b34a6119219c3e86
SHA51265f4ae19be61a834f0f816f3cb8154fdf5da9ec7428be40ae468d3170d516f7fdbc5eeb1b721131f3ea45168c15d09c2d22419c912a16f486244c30ef8fefb3f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD57f7baaccde421c04911a7da335245e66
SHA13cb0dc147caa1b335cc843fed6bc3e06303600c1
SHA2565f1efd2b902d3476f68406476fa2795a6fd6d9c7e5620b4a4145084395d134bc
SHA5127ec4ac192ef4fc3a82030e384cb33ae59f2423f3ed0bfa0107619164fb427bd195ddf7ca7b1a257c677273359a99e4694ab0c164e7b6c0ac1e0d2f4741ec410e
-
Filesize
233KB
MD50ad8fa37727c37e1f332426a1df6a10b
SHA10a4f1d1dd87bca04aea35533e1719e235f41f5bf
SHA25627a8f004cb876f2222eb96672d5887c9290ceb521eefb507f8f8a8a11eba5924
SHA5128723bc06e325028099fd43b86e070660446c338aa818b33820646ea5cb5076732b34aa3f7cd41580a5d133d088c2382ace2cdf32aa2478e43d6359961eb77daf
-
Filesize
116KB
MD5673b43c55b26bc2bae2cbde8176a2527
SHA111200b1caf669058f11a23634df21cc5a6ca8291
SHA256793c657af9551023622444aaabb0c3b8238ca52266cf7ec73fb47d74cff95c1e
SHA51243682de57338439f2030aef8333d8efbbeafd2e266adf00633af1a4722d51d79fdac69af0fdbd578dedb2838e555cedeb6996e814727d2deacdcd72ba8d9f53b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
11KB
MD59f63d6ed2c86c218cdedeb7e97c31e59
SHA1b0e42fcb6b3e5612f2762fe4d322ff526647a7e5
SHA2564b40312a8a7890e308d43921ec3378a9d561a75eb9170ba7e4fd0496bce0133c
SHA5120b4bb7f8f85b32ac96b23dbd42569d7a7c27e5d72cc0355812e19bad2bf19d5b89536e0edd2268878063cf7f6ba04aef5e469f13d4f62aae7b1649d0cff02134
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.7\autofill_bypass_cache_forms.json
Filesize127B
MD522e4cc4c0eb6444f7cae2aa35a707227
SHA186fd42f17be0b1fa10b170cfe18d49930ed35044
SHA256e409a4f42c50d8fc80facaad15b807779658fc97b01c871d0820577dd8f334b7
SHA512a3e41584d8d2dab323a4846321658f759573ba694e877a8e4abb7ec08d30213db509a64bdf1b561491faf9aed5cb31be2481d505f4ef56838e5df6e1e6c820d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.7\edge_autofill_field_data.json
Filesize212KB
MD54a19a53cbbabb95d377b2e3f3468460f
SHA15b7b30aebac31abd636a890c2d5bb23522438fee
SHA2565f3a7426de195d7c991aeabad4886e7dad32ff30bcfb4058745a1accc96a64d3
SHA512713280e28d42431f05fee1a37f019bd84c768dfcf293ca4f80644e2a0f6c1fedbe55d155083f0c980143360025469325d41bc216ac8b7c4354a120fe1df242b1
-
Filesize
508KB
MD5e5f5b3d72ac674462785633ea8335ad1
SHA1ce481cc877b6bbf45f152da3a0b403b3eb112e07
SHA256f18a3cdcacfe17b6f4f9d5660325e102de11b7b9cd6eb547a39dbccee23cf272
SHA5129940eb38a0388f07dc29a2f8d325deb798ab4cf8442293d522f7ac8bbc243ccd65f0c4430fc15fdc7ddfe5893d978aee23f46f64c591e60557df9ab3c2b829f9
-
Filesize
21KB
MD5d246e8dc614619ad838c649e09969503
SHA170b7cf937136e17d8cf325b7212f58cba5975b53
SHA2569dd9fba7c78050b841643e8d12e58ba9cca9084c98039f1ebff13245655652e1
SHA512736933316ee05520e7839db46da466ef94e5624ba61b414452b818b47d18dcd80d3404b750269da04912dde8f23118f6dfc9752c7bdf1afc5e07016d9c055fdb
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD533c736647b3355b11b34afecd49f910c
SHA1058f992b47e7c5f3fbd25a836383ad87e18dec16
SHA256e848f313b7a712d2c6143ed59f93ca03f753c5dc7252feb7b63de991dc75029e
SHA51240dfd354ecb2165f22655cb7230e58f0c0f0c8343368c1af8d91690d6e68e01b9c1fe255a493ed2291b41831117777914370ad4ad40c983b5fb1e5f8a88e1594
-
Filesize
152B
MD5f7efc6992499d246d2a5aeec7fd72d0d
SHA17f5cfb0fdf9a6842002fd99c180fd89037f6909c
SHA25649878b6da135f7e56923f9df275b0caa9b90dc8af6118137db403f416103bcca
SHA512aeb70df17783d3a5bdbae1cc479f36b9059534cf5ede571fea614bcea832a984b417af065e60e3d886dcf16a2c593acc148d259a08dd5750df2a8046b6d1c2ce
-
Filesize
280B
MD5b22a1983552fa798bcbb5c5944e013db
SHA1421d66b13ad99a9f78cc3285cb74aaf63783d604
SHA256ae9590718042db34e1d8f8e6ed17cda4b1a6a681ca3d4f5f0a4a49b7c8f76867
SHA512831e8bb347fcb11b3a756db5fd43489bf0ade4c12c79557e0336a5b0345c590d07c647d63ba18b668a14e98edd89029e288f4ba3a4c068f81424767c3d8c7f2a
-
Filesize
280B
MD588bad1a531b9c2be21b5586d25fee26d
SHA1c059fd7ef3dae4cd35ca876505e28f7652081af3
SHA256512624c33af4df8413e249bf528ce22b9cc5b42cd997cdb82dc0483b91014d21
SHA5124fc6ac0c78dc5efced0de7aaef6887881b81a1ee0e10ba20b5a654246b3f3fae6994552e053784d69b427ae7abf9076f453e000801f908e8f82b69100142ebf9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5f9b561c-bcfa-4e30-8a4c-afd831df4d2f.tmp
Filesize7KB
MD55f2f94c43b4766d3884990d7e1cfd1bf
SHA1f600ce5cd961da20ea13afb5646a8df833918243
SHA256afb326f5775536900379ed996cf9671fcc61e2ae62e0c48e8a761172e43b8705
SHA5122ec8374f89138a7b1c4f43a8d6fe18b88fd7a3cbde861252406c422f1567c1dcaee3c315858f6685225e8285c6707e47e5d1d438169b2fad2c7642b82e078128
-
Filesize
352B
MD5943673818437e8135fced80e0c67dce4
SHA1a8d55a16ff50f52352d70292c3117c41df5c20ea
SHA2567a58b0346d8e68286c91a2444f059fce41ebb817939df2ce632c484378832e51
SHA5125281e6b17c9e269d5456cd13cee25a1f7735564f07550d7f9f438aa8167668600bc0b76dc1ce3f06ef298d08080f5458be089c56c312cf94bd00d0d7a26d890f
-
Filesize
352B
MD52797005904f54571d47fdfff8cffe5d9
SHA18a7710386a040ddf8cc7252ed547da614f5c9148
SHA256d75c474bcaf937fbe7edeea59fd8689b056726508d2873c75c34219294d75349
SHA512b5dec2eb8e448adfa3e47089fc5827ac59f00ef1df953bcb69386ff88d96f89129a791678ed7c567f46dcbf2c8dd21db2b39207f0f07e0bb38612b924cc80c35
-
Filesize
274B
MD567c0c60c2b15f24e4e24452d69c2bac3
SHA16c936fb294cc11f9957a113b10567b2998ea5355
SHA256a1d0564a0ffc41d060fbef1bb9a9d194e680733ec5e7742b92716521d0029acb
SHA51222d222026ffe14a826f50c020179d2eb526852cc7138a48aa818c514f29b38dabc19cd0fa3136386cfc97267a0c35ac2769e3eb9086ec0ba5eb9e3a6c9913d50
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
37KB
MD5d34875fe1c47517f4081a1e2c5bc91f9
SHA1204fed3cda5eea26388e139dd1600682e7665cf6
SHA256aff6fc26fb0c69a279bdf9b32b4d2560cd47039470cca8248534daf8d0876186
SHA512aa164260951708910e1cc3d83c17f2d176427dcbe53e1e13cb539d65317a1750bd1e482850049e9c126aa5e70fbdd72db13d50367b90c8b8b37f01a264ecb148
-
Filesize
20KB
MD54e786ef6de6d058a7ee21d714b5878f8
SHA1a25cf3a4ef2c4208064a295fc00bf84be1557e8d
SHA256fd7a0097dcdb4360e99e3131665aaf1cdddb65f638323d8dcd86832ac1c65b57
SHA51279f32a2fe5204c324bcdfd5b11b3d7423cb8961e61350ef8b1a40390212bb1f2125be11aa9a8761edb2fd4c760a39c9f18394a8bd8bc55148ff2937b4ea67bac
-
Filesize
38KB
MD5084a7c45c750134bc52120929e4adfa2
SHA17caa207a66cb97095da77cb26bc03c05e3e3e3ef
SHA256d897e13540624694573d596496a442f317069973a8bd8f9464b2ee91406fb990
SHA5126aac3796f0435096a86e81ef9bdcd0186ecf74d35a38dbcd9d5c08662fe707c50d015453bf7eef1cbdbade8fca2779aded56bf3a2407a5ae97fb2a6eb1092f2f
-
Filesize
22KB
MD5bc85c721d2cbb8d85e396e8a48ff1559
SHA12bd69bd75fc9217178e67ae829fcb4fd87eac411
SHA2567da0f63bd5f7d984babd0cbc20fda7ea38a66115f7e91702bc66e29845824f52
SHA51244e29b0be6be23a569587bad6a00f277f769d4894029e037e1da59d8a0a49473dbc0724145ed7c20480207c21fda8a84653fd1cfcaf8e2298783f006c0e99824
-
Filesize
18KB
MD52e23d6e099f830cf0b14356b3c3443ce
SHA1027db4ff48118566db039d6b5f574a8ac73002bc
SHA2567238196a5bf79e1b83cacb9ed4a82bf40b32cd789c30ef790e4eac0bbf438885
SHA512165b1de091bfe0dd9deff0f8a3968268113d95edc9fd7a8081b525e0910f4442cfb3b4f5ac58ecfa41991d9dcabe5aa8b69f7f1c77e202cd17dd774931662717
-
Filesize
17KB
MD5aa9d4b0371cd9ae330d7b131493f54c5
SHA1e83c2b6b6f023a6e00d18f0c9ed6b8ae9bab1459
SHA2561ffe9b8b344a25a19f33e5900aadb00e53b8bf1a22210ab66c7b50bbcbea45a1
SHA512337e27650c4b534683c8589dc4787eb9bcfecae020bcb1a507a1530b1fd7562ba8d185157e8af23b06e80cc70136f51bbc0fc0ac63e581e34e410c6d08d398e1
-
Filesize
18KB
MD5551ec1ab5799476429ed57184a6e0502
SHA17bcf188080787adcbcf62dcdad2ffa9ad38e1301
SHA256a26c3b6f6f77a35a297032c0ab11fa2be0a3e3d0091d7d2cf275fd40c84a43c1
SHA512c9f59fa7160d68e2eb1cc8453a770423af23c2ea93a779aca1180111705096760aee976db84155973402731b113e7e4266772d32d1efd3fdd674d2ea0e5bf058
-
Filesize
38KB
MD537573ba0592fdbf40d4d9ed3b5fff664
SHA1f16fcd431a0183c37a39824f2bef24ee4c0dd886
SHA256cf11c85cd2e2ca3ff70c19dcc2b8ffea68ef263577ca3d3206741afcc88ec7bd
SHA512340ba9f194bc8ab2c87152716603676bf3c4c36f6a508ee83c8d6dbfc70b22c8b9e5fe4882c0418cffd3f7c4b383eeaf5d11eaf42c5d11f88dc452c48d6c4afe
-
Filesize
22KB
MD550fee96b020979b5d3b1ef885b1f8d83
SHA1c063d6883c0f8ca599c66847cea88109aba8cb6d
SHA2566f16b4d447c08c895e2ead7983cbe0e615945a76c4ce4a3e54470eae33576464
SHA5121899d6eb265cd53ab6c60d90131a127ca9bdbd3dc741d3eec4c680adcbbb44583d03de4fd6bbabff4e8b08d6c9e10ab6290af1ce2270c87a0496db8980dbef49
-
Filesize
101KB
MD5d9563d31f82d0dc6ace5a3f763651e7b
SHA18ae67dd28a3728ee94a457f74f42d5e39a2069c7
SHA25682cd695b5592f803299b350e6fc244931a3042b5169ff2080cfa54a308f024ff
SHA5128f52d7e7601a4d141ff433018d25fe80a41ac853e6968416303e522c021f0d625261ce740b3e2979a45cd87df2e522a8332e01ef1d1e50fb527606b4775d3e3b
-
Filesize
53KB
MD5cfff8fc00d16fc868cf319409948c243
SHA1b7e2e2a6656c77a19d9819a7d782a981d9e16d44
SHA25651266cbe2741a46507d1bb758669d6de3c2246f650829774f7433bc734688a5a
SHA5129d127abfdf3850998fd0d2fb6bd106b5a40506398eb9c5474933ff5309cdc18c07052592281dbe1f15ea9d6cb245d08ff09873b374777d71bbbc6e0594bde39b
-
Filesize
59KB
MD5b2fd30df44561caba77e306bab6d040d
SHA13aa15b05e9428b20b6072c770db79f097f0558f9
SHA2565d6c32e6ce14a8b55f4eca20d6b324b68f401977e42e858fcb0d14d3bf642a0e
SHA5120c1d2a2680b50189f2582cbc136f64340ed69c140ca376c87d3cd37cb842fe069ffa7fca2dfcf99590a602a073ec8ea033a1fa4c6496f14864b1624fa9a17a07
-
Filesize
88KB
MD576d82c7d8c864c474936304e74ce3f4c
SHA18447bf273d15b973b48937326a90c60baa2903bf
SHA2563329378951655530764aaa1f820b0db86aa0f00834fd7f51a48ad752610d60c8
SHA512a0fc55af7f35ad5f8ac24cea6b9688698909a2e1345460d35e7133142a918d9925fc260e08d0015ec6fa7721fbeae90a4457caa97d6ce01b4ff46109f4cd5a46
-
Filesize
19KB
MD546c65c348f90aa174bfc5f9dbacbc3a1
SHA1f3f1cb408e89e48b14532730632dba27858d2676
SHA2560b36587fac66193c3e84fc32c4edfecf3b9a8717aafea51178f5480239bfa008
SHA512e18be3c74e039ff4297313b12abae8719e26eb852724a46f119121d008a7165e249bc17d17b3275a108e6de14b1bc443a7827589bc4fd46d616de699b8294ada
-
Filesize
19KB
MD52227a244ca78dc817e80e78e42e231d7
SHA156caeba318e983c74838795fb3c4d9ac0fb4b336
SHA256e9d7b93bae57eebd7019ac0f5f82bac734b7ac3534d1fa9bdba6b1fc2f093a24
SHA512624cc23d4a18185ae96941cf8a35d342e048476b0384f0595ec1f273e19163ca49b17b14760628eb9da9a5f5519d4671544669fb08985c4945faf663faf92e12
-
Filesize
47KB
MD555a93dd8c17e1019c87980a74c65cb1b
SHA14b99f1784b2bb2b2cc0e78b88c5d25858ff01c5d
SHA2564925dd477b8abf082cb81e636f8d2c76f34d7864947114fc9f1db0e68b5a9009
SHA512f9ade542c593067dbcd13ed94da1ba17a84782575355396db8fd7c28aa70a3120d0c0a22d3ca3d2f0774c1dcb06b9319e243b36001c618c92e0af25cb9c8e46b
-
Filesize
67KB
MD5fb2f02c107cee2b4f2286d528d23b94e
SHA1d76d6b684b7cfbe340e61734a7c197cc672b1af3
SHA256925dd883d5a2eb44cf1f75e8d71346b98f14c4412a0ea0c350672384a0e83e7a
SHA512be51d371b79f4cc1f860706207d5978d18660bf1dc0ca6706d43ca0375843ec924aa4a8ed44867661a77e3ec85e278c559ab6f6946cba4f43daf3854b838bb82
-
Filesize
62KB
MD5c3c0eb5e044497577bec91b5970f6d30
SHA1d833f81cf21f68d43ba64a6c28892945adc317a6
SHA256eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb
SHA51283d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38
-
Filesize
63KB
MD5710d7637cc7e21b62fd3efe6aba1fd27
SHA18645d6b137064c7b38e10c736724e17787db6cf3
SHA256c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b
SHA51219aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44
-
Filesize
19KB
MD576a3f1e9a452564e0f8dce6c0ee111e8
SHA111c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274
-
Filesize
25KB
MD5cd74fa4f0944963c0908611fed565d9b
SHA1c18033d8679d742e2aab1d6c88c28bd8f8a9e10d
SHA256e432edfafbd52fcdbd59ef74892aa2e2ab19df6647ae723b368fca529066a804
SHA512b526216bdbc73a97db41edbec6fdfd09b7b4ae149d415fb5811dde03ad4b1b0247950abd78fef807ae47674ab1b56ff0b971fa5e305b26bc92dc07871313b750
-
Filesize
103KB
MD5f2dcbb1f3153e72e5f9335a4776bb51d
SHA1fcf76e5002b9aa519906913f3ec493fb7affa3e1
SHA2562be16e2098f1c7f123d123adab5c763061ddd3db74fcdff7e77299267d4bd1bf
SHA5120f9510cd8fe090ccc0ea7c60105b56147cb6f11d9726d1775cdf298c8d131f103b6d0cd71502ca1c72646020a067cd2b9e6fb41d18431a57dc86a8a1688b3afb
-
Filesize
51KB
MD5588ee33c26fe83cb97ca65e3c66b2e87
SHA1842429b803132c3e7827af42fe4dc7a66e736b37
SHA256bbc4044fe46acd7ab69d8a4e3db46e7e3ca713b05fa8ecb096ebe9e133bba760
SHA5126f7500b12fc7a9f57c00711af2bc8a7c62973f9a8e37012b88a0726d06063add02077420bc280e7163302d5f3a005ac8796aee97042c40954144d84c26adbd04
-
Filesize
5KB
MD5ef6eee5d00a345bc46546ac7418cbcb1
SHA1863b3f2b79a7d1ac386b9c992b66fd795d75e960
SHA25690185aac9588c540651aadb6c48e878d52f757e014e5bc311da8881f36cd1614
SHA5125c45e72e77a37fe99dc66b70f8fcb0cc19eb604a18d7e34ab6b5ef9f9e66bb1d5a221a979a1b78a71a74d88634781966ecad4ea11f968a4a89186ef2a069cc98
-
Filesize
7KB
MD544fa1db0ff09728626ef0c98cac2926f
SHA1950e60da9c3830448961d1004cfdec0c8fd1e827
SHA2564ba88a67aab60d77c04edb3969edb31cad5073923923d34da3d1db5342b28265
SHA51254d25eed85cdbcff730240f4a57a84ce731253ffded5ed3ae461ff6de68ad938431eab9eb1e66c455835be4c2ff7922725cff36acbb63e883dcf90fc90f4acd5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize10KB
MD57f19b82940a09f37e16da9955882c94b
SHA12bb6796dc6ffd73b557ec04d26193cb78781910d
SHA256e85043972e38ee2c0dc6ba101035e0fd255d405dd7b1b3773ba4fb98a68ea32f
SHA512a1c61b058e8416afbfc7d4d2bfffe13eb19c10b75abb52ba84c4b157395daa966d5e2449269c3eae9bc1c17e8ba27bac6e84740aa732475e0720ad2d2105fb06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize10KB
MD5db003f7589da0d8dd41a440e3fb6e03e
SHA1f791d83b59ef4d019b10a5a29da94506b40452b0
SHA2567030f54cdb6ff838eb8935485761d6643894ad26fb0b61d525615466f8721d65
SHA512b6a6e598f775090988dfe3fd40d0b38fc0a333785b0fc3dbdfcf2d73656aacdbb74485d6068d028938ff992c3b3114571e1649e9fb75c4f51f622b8936622292
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5e09f879502ec733550942b75ff2188ba
SHA1659d29d2ed1681b1dc8491a20b952c3bb24315e1
SHA2569453bdab9ed2eff7a1fe7024b8edb3ea052d34128ac7fbfcb398116ec15f3075
SHA5129f1117ea1ca1dc2e5e8084f8166f3fa5507dc369507d1c642f55d97dbaea6ab3a8f89a5c22664d52946a583622da20b8e4d4bb0445ee6369f1ca01d244ffb707
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD57e293373cfef9b36c4772bbc994cf2f6
SHA196ec2a401021fb7ab1bc636e8d9ed14fb15de7b1
SHA256e29af246e606640f5349a634d85e3f7131461ee02e376287acfc104af96075b7
SHA512f89ab30ff232f9425619948be0f7668b04833edd00100f7471bb9431ba4f50908c35bdba099a1a4c8049d33de19925ea6e8f1e16f89636882621fbd99703cc4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD54eb5cb4e355146fafe1624b5f15979e5
SHA1f6151a186ba09ccae89276ab4973923bd43d5a51
SHA2564c007273714b677d3965e81135a882d36735033b999dd016665a56597a92f37d
SHA512f4ab713eea35ec27b4dcf8d9e7e486a05c5caf9f08a4396a7e94746120f1210c5726d5a3d2c0015c3f0dd844634b03a1f35aa55e0e66d343c27e8c03308ddc44
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize8KB
MD53faa99b6dd2835462314b8b02d8bc324
SHA15e3fb6a78ecd56d5f10a9eb4fab32046a619cdfd
SHA25673960f661a0704ecb08d55d12c7b2a2da04e035a56a757ac030bb912d0512ded
SHA512bb84550a84b8bb32298c1a15d8969151abaa1d618fbfba53f667fc58bb9845ac13c56ac1ad166ab41657fd58a6f7baf38a31883d84f7a613b77746124e54c838
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD58b3570c0a21f100aa41b9e0b8e728cb1
SHA15bb05b7757a90526aae3e115c1a0c9e9eefead97
SHA256665c6218cc05d4b34b5432bd9f80e53b2fb6363f57d73e4781e4ad6719239ce1
SHA512bca63dc65a3eacdd5d344b2fc982747fdf9eb2e667b6deb916c4a10533a85b854620237c984c9dc8c2cf794e369799a1356b00fa9b68af06bf3cfb10b14c58a5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize7KB
MD5d8f27b50d5ec74f74075d0c10a57224e
SHA13c8b4236f4a6c6da907c98caf0b1ff3560774512
SHA256074faef7171185cfdd4abcd44eb134498bb7de5a52659364b8c1a1804b3ec772
SHA512d45f4bfe88c70477559ab923e2dff66242eda6e9404423db5ff29ef43eb135d7d186cc7cc693376d709534c773537052e0a616e7c9144b71b0b681cc5ca15a5b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize11KB
MD571823653a9271fdc55ecbb7132ea35bc
SHA1753a2a533735d7a45c9b02bc2fa08662edfe1d88
SHA2564dd92d547a809ffa7230aa4107d67a550d8fdeb1a468720badde8ab635834294
SHA5120a42b51b68de61db5a137fde5e0ae6043b2b7bd8ad9aec496a72190d8237e241193fd6dfcfe554705daf1693f5f40583acaf335f0e392bbf5236ab1c5fc52cc5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD56538ea70151dfb0a4de34ec449655888
SHA18f5818fb25e125d3853ae619b5567da11fe55b03
SHA2563eba355592c3dee0804741322fd903b03b4f5672aa9f33e7e1b47ddadc455dd1
SHA512ad8c77de9bb84f3b326b700e675ac8d41e0dced5f38cec36c50ef268f84fc3d26cd77e30d422a8a022c5bb0f7ecb6067ecbebccedf450d70506926b77109b1f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\94267ac5-8e39-48f3-b53d-d587b9f7c679.tmp
Filesize2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_US\messages.json
Filesize1KB
MD5578215fbb8c12cb7e6cd73fbd16ec994
SHA19471d71fa6d82ce1863b74e24237ad4fd9477187
SHA256102b586b197ea7d6edfeb874b97f95b05d229ea6a92780ea8544c4ff1e6bc5b1
SHA512e698b1a6a6ed6963182f7d25ac12c6de06c45d14499ddc91e81bdb35474e7ec9071cfebd869b7d129cb2cd127bc1442c75e408e21eb8e5e6906a607a3982b212
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\manifest.json
Filesize2KB
MD535068e2550395a8a3e74558f2f4658da
SHA1bd6620054059bfb7a27a4fff86b9966727f2c2b9
SHA256e2f418c816895e830541f48c0406b9398805e88b61a4ec816244154cd793743c
SHA5124bcb971d7353648abf25aca7a4a4771f62bbb76f8fc13bde886f29826d9314f5101942492004fc719493604d317958b63a95cf5173f8180214f27d6bea303f97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old
Filesize392B
MD59af63d85744b65dcabdd6af53b609253
SHA1ef0d5f063293a51eb442435503feec35d004c57e
SHA2566a1219521556f8723d4b298524cfd327cb8120ca5f90aa757b2cc2f23f3e685b
SHA51260b72393cc2760e3dd4fa6737cc0bf5c63e28b46fed145627ef128126a78cc5d42e2ddb704fe00612a435a13de41aadbcd5096b9c6b86b4baa21058687a053a5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old~RFe5c1a08.TMP
Filesize512B
MD52000fa07bc119543495196b01c57721e
SHA1556e63550c520718e90c004d6b079752777b69a3
SHA2560d6a7b058d98b6abbc15dbbf164db1fb08494c902e51c68ebcbbe555627bf284
SHA512163a02640df5a8bc531d4de8433bd81dc32b2608b1c54f26c8f2a871a34c8a3dc03cf4a3254581e3a217304839fca43ed5dff9b9809055e60ef8c08d8a1d7295
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\JumpListIconsRecentClosed\120d1ec2-5c57-4436-89b8-91013069a426.tmp
Filesize25KB
MD5d3b8622951f35662a60ac0f0a7fda8e8
SHA1af582290b91babc464d7327590327c3be918ce80
SHA256de8325e94a30af2c546b4cea74a1d37390273b69d01362e540e1215aab3b71b2
SHA5122009272622714b125984dcb6f10f5b08d262a0dc78cca5fc1583d00a408f5a2619c34074cc898f9ce97b2314061f822cba0172925b5a0f815bb78c39b3120ad3
-
Filesize
979B
MD58d703dcd93ef19e18cf86ac4b572ff59
SHA16f17fd02c4e0bf478230a80a6ac9ed4697f097cd
SHA256713e01bc5c0f8316426807976dea9456714e166a06e066b1ce6dc8e137298720
SHA5120f57f5a5136ed7c2b77c7e4e86bc2ef653f7ec3476c1d771abd35f14eb971329dce1c1c28a46ec89d0fefbaf8a442689eac86e7d006f838ab035faf50658b160
-
Filesize
1KB
MD576deb35779dfc198078bb61a1937fca6
SHA1d3c0af354e27fb0d2ffee46ca411e5ebad758707
SHA25641a965862c4a526eb3197354b855a8024f233731d1d39b46dc442b3beb43c864
SHA512f7ee1df3af274be85e857cfeebda20977004cc2b6b4bc8c2186b44bb3c69c1f0e7b33f6dcd85df06a45d8f10066284d647c94993b59767bb896606376be1f693
-
Filesize
2KB
MD562bdc29d3f273839545f1d4e6f720560
SHA165fcc6c1300ea02514f2d593257812d9cbf416b6
SHA256a50da47e0372b7655ab9ee85370e561ba31a5cdf58ca59b063fe5f67fd9f9f68
SHA512adda8887524c4d5c26cc7b5298b7c3be3922c98bc9599131a428249e439010c2b15198115125eec816bc96204a55b1f29a648fb78ac44e606cd818f18aa6a508
-
Filesize
3KB
MD59df86e98295d40abb462cc3b35b2db4d
SHA109dde8e216846b2a458ba2ff70ef32256249778d
SHA2566cf41ec18721ae428fe295e93940031d70343bb6e3774585924b7029a9ca8e9d
SHA5122a1e8a1bf66843506ebe1606e18d190a0dd24435ac35df04509491e9266e556ea81a8b6ae0f2aa34d326c9f4a24a44f7fba9429756c4f3fbc4b528f97249479d
-
Filesize
4KB
MD5f4faafa502a1ffbddb6556e95a7e53b3
SHA17f2dc0301085483c1840ce0e07ecce724a26c32e
SHA256c4d58556d3ea9f9bdc0723c005ce5eb5cc38fc316799f0411731f2210f60d50a
SHA512761371fa8236970a06a8c83ba315fd961822c0f57044d134226dc082e76b6a4b9904fc1845f5a2cb445eab4e4a56eb9bb418758e095405b61ab4e54ae9574aa8
-
Filesize
3KB
MD507f3ded09b71838ec02a828cbfccfd3f
SHA1e3a683c13191ab486b8af821c9e4181a92bb0dce
SHA256f755ae5aabb7b800bdb5456eb90f71d4f9b2f4f2240827977710550a7e1b18ea
SHA51217dfb5ef072d1ae028ccadf609684d5c73a6e23310d8be19c6cba18964057a345256212686d499b01ea850dedca553929a2b68566db1ecdc5b3640ad2d3c9f5d
-
Filesize
3KB
MD50c2b2230474b59cf02d2a600675b20bf
SHA12a2f1936ae5ea20397510787f64e35e4eeb05a78
SHA2568a3a233c57af4d45376b3afb94be08591235bcc93cc6a3489c0df55b8bb82807
SHA5123b72c3eca8ce7035c397f1a0bce8fe584d968d69e0313f485018ee27e07ad5678a60eadf087931c6709bc034d90c96c5bd8fa16e75fdb4f653a890d5db08df4a
-
Filesize
4KB
MD5b3f1e3b2e9336c566335040bfc8fb051
SHA11f1ece97a814047b6cc9867a5e08435fc5ca15fb
SHA2567c86897519ba72c951ed83a36718a881f6b48d2dbd673c3bbd3b54b055d39007
SHA512daaa9da6e8b4395c169f2f7b2f54cd630876e477e53de92b3d3a3f6c93f61388149d38e57c9b8e1016f1e67e14c54d148a74e10823fb5536dc47ea0a03cf6c05
-
Filesize
4KB
MD598a4d0680031f9461b1cdfb9e5a02f6b
SHA18bdc57c62c432b29bbf0456c164017dafa3e5043
SHA2565ef44ae13cab14bcb098f8e1958c3f99af29f1bd60ecbd1914b2c83adc9c35c0
SHA5128b2a14fde2223c75c077c2d64a6ae475ef54daa2c03bfd8b69bc59758b6b5dc89ae86442216d79f4c8be651210947d6baf041c03e348e53a52e00de479fa4504
-
Filesize
4KB
MD564e0e178abac9f84ba85b5aa936954b9
SHA1aed85cc8526cad796e06d32e8bcfddc0f5faf0f1
SHA2564b1d4ee80878c7898cecfcb68b285f2fae1dc061f4148d0a8f380d057cdeb552
SHA51253edd11b6fa3087bbe999466500a4c5fa3a7356c27415e7b109fc1cbe17c8cacacc8e5b282b5389b4b54ccebd888f3a757290b6bed8d376029fe270dc66d8af6
-
Filesize
4KB
MD5819da74eafb5be7c41b9e221677e6ce2
SHA119d8e465049883d4fd4c135768ba924e109977aa
SHA256d6aec5f2e79f1fb945858570fab43288b9a8ff1cd4dd07f7054b935cdb2eea41
SHA512047f6d0e7d4a1672c2b2f02136e99614f07c88339801e4e5d604dec393363bb5ecf9b8dc47a6d317effc5ef13ad8b3baa0e35f3ef869f625c917fc471c72e90b
-
Filesize
3KB
MD5acc22ef712b35b3065879730c0c18e04
SHA18c985290172ad1793a591aaa962acd26ac2c7165
SHA256a3082ae3a0dd53ca948979b675a01721e6311d040a014d01f91b59d19e0f3952
SHA512287265f6cb36afb2ed618b62acd503aeed952370dd2bcffe78b9b20aa0ef1e438173b762b9bddbe579a4d133f88115f42c90376bd73cfc11d92ff1e3d792dd39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\1a4c606c-e0e2-4f90-89ca-97ed3c3c44d0.tmp
Filesize6KB
MD55df52c8395aef5ee9de8eb135e0c0606
SHA1ed8bfc8dfd4eeecdf34bb82e34f5344fa859e658
SHA256fce3d05ee3957ae33634f88d698213e3a8c051bc48b11c327bdb5a43eafe4a04
SHA5127bfb11405ffde60025fd00274affc557408627e060a3a0e4ef998953f985e10fe291e4434f1d55efa67576e288f32ce98e0291c574cace4834dff198b2676ae6
-
Filesize
5KB
MD575b1292a705aa7a08c90082d8991f03c
SHA143036a7faf52d0c8d70b5dcfc33677b2cc5dfa74
SHA2567ba9a48a512b5e73613c6cc09957059d2fab75f3c5105287f08e47c89eec8abd
SHA51289ca86b03ba1ba86886efed938f7557815232d54ca2086d7a34db899d850e9cb510fdec0789de6cc591dc4524aa9bee97dab6a367cdce559697288a5dcbdfa07
-
Filesize
3KB
MD59297aca2801eb21beb2740847a95ceed
SHA1b5da9c11ca9050dcc15468af38bfb45892f9c6df
SHA256f0d8188d49125c59d4a5f786b912bf00861c174b38bc45a36c1872a6f4f052f3
SHA5120b67a56b6710a79827856569f584e94b4fd75f1b8c442e39a13d4341a1c3144ae8d8eb8c551fce0ff8d140bbd8231ebdf24b0ee1a5ce4a11c35bbf0b3a86cbf9
-
Filesize
3KB
MD5513d63269e7642625a300f89cc3540ba
SHA1ff608a715c2219ba527fc9632704b65001c55be4
SHA2567349e0ad052dab8ec53d8b644767339f6ca96909411ae33c8ef65469f7c2c33a
SHA512e9251364f62e9168f50e6fe900d69a6180dd7f2ac16af400ff69860c977f4504899935af38d9ed2ea1cfee99c55ac101ef4f6df9b71f3b419ffe4399ff89dda0
-
Filesize
5KB
MD574eb46739718090e3bae96229ab5a88a
SHA12f460f761a5f332b25c0a16773970c543b8f67e2
SHA25612065e5c6d9e720b4fe5f601052e28062755c511aeff498c79917d7504476c12
SHA512de164d0fd34b1350dd5ba81cea50a28e8ce7bee5c9797b560e4ec90f5c2692a4fa30b2d40dc464ae419b443cca8f0b1feec796749fb71a4139c978d3f43d1fa1
-
Filesize
5KB
MD54ef61553b198933ec9daa8ab87325dda
SHA142b19e09fedd288df8dfd5b8f2075d3a64086fa4
SHA25644e008f77e0dd111b4e52553b1d86388913f42fb41a3ce1483a6a3463ff51ae9
SHA512e49feb7b984e72a0675c46fc2627e19617572c7e0a0b8733a6f63e287e3e03f49b0b14a3c631eabb104cde1da444662c5437a57267183e9ed17d5196b76dbe4b
-
Filesize
5KB
MD513b5a0f0d5a4c2ac270dbb1391b70e89
SHA1e5903925363afd5840e40dc8c091246bf7ffc0e8
SHA2563d6e572ea3c5a368f2e5c8f907f881d7f610f2e1c6b6e74c1ef294808056247b
SHA512ffe566728cb725bae39bf30a9ef00af6ff9dbd9150b68c3185e667a5f9567efdf399a2c5824adc8ac0bba5639743147e84d76154deae41ae6badbaae09239ee4
-
Filesize
211B
MD52f49f355863ef1ddd00c7c856b1a6ab2
SHA1a717c5cb3ae03ecef143a01b79e290a7f9681d6a
SHA256013cc511f1cd1e962fb36120ab08182a59122ca454df8bd99460297bb4c77231
SHA512dd36e0ce28321c97b0cdcc5a62304172c211d00b72bdd72c0665135b705507c59c427fd0fbf5f0080eade1b637625f5248bc93c5ddd9b0028cbc4cd0cd0f0a89
-
Filesize
211B
MD5cb43802e2a2be8e86f86baa8738b5fad
SHA18460e7131a301a18b6c3919a991307ee941a51d6
SHA256ae06808e3762cd393c8fff1b8f92ee6827170beb028c6b92af04a29729f3a7b6
SHA512e14e7a87af4c6a3404d891af113421cacec99ff2c87aea33be43ec396329f421f86ad6289a29d85b34db8b1e538c52941a9a6d30073ac2f1a4d8e76a5b8655a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries~RFe6cbb4b.TMP
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
6KB
MD529f581967b69356782871d4012242c95
SHA19a45aeb719c6221b80798869ef30d027f2c292b0
SHA256fd9ae2d7669cff1c0c704281cadf36f05eb8b5c32ae5878c49fbf9f262dbe59b
SHA51206c6e8bb0f52e9a9fb3a050b858e21af7f611d4ccd6111bb799bc3cc58e65e2932602eede7352509fe1fb0674a2e1f72ddb88dd6f4b221f02a1fbd0300ed9d53
-
Filesize
6KB
MD5aea1ed46e4567722647e9e29ebe9ec18
SHA126d56ed9df568ad459f6f362b6086128a7c20b9f
SHA256b75f2d9dde657b33ab8f69140e6ca9aec8c28c5fee2b388f658490e436b8aff9
SHA5121712c53fcf9b68011a05a8d0d8635ee5329bc89584d207adedcd909724b904a5f4c6e5f179832ef24d9f502bb270d9f53d042d8f53192de3c79e1b8f8568fca3
-
Filesize
6KB
MD50b0045aa80cfc56d97073089395362e7
SHA195e0d48a488452974c781da8b268c3250d32c7ab
SHA25678e024df2ee5dc9a43ab1180c01ae905ebd522e2c80b21d373823d5ed445e49d
SHA5125d80f9505485b5f4763adecf44de281c45f411742a436e21a4019c7e171754c33a972985a6066406ad39759a667797d0efe99f12e0fe65870b91453f2c72a512
-
Filesize
6KB
MD58d61314d177d64e1250d6ef2c9e718a0
SHA15e6d4d587a54210f9e3998f8fa22c2239892b876
SHA256b3f4b0a2407a81277d8b3f3bd108c6c3fe14133f3b5a0fd6a513b007e8306c5b
SHA51225c2a64fabd9aea8492e7689c88af3b7886d38c2de02f3019c47393783cd205f64d4166b216a8387ac0e511a08bad252fdda4971750b408435d646dd09550362
-
Filesize
6KB
MD5db3eb7d0607ed4e829f883bd7d63690d
SHA17fe517fc8a34df21b65b93e1ed9e5b4ffe7602ff
SHA256297cbd76fd7f9cd9a3c2e46b8f5b10cd1ab56795b752346b77cd258e6f3907b1
SHA51240cf9867f94d20c9d7cf69b2917184a7c1b4558bda92870c95b0db106b6c8120dcb091d2575ae086e52d018c55c4c980f8a3ed2244fa8eef465cb7bbd7985d09
-
Filesize
7KB
MD59a2db1c753a47bcaa1e9d957cfe5cba0
SHA164e020d009029ef6eb3b6388b36982ecf84104d5
SHA2563c4abc51a1b09104887f8e82041c5d9f8e8aeb74b2728621b881d6df7d54aa28
SHA512943f1de048372c974f1a4c1bcb54f14c9fc5fce477a36119268993117e2994c91f97dd1e1fb1b6ee2b2bff5d178ae14ec63a71fa361f8442551796c586b7e943
-
Filesize
20KB
MD54822288ba2e3c112072b513f5c738d43
SHA1d1b15b613e355e2c302548f71dc6e249f8a03db5
SHA2563dfe9b2ca6fb9ea9e838fba7a921a766d3008cfa90193b328b5baf095ee3575e
SHA512a9f7eba6db44a7ea5fb149d79578e4b930b631bbdb1011eab0302d164325e100d847dad2355fb03cd837df4ec3df5d11e2a26cb1789ac8a382f4dc8e7afecdf0
-
Filesize
6KB
MD5be728d629eccae5eee4b6501045217f6
SHA18d727b6b913653b67df40bdea722b6482eef51a6
SHA256c88ad7025a23605cf71bf14c363f850847df601697833c6cc05fd0daeefcb41b
SHA51280c19de752fe5ef02003c57b64551cd60e8433112dba1644a3468831ed95aaee1e333c2d6a7382ec702f6d5af29b37e79d40f8e7d237794aead295208cad4cfd
-
Filesize
19KB
MD522561e39e4320a5e1845ee25fd01c7c7
SHA1c2bff79c1ed7842d3285e3d80b636a600ad1e351
SHA256d466c10e7bf003b7115924f203e996b47d7a510c76887be0b941bfb0264ceb6d
SHA5126fecbc5fb193bae18f285cfa988d6c2399fc6344af0ffccde2e287228822b5451ac5f171880aebcde3a99156a6d4386647f4291101753d2c8feb542aa88b57f0
-
Filesize
7KB
MD58b98d091c4c7a33eb8c398e61cbb008b
SHA16699356fca8e92a90e679d535b47c0603cf8385c
SHA256a28c17dffd262c5134b0e75f1007393eb07fb897562f0e0d2361fe3cba831157
SHA512bc3850617b69a31ce0cbd561e09e3d1ee4f54e8e916af5a05059f33c939746bb360ed7b40d8fd24399ef8a58b425d894a17f62d5bcc02080bcc291ad91eca4b7
-
Filesize
20KB
MD5b69c2cffe2ad826149c9c042dd514e9c
SHA1ebc7b72f8556db1b079c1b6979ac058cc79f0c57
SHA2562314ea58eaf2b2fbb10c22db33f4c22e26c6d47fbfbf5ed176100dc759993d1b
SHA51236dbbd35ebaf32f78802797192fe71f885fe6f9779c565ca7f749187e270bd1c9e4310ab5c24f8504bbe50010d4a79cf5b079341e63fd6f402de7f700f422a47
-
Filesize
7KB
MD5f7400d81ebf06127dfd4db80c135a0a3
SHA11d04873c59b533ad65249d8cb5dbec677b9a18f2
SHA2564a7446a82ef267bdd6f4ab0b7685b9d9d66a81422492b098ad3539558721e421
SHA512a718a0a2bfd604a3ee8278b6adabc806b718538a7c937a7c6bd26e4c7ed8c037fa4fbb18367d32fdb38f6afc8a13ea26e5164c5d4b165787278065e555ac0279
-
Filesize
7KB
MD5fc10d839c96358f3653c6e6d53e4ec81
SHA15aa91eb4a36e2039b89d18b1c20501e057dfb717
SHA25688ab4faf2c8e33afc0206c1cb24720bae36b190ed81416faab4d5e64496aeb30
SHA5128f19ee3b0e860ef4f717bdee2e9703a0f0a7485a7a8c93c8984b065daa2d952f1c24bc7ecea5eae28fc999c1545a1a78d17bfde5424c397298d8062667cb1660
-
Filesize
19KB
MD5d3f92e8682926f7386956716f8819ecd
SHA15ce20edb3e4c5997b371652c1db994d3f418412f
SHA256f9cb44b234dacd13ca9ac405a4df27f1e387480a745c30932a95e17a39ee456d
SHA512b1b48a03a7eca9fa368c559bb4b79761e8956979ce2ab100bc31a1297fe79982d516a83d271beb7b05b9bb6f73d10d355a0e4f27d0caf2dd687e2d0345770340
-
Filesize
7KB
MD58811c80a55eab036f7fca970c9551c82
SHA1b3d43c8857a770a75bbf6e12a702cf1cab122d96
SHA256712d40511e51c6ba279a9032e4c1f32a6b40bc57fe74d3e752b7e97d25df2b8a
SHA512ba1babb3ac86c27f7cfde749eda3edc54e4ca9864fdfed383e4f56d9c291c27a0d3bf3477baedf6f912dab9e9167b8b03c1f5b065b45db4f5164cff5e6678fe0
-
Filesize
7KB
MD5ffc072451a8213d9ace7d94cbfa6d670
SHA1cad46fa1f4e69a79fc24d698c58a75f0129038bb
SHA2567b750db264811a318335d458c3945e6855637a0c5c95d20fcc90ff9dd8ae4fc3
SHA5122e8bbf108d7d755c97c05c558981fbcd19ff842e030743c76daff5161d0821936e75df70d4877c18f0177de36994955348e2dfe7088acada10f6f0c0aefc4986
-
Filesize
7KB
MD56971400dfa3ca470497779f004810751
SHA105bb7e1cada297fbb4539f611d7a95f55ea2d82e
SHA2561842ce12033c9487ed0da335ccd6c383319876d710d762af99a266f1863b78a5
SHA512656ccb65db947eb91f4bb053b49a3a91b9ba641a4d221537185900399747ddf90b98b2a8d59a50b09df03c1d5a0f3f11cebeb80d0d3bef78e110f56b5196a1ac
-
Filesize
7KB
MD53767ab755a4d21bcea7a62dffa13e968
SHA183e35b0f573e7e320f7f34e3fe7af81bab6e88b5
SHA256fc8553dcded8aa4819018f8003da8d4c81a189078385544277b1c7e0c9d287cd
SHA51272326f1345c3915ba9d3673df0095a2418dd0f2eee05445b9be2e74d8864a404c625b01c1fa23ba9822b9b28dfdfafb665fd2221e7878dea51bca8fae96437c8
-
Filesize
7KB
MD54907a3f2a11424073853873dd6ecebd9
SHA1bfb25b6254d43f9badabaea49300904e5c12dd59
SHA2564399e214e3a7bc8407f30e28d27167b561a4e8be00eee9848f788fba5269e04f
SHA5129a837dddb33c42a793450655f86936a1a7e19cdc17bb0f45be3937cf428e767dc6520bdc910cf998767d81c23218309fd84949ad9d3e4b36bbffc3bdeb67c363
-
Filesize
8KB
MD542970413ad6a60146d232f1b81c0c4a0
SHA15d445eee83f6c41f283c2a13a50d70cb0c085bcf
SHA2560be0f0086be565d536b0b5929e287d57d3961f6aefea071b0d64ba170b2685fc
SHA5121652ccfa753bc6f07d478f2610a2053843d9fe5244d4927399680829642f8c4878351d11a84d528ac7c59e9d1d5a6182f15d9fba3bd629930cc393eedad1baac
-
Filesize
8KB
MD5cd7364a7fc3cccc7ab2c7296b101b237
SHA17a669189dd6b723f08bbd9235d6c5cd95d2d09fe
SHA256cb8649e7c681926da7a9b705f1030588acdeb4c55f4fb285b0290f0c7da5a05a
SHA5122098d3a364b18e819bb7fe507f0c737c3bf7a890548ef6cbee7a8f4bf8c6a46e8e2ebeecce202864a2983a4d216490ad02216d87c229ddddf3c9fe28fed14a4b
-
Filesize
276KB
MD587630bf91f2f3fa1c33866071e1c56a2
SHA11f18bf3da030e541a6f172bf1b75a98ef5e50b46
SHA2567b7a8e191bc4d5636c3fa0f320a29fedaa89ac2f22ca070a923b7d9f2e8af319
SHA5120fc8f3703d66fe6bd84f51ab1b6f7b9b88b46e336af0867a4f6986e1351a4ba5a9c4bd3e55c72ed9eb76878b61daba75c6ddce0e653435ef199f0919c7f51175
-
Filesize
7KB
MD571273b54c63de46744a594742d04364c
SHA1b7509868ca36d22ed2d54c14256a6c1d16c9559e
SHA256476b523998d450ed6e23ac7ea190a10ab69da6dce8ac7def21a70268bd3641d8
SHA512efe7da9322c35954db90137a9ab9e95d588cd05efb3e71256fc7a364743c423f063c2536f1f078e9a2e59a86be7e83d04d36bad64a212b02b69d3aed0da392d7
-
Filesize
8KB
MD5a9c25a0f67b729308b70d745e520ce63
SHA176277aba820f00c774398666b0e59fcae12e9339
SHA2568707acc46d5c82c71aaff13602e0562bd9203cdd21b469997ad85295404739a6
SHA512a5cba77190f2ed69dd2b2ca9ce6dc03b4ecb60e2901c6248f1e52433a184fe600e3d8a982622d603b2e00fde0a45ad0d31048a1222f6bd7c97567f305164f53a
-
Filesize
7KB
MD54cacf8484bd88b9558e078420d898f97
SHA1c60cb8381bfc68e79d421a150be47cc5c7c98ed3
SHA256c9068383bff1d0813f9b48496ccb7815a0b1e98a332c5f57b4f9d3f83cdb490b
SHA512a73c3550c5327d145d63b62dd8514da330295b7af35cf967ea62f72b0c13199e38efa35b8971fc50c5e792aab343eb68c43283aecb40092dc8d3eb5b994a5845
-
Filesize
8KB
MD52fce77dc955b27fcf2982810d2156bc8
SHA16fd2ad5d643cd3801499c8388fee23ae9989c1b2
SHA256f7a0b471c8cdb7ef13ec9fd8a57e31d3442bdc79b5d0032b6b8a2c99790b4814
SHA512b868feeb92a14d87b43505394a48da0fa9d90254ee4f26942758ba3db1d08caf7ef9d2872cd9da4121742901fc5f811f29d6ada6297ecb13cfa42be6f77a6bec
-
Filesize
5KB
MD5c0575831c530754ac60f4f4fc7c2da44
SHA1b82926ed93690d279b63b950092877ece57b1f2a
SHA256bf375d24c7efe8945c3068c121dbe2338ba7fdc3dc41095929d4b44972fc36d4
SHA512fb2cce9b649420a84cd97e5418fb8bade85635b4e92695f08405b8543432ec02e7262dab63f06531daaae570a80ff111f3201ffe8e307365f5edc3ef55a6957e
-
Filesize
8KB
MD54ea6dd9fa386c3ad8f1989de59768531
SHA17f6a664fe969670ea09395dac6dc3e88c5b5dcaf
SHA25600af865613324646a8c80aec0980a3e99a3c60ede44713116dd3df5cf49994d1
SHA512339a4a5d7cbe9988d723980db94c327cbb111c0f1e302ced78e3ea6703a1ae192f6e13574aabe177c75f5015c662fe682db72f93634c86401440c2ef235b9d4e
-
Filesize
7KB
MD501098cd7483abc8c8ad7a214e669e7f3
SHA1f0432738595f859bdc08817348cd6d17b1927ea8
SHA25602167b6b6231c165c43a9c765bde47bf4fc5b4384d13c485b59ba528cd465642
SHA512b1996e278890fd354aec6b9d0453621b087d1fa77739e404f3634429496b0775ab1770a66ad13237dd0942853b0c694f308c45707294de6d1d9b10a01c6f390b
-
Filesize
7KB
MD5069c7990083be366c5ad69210a483e0f
SHA1814d00e4f66ad5dc3a1606db0a39550c8548d43f
SHA25625b478f0a65fc3ae62f21188185f7ab9d7d40baa8067a05397aabb98ff3b493a
SHA512ce1eef6e6f6a8c4bf50d94aa4e47d4e2ad0bae665e630205fb462d205e74424add9cf46e740d82b60adb0f5a007f4984213f4bfbaf3df165a52410e599343895
-
Filesize
7KB
MD56a3bb1721ec83b962e0a1142630881be
SHA1c472722966b70dca08c76b6219da6ac4ccbbad4f
SHA25659e187ec44ed252d9ea1b7404f38c34171d329688a225870b069e319ea41392d
SHA512a183409fa8d1f20f5afc4999c6ae3e0b7d8bfc7771897845bbe7fa59138a3b3bb15adad352b50f171850e400dc256f5e7c818c9145233ca33fbaf6f21f53cc28
-
Filesize
6KB
MD5361765af252ccb9477e5252cbb35481c
SHA10079728a7ad4b19152faedf190535a6606e13d7a
SHA256d3fb3fce03257250ba4a8c2cc442bef33b4d0d0381c733c835e94872f6aa2850
SHA5124f4f4ec4ed6032343c0025d0332acaefa20078a38bbe37b1faedd83a1767f1e72cb552b35120b0cc7d42fbaf76926e0632fbd2be350478ef31af1ad7674fe274
-
Filesize
36KB
MD5e96a765a1e1c13b63a88e008f3e81399
SHA1b2112267cec0662533f2715733a026aa573ad60c
SHA256fb109ea03453cf05216451e4c359f61d8988dcc1cd921696d152aee08351e474
SHA5128f665d661d0b3f6776b1f52659dfa936f4f45e25b8d2dc8a099fa0dbbc6381e02bb689a8cc0249f98f51a4beb684f2ee6c09a32432e7b718477249670c3974de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\841407c3-2b64-4e58-b7e9-8c616387564f\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\841407c3-2b64-4e58-b7e9-8c616387564f\index-dir\the-real-index
Filesize2KB
MD519cb3a0c2e24e4f4a72090ba6b5fbb81
SHA12d25fe7d5a985e28ed838644599bd52a28e488c4
SHA256761eace627ce1f29f055d87749cab98a9406c04de13c02967e896fd8336b5485
SHA512d76ff49a2c7a3a3757ee5829940fccfd771df2b60893352803d6dbe13cd9aee774b35d313c6c8c32076cb378ab4562777c4c3531dbad95964d790f3a63be06d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\841407c3-2b64-4e58-b7e9-8c616387564f\index-dir\the-real-index~RFe697bfe.TMP
Filesize48B
MD5cae11df79cfd5dcf5578d429af4d8d47
SHA1c8060d5b04a8e34058f4e0526e75c9a121cfa7d8
SHA2566e91d22a16591514eae0723057ffaf9950b34ba14e4ae7eed50b5ce92d93f1b3
SHA51212fb34fa92d94b5a260f7ac06a852268a4d98fee440d2e5e70ea07e9eed61d47e4205a02ec1941877742d73d438b3040121cf06a4f47b79c2984e7ba8723b2af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\9960805d-0cc7-4c7f-95cd-91bbb3daceac\index-dir\the-real-index
Filesize72B
MD5e6bd78bc638d1b4a69f3b7d35bba7d1c
SHA12ba9682c45f339f07a63241232ad73cbe8749ed1
SHA2560f2f6d334e558d8acb4fed2ad70003f23b87fddd801283195a4b74d18819f67d
SHA5127ab91c041d9ea434f44d1b878a88a37205d2d5f6059204a3943b3615943c808a8c2e1840c08cb7e2d0ea29ce090f0d88693ba5dfdf37e06ae30e3083dd6a68f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\9960805d-0cc7-4c7f-95cd-91bbb3daceac\index-dir\the-real-index~RFe695f7e.TMP
Filesize48B
MD50f3086314da4a195ce676094e4467a11
SHA198b80cd47923427b56965c1386aadfde06148a5a
SHA256aacb664a221d5d4a5e1d99fb84411be1aa87840590aff6a99bad37b77badfa92
SHA5125c79567676334ccd70b01f01e4db594f70faee7cf62c0c49064cf9de11b46fe14120ee7948afc662540a87fd4562a6a6777436766bdb806ac8f0a810fd3589ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize253B
MD5c75c808b1ba1e4365d06a918bf99c46e
SHA1ccc509309392c97c21e3742143a84cdc81150f58
SHA2565f584ef1e01cd1412a4dc4f06341f3b4ab4e2a1b0e1b34162c0adf18674ad341
SHA51262e48b14ac3672aa1624b081636a6c36be4aed47588e31efd73fad73a1e75e2ffb17420cff67d77b989557cf4850e9f2e42e7855b0e539f451f907724251a4c7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize192B
MD5cc99e5c60a34951abc2009408b768809
SHA17489e6f46615e46f4f1931d183c364af0209e458
SHA25624e3ade26b8ee3f721857cc9c6f1f81d339bd421e546cbe4bdefde0fea600505
SHA51240d327b498fd9c280cd1bacf231e337eea49a2d7fb2ce3ade6bef8a76c4d8e71a1cfb68a21d0bb4828589090b58ef5b67700400e4959740ccdbfb438cd361d28
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize257B
MD524c07b28184cad94b62ede405060ddd2
SHA196cfd9734eaf04d015eb8e1ee079e78fe05aa509
SHA256e0353bd9aac2c138f5ffa21baee237c678d6e90bf63c330c1df97bd2a3fdf283
SHA512cb787fcac8b684697ff42aeede4c43f885cb13380c5bd024c9c4049505f645d559ac199ea59021f3b47bf6e89630ad82a7b173df2406f6b1396b958130c8953a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt~RFe691025.TMP
Filesize119B
MD543662cd1c5b9ce53818e174367bd93a5
SHA116e4a6035f635ff8fe554f766ac55e4b795e48e1
SHA2568423c8b8aece84a3a4a49b4344204b80788c402eb2b5952ba20a725df90950b3
SHA512ede0d9a07280f4c0f413941dcbf13c2270337d29df07034f5ac004f9c5d061499d381d3ffbe46a9785cc27fdb0e2840c9b7a98f15aaa397e7cba2673b02d87e3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55f24ae89bd4fabfe48671b31ebdff0a0
SHA176934861e7c717af08a20090f9c86404c0d4a3c3
SHA2565d4d2cbb09b603e784c972f6f1a39a2bd4a86c39195067d5d01bcae88c470c1b
SHA512e59f116955f04947e181e4a436d163063093c3db6b291d183a0e344b9d4b0da91bcb02b92909b5999afeefe8d43443e34da09b09165562e3f85730d52484fb54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe695f10.TMP
Filesize48B
MD5aacfeb4c282ad8fde410461598480a83
SHA1891254127665f05c68e8e847c8ed96bcd55866ac
SHA25608868d237a5aa3fe47413185b4093f799dfa9ba534900683d9245de2ad87a1c3
SHA51277591eb80e05120254ef2978250de378c7c1bb9849e60b313821677730d3556752a2bc12cd3e82903294f08b7100c6e592ba6d5ae3cda1be4f2c9b1df75e446f
-
Filesize
4KB
MD5401d21571dce52036b178e1fc2ab42da
SHA18262b101a19ca6674526c76bc29d4287cfd4897e
SHA256dc49204302804677148a527a6926fea19af518a93162a9b21323dc04e3cf27cd
SHA5128089ee4d4be83ca347e3c388446417ecce52b69e2b09383f0cab7a229fa1c336da74662fe3222e8515b1594392392621b9b2f681b60d28e02e616a6a49c8a45b
-
Filesize
3KB
MD524a23eeef2700e1f76dfca985062edc6
SHA1fecf045a3b6dc97fad0ca3ba945ea99763e040e6
SHA2568f183c4870076f2f6b2cabb3842dadd454db52b86254c35ecbbdb9139e70bce7
SHA51210c0b55303a6663a684e164eaf6f52d2f544819c1067cc2597b65e28abf77f9c61e784e57befc377805bfb5459d46f6aa0adb7f4d1e148555fa14335bc2568db
-
Filesize
2KB
MD51998aecce7ba49c9e9bd32f0a6bc7d45
SHA13042a7cbf3bfde90e4890b4dfbdcb0c01aeaf226
SHA2568ee5c915b15880f9f256627ddb0cc5e87252fe2031f13658e8e7c8e9bd45722d
SHA5121a1b7c4b8af7a5a188ee5642cedb2f79573cc508d11b89354e83fdce827c60f4e90aa22995ea02f05437ad91a3f5f50d5b0408411a01315489ed03c525445f89
-
Filesize
2KB
MD59dccd489d19610b996d0e5ed8bd1b74f
SHA15ab52397112403e316bcfb49b96f79cca825bb70
SHA256f330f4325a802fa9754d1badedccb8234fb74af06fedd9e6081f4a2e8b977f65
SHA512107eb85d4017b73f0062090c4d2f74a645bbf4fe95db8db67daea416246d9731ca4a77ca4d0cdb8f7e91dc9fb3e8585ecd914cc219e904e1ccd19d0ad9a7e774
-
Filesize
3KB
MD5ab62dc3fdb49b073ca34a67632cb708e
SHA15bac79fb3a2cf1bac8b8f16c52bfcfcd64a8796a
SHA256ee2ae3310ff2039b9fc0e623099a5e65a24c0ddf194c3f4559b2ccf00a7fcfc6
SHA51299b5ca0f2238b8f7651c7c10e1fab60c85373b85f3f6aeed251974320abd6e2fa36c3c023db9991466a3af761dfa9c47b719fbf323105a9f2bf9f4a8929b8821
-
Filesize
4KB
MD506eaa59bbc7471770137d8ce7bd06a94
SHA1ffaa66747b3133a731f5f3316fa79e77379fcaca
SHA2568413ab34c5f36c947416c032cd45962eab4abb82a152507d7c65ff5b36c181fa
SHA51241b51ae0471ba8399d23e5c80ce12e9e0703da5e2fb13b82c005ff3a9f0e85eca5f9978f20e226cbee38f47acb9faab8e4f3180466d247441c320ad4efa4bbce
-
Filesize
4KB
MD591334c8b9bcd2ba45ec5344594c36934
SHA105fc9aa8d5d965bd80a160299f4140dc1921fc1e
SHA256f7d220a99ff5355b6f1374457a9ee4b0a32aa4ae3e0b452eb72e81e3f6f0c463
SHA5127d45bb2d6fdf30b2b6a5f2c5414d727c93b1619294cb8a1a6a55dc97b8166b4e769b5db5d0f5861eab1fe967daefa8554036baf59e47d1d43e15e7b0b1259d5d
-
Filesize
3KB
MD50e8134e4988b01488c8a291b399f8c3d
SHA1ce83313cd04748aafc5562e44d0e83fceaea40fb
SHA256df7754365455380188fe5e4aa3ccecf6518f210186c19a4230dca10b1bd48b1a
SHA5122b553980e07a65af774735d8144631e0d28a34435fb2b2a575bae44856c329d33d7c516d2b1cfe9c7ccc5bc18c33ab535007af5a2341f00a6845590fe386ee16
-
Filesize
3KB
MD524892460121b522e9cce5942b147e14b
SHA18e2e1a6e235fb49e35df819c0412152970c4d933
SHA256b1b6cc29821bfb7b1fed9cc991ffeef25c40a1ce385e0dece5543f51f3af60dc
SHA512848f36330c79ab3166fdc000f28bc4cd7c596a7ca114236857cfe6361bdaaf2143160692338d683edcb0841c73bca5883dc8822ef6a1955b1f63a556a5041577
-
Filesize
3KB
MD559407d3b8ed35bcdfd4e4ac554513185
SHA15e57c068fa9e4636cd2700b0afc2cfb0cc5f849d
SHA2567fd23b7361a3e096210a53c8e3b9d7edcf586f04d083d945fb9caf5ba45c864f
SHA51223601ebccd8ca15ac2deca07b025d71f42fdecbad8dc6ce92c914ccd7ba76b689ec1f740bc4d3c0dc7ff798dc6f841b34e20ece90c686716d6c8dec17459ca78
-
Filesize
3KB
MD5ae9b044567739650f1317fc7c880979b
SHA172b9e51a47e312e5a8bfc0faf0832600f642057e
SHA256291c0365ee67fda35ffecdf7b2bda612339d6f6b7dad3e5a947fe8cf40ae8fba
SHA512ba69649f1cdfa8a696bbd2505bdd90032a07c560dda112848ac1d0b110888ed132b343ad28ef241bb155596a4ffc708c4a0e0f5eeb0e962f431366f79591f8d9
-
Filesize
3KB
MD5fb0fb6cfd667783bf200015c2e7cc6c6
SHA1354e59333e0af68d38fb779b66f151e79384f69c
SHA256b914ba584bffb949ef78fb9cf8250320ae1842d7a8c074896dad6929f79777e2
SHA512cca88765ce3e85715d72392d6e51cc67f85147234b0d5efbd12ac7e2d6f7728f6ae17eff44ec3895f2dbd9412652e55009a5152ce49fa1d6aa5b9fe4793fb870
-
Filesize
3KB
MD5a1c7ad3221740c1bbb6c3d9899187e1f
SHA18eeda19f4edb87c4b8bad0ae8f6398c4b0fc4182
SHA256cd74a11aa4dee43672ee216f53459b10703448faa7cbd443da375e444c1a89be
SHA512889509ea0b240e9414d751b05ef29af5914d4b2111c3419630da9d0f2132317e3595c30ca3b483cd434e65d3a64c32f383af63f4d3ae45f0a0159d4880ca06ad
-
Filesize
3KB
MD54dcd1b9d9020b44b0310c2be5ae939d0
SHA1c99f2e469daf9666961a78b4dfd9a20ed12d5487
SHA2566475bc94cd37f74b3953e6d4004aac1a8f5d76ee833613c5343c90b0e1f9efd0
SHA51288e5c7f3ae8d97994a9f4fd8a98e189101295245a3a32d86b55d2183d6d2abff18176b2eb91b3dba8e33ad3e381889db660b219c0aae9ac9f3178156b9876a4d
-
Filesize
4KB
MD55abd602766e114ec2645c3879fac58bb
SHA1e8dfd9c31eb4ebe24a12f88c1efb44c3c19ca672
SHA2561fd02d0f25cc57cef7ae4b0e06501bf17dea2c8c920767b330035f6fc90c3310
SHA51224de94a1de73a4eaddaf315104f068671b397ec834f116ad700b578706c3dce2b680a568d084c1e2deee077b82e4a56478a4df1e8f173cc2975408b16283ee34
-
Filesize
4KB
MD516ed83cff98baa22127f2704ccd04bd2
SHA10f49732da34f5c8b5cfccdf1b143ebf8139a616d
SHA2563ab5ce19b13fc9321ca7277a057f95c30eeb7cb07a47f1dbfa7128e885e0fec8
SHA5124a2371b477cb197827d7848a58a712b5c3ec6998d10db33d994d854e7d209411d03d10eeeec5d02a69549234f352e9635329f1689815568a1fe037fdb9b4230f
-
Filesize
4KB
MD5508a0719353f4102689b48f89f1d98d9
SHA1831a41388d86d513d187c1dfad748f964e3217c1
SHA25613d718b3549f48a1c829a733cd1fd1809bcd2efb0fcc1576d1af88bad85463e0
SHA5120264ad13f4bea5e49805f8d6e56b00ba79a2832f6b30ca6698eaa9bc2b437a6d2944ead592228e800e261c7bfac30a37ed842f4830f510e60ba72f9a15d7d898
-
Filesize
4KB
MD5103c362f6c2f17565d7dc10c0e0f0149
SHA191c6a0bf3c1ef68979b2fa65354d542eed135eb3
SHA2562ad1657ef25d00007c384f9f256219fc89ea2c140c1e06177e12850347b7af93
SHA512a4d41005d0baa2fba1298c8347607f6e7af456ee1d059fb9b7dd298ce47f02f31581ded261bbaf0aeecc32534aa27d19cdcd35c1de06f3147c6a8e4266d4ebf7
-
Filesize
4KB
MD54903b6cedfacc2bd902bee0128c12025
SHA1f483189262e62378a773c2b146cacc8031318ead
SHA256a040c5845853182ae8e9349b1c35fd69372873637c1c094c88093b67799741b9
SHA5126458014748111fa48eb7f7afe643e2078046ae05192949b4af7091bf3f8bf83736522398149e8c9fa4f9794773a64de97673d87749bc5dec8ee577fe0ab3eedb
-
Filesize
4KB
MD5a098b761fc864b25160d91d24c3d0223
SHA1d03033a0d4f09f6a292f87c270a31b8768d97c7d
SHA256e04faf368dd00c43c87cc27ed064208e73f372a1dcb8e94d421bd7298ce4435e
SHA51238c199bdec0e44a6d139dbb431a50ab8511253ad55214b6c084a63eee0f53d330b67d7c9788e1da20e93b83e3084d5fbc85f84bfb3ba9dfa10259983c18b8ea4
-
Filesize
4KB
MD553df6161942c32fd0500941ecbe6abb3
SHA1f471d3fe1fca34b7590de3cd055180fbdbdaba58
SHA2567f937903b8d59bf41049ba60ea8088723ccd7bbcb4e4d786d7ebff386e3c04d5
SHA5121a72dd00cd73ef87660e9c8ee8c34aabb3194c4d7032697bf870dd9a88898b63b25849bb149097536a3e653dcac1b97183ff93267b1c7153e58634f66383555e
-
Filesize
4KB
MD5292950714f65ebe96bd09e01f06b095c
SHA1545df9c0e59dcdcf9dd0d02a9a092044c2b02b44
SHA25699f4c84f123e3907bfba510a3ae95a494aef5818c450c7c7821bc88a8f698e0a
SHA5121220813c11cf99ef805b230740fd2b34e0832f66ee2d186e7f2598c9682e3ba49ea612d6e4e0a103b50ad30fcca298b070d875dfd6c9498cf4b23245570072a2
-
Filesize
4KB
MD59f6a3295b64a59d91c89935b5caf2d83
SHA1a6e4af4259caaf90e6f99dceb602d1f3efc54186
SHA256d586252d3faa508e65ea02ef441728d3124b920b6938a01b4eee6c7ed97153b6
SHA51241b7b3a41b7723495d09b1b049ca830589e94a5975014e47a12658292b86ecc39e8e997f1f953070ee209edc755d8e7df5dd75065c00d31b694763a10719ad6a
-
Filesize
5KB
MD53b863be581c87c21be85f88171cde467
SHA1bec6eb5bad3a3057f0ea6207444ede85f83c856b
SHA256987770c95ce50627e0bf36a32e5278142044e6fcc9de744b4c4ab5feaed8eb50
SHA512dde5a17995a2d4e4be9c85534fc58a6d1cb4c8a3ae9cd6798cb0be5d4736ebc53832d671e04261aa80e3397094f48356e795a5602f177bbdeede8561e2081726
-
Filesize
3KB
MD578d6e45af1ecb8c759153cd2f9c04ce0
SHA17d9aba2f38ebfc5a02cc9635cd52c8889cfc3f72
SHA25606fa6210433ff3ad14e34fd37a112ddeb4ebccfe7c84afb6a709b92ace0afa2d
SHA51247e406ff89a3dcc7de17ce25a49629fd4d28f7e4c33b84cc294b4778c6ba2a1e10f625627ee17da76911597fc6a146d61eab13929697607da5fe7cbf39b3de3f
-
Filesize
4KB
MD588ed718be093b0b22b946abc49830887
SHA1fbbafabaac8868f5a504471f7170cb6e300a563b
SHA25686c8b34638ed6d6b1f910971f6f81335feec17b6a7fac500931c634962c2bae1
SHA51203a772d1da29456cd45b3e05da10e6febd40fbaf9690963392dce09e36f708a0eebf464cbf4a2a1a6b43579e9eee4d3f764758cefef5f7b153fe021bb17e342a
-
Filesize
4KB
MD5843e34871ddd4febbc97fccc6cf8a4ff
SHA12630f04fb3f454481c0a07a020be2df27f7f4da4
SHA256b98be2137f785a72970b88bc216487617693a06b1507d9f20ad07942997e9a28
SHA512d772be9ee8a5ce5ff48d9644322930fb37e4754174e5e7ab12978e526e5cb35362478421bc5103a89a790095a7ebb6f85153fd5e86790ef2ef2b28f8ba182b3c
-
Filesize
4KB
MD5697d6a9459f4f31ff24ba59a2ff6c398
SHA116d7d1432d8e96de41639285c51f715965d7c684
SHA2560d649386827d8694e1a5ddf415656b3f8571f0d574ac6c99ee778a18bc7d5a62
SHA512c3ec642b3db01332fd88ff5b6fed2302c8c534c5f6316d00c4930566a8ffafd4df332ec4142d44823839c089ec7fd8d54a6bc1ba54a6f013afc5e4c5832f3cf1
-
Filesize
4KB
MD54ceb518587b391462aadf2e5188e6867
SHA10eb97d883e0d96d8f8b39d5e0c8634540ad97591
SHA256a93cc3d41d6d226b4a1a507db4c85df8e385a7c449024e83bdfc2498422d5337
SHA512b637c81fb6142aeb158034d55369dd079151017fe7d76ac423e91a024f7563370956dc8ef22adbd8668e7f2a348fd5132df8879ec63a736eac9c43c8be9c0c57
-
Filesize
4KB
MD5d68c6a8f8e4dcc91bd5e4fc97ffdd35b
SHA1a6a9008ed93a0dfb6651a3a6e39369f6fdfcbb36
SHA2564268d744499c17a084767bcab1d4a43e0ebc465eb6279fb19fd9f01e79b7279c
SHA51220737899f4829e0afc749cd9b42a60de26792b4fa480369e0919fcafc78ba2d1cd7c58ba93afbaea5865ac3b332e7383a8622f574fb9932088160b94dba1c98a
-
Filesize
4KB
MD524131a1b3508a62023bb5234bd19c83d
SHA12a1ae08ecd49e6bde29d51ac61b43c05a83332da
SHA256d2d978c65bd3a5d8d10e441ec14e1f5b76e3829f48b6ea6ff4560e22ae156916
SHA5128bdaa89b67ab8d6bcd4eef9646b8fa0e8dd4526ebf2402ba9fd8f6c1b61bacc9611425d779bdce4c5d3a7dc878556c055428be2fea7a3353cf226a40711fa324
-
Filesize
5KB
MD5d1b22c652d884f85840289d4540dda4a
SHA17290c56c48c83794fe87505810023c3079fb7445
SHA2563836db85bea03ee62a50e142fd22f8c969e4b96335482adc2983e4d360fa6ebc
SHA51201af6090144d5b607d66cd0fd045bbad1a2a972793d6fc01ed9f9579165ba70a2bff7e364d530d06d1ebd37945bbb7772af057cf4ff1be7bba3762f9d0335fe4
-
Filesize
4KB
MD53c0b5cd904ed3f81e8525df47c9c95cc
SHA1024e92e54ea2b232f75db5bff742911305e9ffba
SHA256d1597c4f490535b8660ad6f026406cf199c1480f75a3287dfe42da6a32a58e7c
SHA512ced83accc966ad3074bd35f9d2c25d4b5c3026d23df625d16917856fb70917c39d1d226e0b83e5d6a6ff88fcd15eb7376e0401f52318c8a5202261040909639b
-
Filesize
4KB
MD599bdb16a10b0ca573ecc075c655da1c4
SHA10d828f4c561b85da7a173667a59f614cd5c944ab
SHA256169f46c1fbc1933f0e1b3f12f8035305070d0aaaf616db12d33f04439c4a1e28
SHA5127237701312912fa331e2743f1e56a5d5b95283fafdaa176824ae13945da0a9d5c839753c41ba660dd2eecd2e22b9a4f3d5606abf13980dba697c84cca9e35f5c
-
Filesize
4KB
MD580a24c87560f41b309ffe7398a2e3681
SHA1513fcd0c4fc538a456966e30708fc6ecd944efd8
SHA2563bdc07f9b4d0311630f44cf5174e50ade40a46c0e3754e31c6f841e849bf55a4
SHA5123c86871052e105776c6cf53831c328725897780322f70a83a1fe1a021515eae752ba335cbd18ff7ad1b14b701f9134d4066a669dddaa47c558b90e871654f280
-
Filesize
5KB
MD55d16a688fb74bf5bda9993c96c617b60
SHA17e346becbbad9766ea1a5567d4e998f3755a3bb6
SHA2569515b254cf72ec038daf0bed98b6f8c399fa470c5ddccd8efbd3f6f7c400c867
SHA512f07b52d48cdcab83e9755c22c04881b8659256931d679ad389136b19ac7dbac11a37ea21ed733266347048a88b0d3a569b117efc3d4454332dacd6e361fad402
-
Filesize
4KB
MD520da459d614576234820c0e72f7c3590
SHA10b42e5c7a429deae584273d863329f7c1e43001a
SHA2562b9b0ce0fe37f0512d93604cd58e7e64bfcecda3ed49bf2c0eb4c2aa774f90e5
SHA512c5e96439448e0b07220d7d1740aabaedc85fcb0139be747d06a57f601717e6dae718e05670bbb156d33a1086a5b301fc5960ba23223dab07b5db55fd2f660c89
-
Filesize
4KB
MD5f21c038b81c71e386834a10c940f94b2
SHA1b807814d4a12f2071f7e1dffa2369c069883783b
SHA256aca8699d5d33e7a0d70a02e1354bb663920a5eaa8942ca4afdf28f7e5824ffd3
SHA51245e83857541ebe53319b3a1d6ba75e859ebdf1e4164a023105b293ce457492edb27ed14201780ba96cab6bea7ce1830d06e431e24ff8575b0be57db720d44798
-
Filesize
4KB
MD503b629d4ceb6f07669b97da96f64d119
SHA12baac66b87b961acdc5f78f4083f33f859ccd219
SHA256939b0e1340344e8216bcc74af891a3cbf8b7dd2553a3a28341063b3ec4124968
SHA5129247c399f1655a31b0412b7fdbb260eabc3cc1cdd34e68010232e4832fcd0ec6acebdbef04a5fd940d95cf0cb9130640923ba41b23212a1499bb44e516815fbe
-
Filesize
4KB
MD5d78da8ddec5d7c824d2930194b73cbc2
SHA1b71bb4278ab88b620ad5069415728d07ad7dbf89
SHA25625a6b99f2a2ce8624c94071cdb95b80aa67a7c4133390480612458cd2bed7ea8
SHA51238d9379988d97137e05447b5e2aa7a0b72ee7a42c591f2a0fc7482883115ec68b32ac20f15445ca299938696f81208ed2e4045d3b1dc76f51cfd380055392beb
-
Filesize
5KB
MD5e8b21533a0c93b62eb6351471599bebd
SHA16fc106aa37477a695153e18ee1834b41c89a1896
SHA2568a6ccc7553a2dbe200eb88871614eda39c85c196489e5d12c178111e25f4c828
SHA512354fa83dbfd75988bf4fec9c9e7469e979f5f5dd020a0d00d98e0793aa2b83f803d7ecd47b6ac7c8f6fda00d70fd330e5506de51e2c875d7938237ad48c80973
-
Filesize
4KB
MD5ccc8715fda886bb4ee5d7449a867b070
SHA10a154a9e48af079a939e03b5004a5447c0705816
SHA2568ec4e129efa9d3cfc9dd6ce541f1ee04954fcba68e4e71a5bd9972577d39c0bd
SHA512c44c9f91e9ba888e3e4d88adc296cfc421fc5f38c9460ee61e54466e7d86a6b0b25d77acedcee16cff7aca84c607c925098679556b731c947e7047cdcef8bcdb
-
Filesize
4KB
MD5f232f57e78ed720f08a9eee4ac1f577e
SHA14110101ddaaf6d33a9896ce91a36d59a1fe814b2
SHA25614f0c6052bd4c9c3c590307e416bc1b34d5165f5054631c1aa964647af98e8bd
SHA5122532d7291d08e842c9052869f5fcd55cc78aba189746539c4c15b44da0ba7d7f10c6bcf59ddf86837654a2b75f6b041d3196adfab1a246839eaaba041e4ca239
-
Filesize
4KB
MD5843a10ed5cb647434d15d31be31bec3b
SHA1ccbdf477506929186bc88251104fbb58b1f149ad
SHA25674fb99874ade37ede0a8860ef4e4f909683f102106cdb61e7e99890c6fa8c2bd
SHA51235ed7f2cfea56bec5754cbd0c9e9e0f1003528e648c2f26214c29e7da357ec0294f904280a4cbeac9969c2a65c8434b2482b0a1b7ee80bb9939f4798a6929f8e
-
Filesize
5KB
MD567c31a6fb07b1358c2ff7fbc4cc6071a
SHA1ad7ca4d7b867c34affcd3a18e2e3afaf9f8f1116
SHA2565220ca50dae063d51f888031ef09dd6b3b9beb366e851e0c95884d913c4d0c3e
SHA512130dd686fdb63e56cfb3e098283293bb768c59d77094823785c2de45507faf1d0bf9060de92b4b022978c7138fd32efc47c7434f46add38948b8e444f0605704
-
Filesize
5KB
MD5ad0d0b67a2a912f7ed3344eff14225bd
SHA159187acd705d63edc7b3e53e28765772a80ec7e0
SHA2560a56f232f54280a2a25ddedc2277d5cdd0e3dc716fdc57849bf38d7c0267e5ba
SHA5125944726fbc445d3b2d8c1b263d5cd69a9879863e6ef60ffe376d54250ced123eee70f35c3f40ed87dfd0d9d763384c1488498a7cd6cf3e97548500b8ae763173
-
Filesize
4KB
MD5e9dc487706bf19b3256946f69879a843
SHA14b37dbb3272a6c9eef25b15f41f664b5cffd823a
SHA256ef20b6ecd5c7c0fc070477ef9d9545cba2508dafc14ac7d8477b52bf643dcaf1
SHA512f57ad3cd17ed386155c0f1fbf75f8d2e52855b848184188727dfdfa0647a0701fbda92276126e4050bb6f29b3bb3d9e5d4f2235e553bf3a7eca661417b6e4210
-
Filesize
4KB
MD592ee3846276e8dfa38735ff08d6e3ff3
SHA194915bf72ec36d084d65e4e30fa5303267e8178e
SHA25617468b2d506f0aeb5527a1c1a518deca39310291699f634fbe9b1865c81ecb92
SHA512ccc98f252c05a1bf13f3418e8c674a4679210f9b0f9af254e50cf12c21b3fbb0eb48e7c4281543b5bd1750ec8cffe290a5b506e80ec423faeb81d629e1cfcb7b
-
Filesize
4KB
MD5bfcd935804a1422a5b6a880be3528e7a
SHA1cd18f8dcbebcd26d2e34ef78603a6f9669a364d2
SHA2562daab3d6b5a2b26dd9492bc0faf30d89345bbfbae286c725c1dc98fea7968880
SHA512c225a6b7d9b5967d0eee54393f6b0aa03e9ec17ebfb98d3cd50dba7dbc2686f7ffa65b5571f3e80ba64a3ec3645cc1591ff205308d77a1b28c2ceb92055b79af
-
Filesize
4KB
MD53009327461c9ed85463324367967f8bb
SHA14437d72c3210d3349cad6bcaee96d39d25010b06
SHA256db708447426ea320f4ef09ac434901697392edc284c636081e55e503254be52a
SHA512f4ec5d804ab4e76a2a8961d4022d5efa13d70eadab4c9cb60f624c94761f3891051a509018ec0b5e21b8a0a26751517a1dfef8e88c44be1d0d8ef784a971faa2
-
Filesize
3KB
MD5aa17074b441fe0acf7db8114617b9539
SHA14b9ec26e84c3c8abc58349f6b5cdcb6b8fbf3805
SHA256e0fb9ef7be4df63a7836d66cb72103af6c318995f1aca4db7a202ec7bf740abb
SHA5121cce92d2eb7c21666207f9196ab835250e67d3b52dedf76ddd1fec1005c9ad0a0f4d7756956417c3489fba46b26f97f242546f9ff725433c2ba575089d2f1672
-
Filesize
4KB
MD54da7de7d78bfc802ff3826b74156b3c7
SHA1f81e2e9fc61728d603663c4ce5e15065b96b12c2
SHA256565c1c1c84829db66742b97dab6975387f8185a34ce6dbdf01878e0c137d62df
SHA51203d38640705b6fc8b0e629a5e2ae63edf41050f6e63ab51715ec9d1d584d1c09986cc9cfd92a9492bedf3ac244304280bd64054133a5a6c8432df349c31c0a14
-
Filesize
5KB
MD5bbeaa7a87743ce679189cb607eabd3a2
SHA1a44f25bd8c87cde7398fe5608b9f706cece7b869
SHA256b7c878266651d78234c0de6438b9024f61cd73375a747f305d382a423bae7cb8
SHA512cbe23743506099f0f1d3b66515adeb0d9059777a103eeac61104233715bbe085570fdfc12e8d7827905fdf3013aee650e0e51bc61057bb5db7b9fca7eb11b782
-
Filesize
4KB
MD5ced4d88f6dd8e629ff1c78c6154df3aa
SHA1dc1d8564af1231168f282e3c31a4a571c57c11f7
SHA256c8cd41f2178934aca210fe3d80c0f1e974472a813d9f3351b8193d517c763a82
SHA512128365c1cfa53b5ae3e135af551aa0ba9be1ce139d63c9f8476e0b7de06f68a4dcacc51936fe8a7d13488aabae7ece729d5004816cb66ec813a01ebb53c50197
-
Filesize
4KB
MD54867e1755d3e6cce1a8f8d4c216b4594
SHA17bd3c040bb7a60d509571f10187680fc9d16bca4
SHA256c36b7808faa6098079aecdc8b70094420f3677191fa2fa83b458bbbaf75cb4af
SHA512281f8ad770f8265f4e5010fa0e21f90ce27cf4652cfd26bd30978414383075faeba70d63d1ea1f8e4eacafc86824beb24070d1b51ed3ec096006ef9ee4745b67
-
Filesize
4KB
MD5d179ebe65f69d36982e65ffe28326d22
SHA1caea8f078890075516e94a13e45296e3d719f519
SHA256563b5c420fd8884b7ba7c1f25fa639c61b4b81b78d84b23b1112507c0e908bcf
SHA512455e98010ac58029ab08e031b0ebd86d3bd1f49324ca53d97f716ab6a3c09dd01122115b632910f09bc5b2a6c95d606cb3896960fb06b4bf6bfd1e1b4c65c3cd
-
Filesize
6KB
MD551b52d173df62f271d4c419f98ab02e5
SHA1973e16307c130e310b439c0b3d36ef902e53f91b
SHA256079f618932f681cf92af264bd90815894655652e5be34ca22faa1b9fbe64ae5a
SHA51200edbfb684def11fee2e9806042f53900ae3e5b6793ee3cc3ba542c1b02f88ca00e0354100975f77c098e0462033ab63f3adfcc1b3b5e4d39e9c963ff843efd1
-
Filesize
4KB
MD554df8a3a3b4ef68040061277f8d1f94a
SHA1d8a9d909eda4d0349fa5d2be971a87f2570abe41
SHA25632bd7a24b78d3dbb8fc1d93af907c0b36da90cf6bc9ba8b6247f579a9fb4c4c9
SHA5121bce6ca229f1eba6ffec8e78dd3ec5b5627d2b458dc4926e63cad0d83bf48bcd9701cf66966fea370b5023f767dc1ba06d40d6fd06cf12c4ef3733df6b21765f
-
Filesize
4KB
MD570fad27ee4f3466dd6b91023ba3558ff
SHA163556765afa509f1ce8226de2763d8fbbc8bd619
SHA2567f2fa379a28d2dbc621780fbb9c0ed46d0d05b030a1064bd99f22dfeeb06ceed
SHA512f14e4b1b1a305dfbf3b5af814f28d7c31972333ae3d61578cde8398fde39d35df41628a3f0e40909c36a9d36fc5fd61dea046253ed08004efeda0dd3c8617b1d
-
Filesize
4KB
MD563152c8411fb484cef2464824f29ec44
SHA1a384418717e5b380950ce6c7b4acb9b65dbeab93
SHA25674ad7c22fb20821575a2317037cf8cd33c71daeef5b81c126d067dee5e657164
SHA5127c18b70ba2a6d6f7df255235a6bb8597af1fa4279255967199acfad94b3ffb3b1be82600e1d00a220dd03b0d24f1d6be882b9eff6bb814f19dc3892fa4b3d118
-
Filesize
3KB
MD583bfe9bb46b97058db1b4ad2dd0b00c8
SHA15723d377e03102bc5630d6e37c49adc4ecec6c07
SHA25657b888612c7046740b6ac436c88787ec91c99305f98c18350b233a2508e1bc70
SHA512a0d4c626ff65cff8f3551767701d8069d703cc1e36e7abe6c52f05d9108df3af29ed0e253dd10ab85c556beb83282e6a5f3728a0fd99ec29bd4bc2bb5ae3b06d
-
Filesize
538B
MD56440b1d3e860b0b29f0dc3649c7c2422
SHA1868251c977e8807cfa37bbdb4a7a42c9644e2825
SHA256a29e1a8f7bf95d85c950c6b63cefc038dae425d4cb8f99b407b757cf5f020851
SHA512ee94ae8d081ef0442fe0207832c7663cf7f48d36fae1f5de45963f547090ae29ab79003d4da650eac3ec06a3d1388cf9c3fc0c6720c5bcb55ddc81daa2244ec4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
110KB
MD5d0dd3c5e500fbc9eb7225b76660632a5
SHA112a48c487ae0abf44b274d7fefaa7a3433237400
SHA25672b3a4617d74868b4f2f7fcea1efa6849d5a77f3d29889bd87bdde7053c5424e
SHA5129133c1b3ff22213f2e130fcc7cd51fefe8b85141cdc51aedfdea0bf95a1482f9b42b6152c5146fbda8044ac22494a55ae9b5b8a6e1c4b0d8c3d497f0acc381f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Shopping\2.0.7945.0\edge_checkout_page_validator.js
Filesize1.0MB
MD58c676d98f5521d00a95e1d3d805d672e
SHA10fae034f32c96d35e0ddd289ec91d6e59ef93e9d
SHA256ebe58741e998f6a922a10194e0cc75e9caccb8619bccffffcbdb01230404b12c
SHA5124fdcb017553f133d2c4f9b63c9a68457b0e31c330ccb264ad25db24323c31189f3b8ab29477f6caec08071199dfec6936000114eae67e882b28cbc9485cc1567
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18197.18175.1395\buynow_driver.js
Filesize2KB
MD5412352a121a62092628029e9b30158d8
SHA10021445df04bcd60cd83b670ce1863c42f1f4c11
SHA25687339a1e25ccbbf120f294fd60333e292e1d631e785a9b205ed5beb0128c214f
SHA512ffd266f1161ab996f38a6d0723e2cf96840b500cf2aa360f48b7953d448a5cd3a2fffa666d9be9c89dc4495497d5016f1199e6419a82bdf18fc99b8a8a4eb596
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18197.18175.1395\json\wallet\wallet-checkout-eligible-sites.json
Filesize23KB
MD516d41ebc643fd34addf3704a3be1acdd
SHA1b7fadc8afa56fbf4026b8c176112632c63be58a0
SHA256b962497993e2cd24039474bc84be430f8f6e6ab0f52010e90351dc3ff259336c
SHA5128d58aa30613a2376ccc729278d166a9b3ec87eca95544b9dec1ee9300e7dd987326ea42d05dca3f1cc08186685f2fdaf53c24fd2b756c1ed9f2b46436689dc74
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18197.18175.1395\json\wallet\wallet-notification-config.json
Filesize804B
MD54cdefd9eb040c2755db20aa8ea5ee8f7
SHA1f649fcd1c12c26fb90906c4c2ec0a9127af275f4
SHA256bb26ce6fe9416918e9f92fcc4a6fe8a641eceea54985356637991cf6d768f9fd
SHA5127e23b91eab88c472eec664f7254c5513fc5de78e2e0151b0bcc86c3cd0bf2cb5d8bb0345d27afdd9f8fcb10be96feaa753f09e301fa92b8d76f4300600577209
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18197.18175.1395\json\wallet\wallet-stable.json
Filesize2.2MB
MD56676f9dc4d4c0ba7555fc291dbaa7197
SHA11368994648bb9da4aa29e266ba5ea0328c291567
SHA2564212d4125a9a2c58ed36f897d0415db29c7d565ab4676ed75a7786e32a19d55c
SHA5129c5317f6c1d76eed57c82628d1ff27dc5ddecfd91ca1d04920057fdb0e2faca8bfa4540477a2818908200afef2ea9f28e5655e41adf76ea4dd9f8cb466106574
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18197.18175.1395\json\wallet\wallet-tokenization-config.json
Filesize34KB
MD5ae3bd0f89f8a8cdeb1ea6eea1636cbdd
SHA11801bc211e260ba8f8099727ea820ecf636c684a
SHA2560088d5ebd8360ad66bd7bcc80b9754939775d4118cb7605fc1f514c707f0e20d
SHA51269aff97091813d9d400bb332426c36e6b133a4b571b521e8fb6ad1a2b8124a3c5da8f3a9c52b8840152cf7adbd2ac653102aa2210632aa64b129cf7704d5b4fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18197.18175.1395\wallet_donation_driver.js
Filesize1KB
MD57dc1ec68e75f518c2842f7014189411b
SHA154fdcb73bc2876d9068f3d206e38126a120c1a00
SHA256d3bf2287554885c9866bffbed44abd4be1dbf20d827e20f04deedba7534a999b
SHA5126bc35700a0fd9464ab2899fefdf046285b29aac5e46ad837918d2127e2227eefbb5681c92c4a9b976e313bc1a71c743a531b04e0eaf9183af05749a4fbf0c102
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
31KB
MD547f1a70cb988e9b4348503def7389927
SHA1c1a5bb47c5522cf1057f1eccc13d340bc09f26d5
SHA256b1241a902fc6828bdf3516ff89e51d96a920aef0a42fd526d82252bb952c8706
SHA512dc8d72717638c48b9a79df5b3f2dd8a7c5192fad0844ba0bfbbc1c6cad669461d0ae75a66ac392ae87d6a6c66ba2c7fedb86d2b047fdcd653dfa1fa172612230
-
Filesize
8KB
MD5738a5f20eea63a00caac81ef6e8e81f6
SHA16e96c1b1e1c26d3a2234beaf8a14adae93908bec
SHA2566fe1a1d7783e42ce6ca0dbcaac5307d0fbaee6571f61d4505d5d76bf9579bdbc
SHA512a3bac4817d859ad2fbcb283db4a17a37f3e0da26b5b9ad95b709768817270c32aee14105bbf8edff00546b329ec181b2a7c78d00519a5de2abc7505267aa0a5d
-
Filesize
23KB
MD5325ac39726661b761a47be24cf99d5d7
SHA193bd5615eec93ca5f24ee2039638d855960e7269
SHA256f7579e88ab9efe339dd59c539cb958555819ba36c9c74d574796f65acec70c09
SHA5120076638914d346aee2969e88bf0c9b54a9a4763e0530cfe34f06e305957a1afd85b9d4c881650cb14fabc2d3da3ad4f5397fd6b96771d25068c9f7b012661188
-
Filesize
32KB
MD5f36aab56c860281fb955f89ceeb9bb7c
SHA1cdd02141d5ce02e066bd2f17e00629106e2c6723
SHA2563435390df7238f9116611b9cbac968f6963c36d79687f20e89c72415cd7af12e
SHA51224e60c1b8ea346814a1442e2baaa37fc2d236fdb3013b8fef70dcbb41421d57dc9df150a921c2df5df6f10f5fbc3cb2a041cf18910321709540b0dc5afc90855
-
Filesize
33KB
MD5d18e347fae27b3a4f71cd38ef0329a3a
SHA107c43cf9514ea00e4673f2a140f05bbc094ddf46
SHA256f56579e91d7f861edcd1b36cf47137ad66d9bb6bc245f62014544e717a79ee26
SHA51282dfbaee34605cc610db3afe5d2389dbbaa7a5bfdf456e917dc871f968447fe7c9f5a0c047bf8daf8e30c587fbd28f9518e343e27bcef346de27b73620ad3fe8
-
Filesize
11KB
MD5b102c1aed4015a25972d6eae3b444285
SHA1ecb9cecf49894c9494ddc5ee3307bd677ac653dc
SHA256b4d53da5999801a07d7f3e9cb5b6e3bbe9eb3dcd427ccb4105c73fc6551d5a41
SHA512b171851ab899ac79750de449eae8b556df07aa1db4979a364d94fca05ad824c5d83443214a58b12968c0e030779f868578887d43d59cc1542a5bf8c9feee66a7
-
Filesize
10KB
MD53b2c05e440068b7a659fc9072ad498c6
SHA16673f24b61c09748fa4126894597745576af9e30
SHA256715267b81c2e498c4ef6c82fff35c194400d32f95d473ccfdfb5660c8593b735
SHA5126748f0af0081bd8976cdf5733b8826790a3fa50f3d0546155bf080677488a1d3fa5f28a0d729d95effaf8a4cad90883f029e940249ecc12940229f9fc8875407
-
Filesize
10KB
MD50219c70d9459dd8abbc6171769d6ad1f
SHA1077454db62ad173b3d41800f4f7aa15350e287fd
SHA256282291397581455f8da5728ed1204e26ad585ee46787928e70d20a1ae9f35a0b
SHA5128bc4872250024e578fc21f9b519c03959be948d0ced36002f19061f8c9535ca5e24c60ad4374ddff1649b7091c499dc73322dad114a0c7cf8d883137e45ef722
-
Filesize
10KB
MD585ed6d463dc4a4405b4ed8a21e512fe3
SHA17bc6a102e5d99c33ec19a6211d7912babfd55126
SHA256249da3205177ff683cb0b0025f6ac72f1132d2557a3894c78c1013b0487253b4
SHA512f7e49c71fe6aa061241679264bc1887477e5a5b203045a008798410a511d042088893807896df84609028f8cf6f15d994bd1bd541c1f78d494c61f5c81e5150a
-
Filesize
11KB
MD5d2e0a458a9934ea316913da38be503e9
SHA16222a3a83f05c452726e168c9afc9c47c5b0320f
SHA2563bffd7eec28e511367fb7722d2db543a81703df0d1a6142e19c38b9178f3020a
SHA512ff42f468a535c09cacc0fa4c3191d81f6002e22293ada931e5e21558ef37ea1fc63f4d9dac3ba5a92edd250600a1c7053b94774b77c8e9f27deeb043fd9abeb9
-
Filesize
33KB
MD5c83e1e3f938f8ebe09c5cc1fe8159aec
SHA1bf3a651d0e45af3c09a0b5ad0a9d7248e89af254
SHA2563fa3add858aecaae63727267c9797b419ec78694852b4896646485843ac7899d
SHA5121266d2ef455bcad115bcc7731247c7013ec3a610516716b53dee4597d79d21e5f8bd25fbc40626a74e3f76b69ac3eb6218544d87d64fbca904bc3efb4ffae22c
-
Filesize
23KB
MD5538daf64cc7023d03de3526b37bfcc69
SHA10368d63e6e76354fc774391827df7245b35c1476
SHA25694ef3291fc624dadc271f457c3881bb79e73d03f3a6327bd528da9d9bdbb17e9
SHA512007a30f66d3a4522d2026be18bb58561227363b694acafa0e6c59c71e4ced28c0d106a42873ea015c6a4fd22d6c8c8847210d3e9abefb2668b4055126a5f1bcc
-
Filesize
11KB
MD5c092bed5a878d0303a58735cd0831a4a
SHA1ec7b06c98e61b37cc7efb962eacf7d5a250c342d
SHA2567b4a419eb5b1d48cb11586c5b62ecf1cfb128d0df0da1d0226802ba3ab9f5341
SHA512e129f657676bd294589b5877ed6753b7a74dab01b8743e4c5f77410293165035dc5d1daf119bc9ff53daf5dbc7fdb5ad7b1fb8729cf1739af789ff1fdf283855
-
Filesize
11KB
MD5d881f85f856d1a134885d9674a4163f5
SHA1b98af4b79e66944c84573b2d1edb8edfe869abea
SHA25639880df1afb7c1ea770ddc89d6e8389b502d8e8348aa01bafe7f94c05c2538f0
SHA51283a1354b3b9e8e6ba417a731ca0afed972ca91c4d4915406060c6dbeb884bbee1da8c6021818ede9f56aa41fcab101c8346efaa5752bd29a2b8dc8fa143b600a
-
Filesize
11KB
MD58360c192f2aff01dfa13a011b6c44db0
SHA1b44aadfcdcd28c16b1d907f31e7a08d58c68e0df
SHA2569cd08ddd3d74cd315806192fd3d23de7e5ff69e1f5d4bef6369175c4fb2a41e1
SHA512b775643456853b1e2c469aca5624e6ffde3160a71d3931b69a4cb641128d77945b3473d6c82eb2dddfef671f20f593e68e8e9cb17d164c3728a47819ada1843a
-
Filesize
8KB
MD518330ad0cd14ed8cc0a772c6710d9f1d
SHA16aeac76e7949f9f9f51adc54dab7e0a8f30ba61e
SHA256264ba21145c503c2f6b0b5d56b4d71369783bf0201c3d453802f3650948e436b
SHA51235b214ccbf79352e135bca4441e74574f5544dc4140de33130a4c4f716409594fa1851929637c34e8e709a6945eb627d29c3ad96b4fc485ffc1d75a17cb7ead5
-
Filesize
289KB
MD55533fc3f4c1820b787df3ec6fdc2ef1a
SHA1f39ff89fcc1af711e8127c52ba55c8ad347e84a2
SHA25656711adeba4ecafe298eab09cf0ef2f1d7f3260a2aa4366b927029781d270938
SHA5125194c0562b8cb8e23fde7b561b00dd6bed93782f2e9253324a8e8ef05b69b66a549f2061ff3a9010a73a1412cc64889bc93931d0f212b8a68e39838dabd8e811
-
Filesize
10KB
MD5f9d04f6b65d1a463f1a01ec39b77622c
SHA18f13311afc943d362dbb332b1c0fb289a722547f
SHA256b42a2649782caefe33aa7f546a02b69bb292a0d4c8ca48602bd9c8dc623b3588
SHA51216b6419a5d1848abbc668fff08b767af3e01abd71a94341baad7344c0dafa5951ba8e3bbe8561d79fecab03b720e0293e22b49659961d82587d3c7956addd71a
-
Filesize
11KB
MD5fb4c5e847d5f30be002702ffab8e928a
SHA130adae5ee6799e233e29cb6825bde492ae6dea98
SHA2562fa10f05494714d062dbac514989f544036509e4181af8352bf7f8c3b7ff2fe0
SHA5126c0792c37f44835a10e412dc889e64bfb740337c0a94ae360149c7987216cee168f4b70a428fa9a63a99fa0d35640727450e1fcde735b42c6108ee3f9457f72f
-
Filesize
162KB
MD5f384a436ffadd992424613a46b7bcca4
SHA142488103b3f3a263af83011ec369495a1f22bb6a
SHA256ae064e6c8a62104b0680d3f9ec1fb4b089c6fe52631bfb0656c20962098ce5c6
SHA5129e21638458fc23a043f55b90ca390f69325c2e84aefad29a9bcc2df76cdf4909c79a5b91a5e056e1d8dc29023dce17119524e0832382516b64adae51b2194eed
-
Filesize
3KB
MD517c10dbe88d84b9309e6d151923ce116
SHA19ad2553c061ddcc07e6f66ce4f9e30290c056bdf
SHA2563ad368c74c9bb5da4d4750866f16d361b0675a6b6dc4e06e2edd72488663450e
SHA512ad8ed3797941c9cad21ae2af03b77ce06a23931d9c059fe880935e2b07c08f85fc628e39873fb352c07714b4e44328799b264f4adb3513975add4e6b67e4a63c
-
Filesize
9B
MD5b6f7a6b03164d4bf8e3531a5cf721d30
SHA1a2134120d4712c7c629cdceef9de6d6e48ca13fa
SHA2563d6f3f8f1456d7ce78dd9dfa8187318b38e731a658e513f561ee178766e74d39
SHA5124b473f45a5d45d420483ea1d9e93047794884f26781bbfe5370a554d260e80ad462e7eeb74d16025774935c3a80cbb2fd1293941ee3d7b64045b791b365f2b63
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2024.10.11.1\keys.json
Filesize6KB
MD5052b398cc49648660aaff778d897c6de
SHA1d4fdd81f2ee4c8a4572affbfd1830a0c574a8715
SHA25647ec07ddf9bbd0082b3a2dfea39491090e73a09106945982e395a9f3cb6d88ae
SHA512ed53d0804a2ef1bc779af76aa39f5eb8ce2edc7f301f365eeaa0cf5a9ab49f2a21a24f52dd0eb07c480078ce2dd03c7fbb088082aea9b7cdd88a6482ae072037
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2024.11.13.4\typosquatting_list.pb
Filesize610KB
MD54661dd872a7669628e5610c13ddb89a3
SHA1299224d3c7432523e31a7001ab92a4e7887f9a3f
SHA256eae88701d48be7f519de679fb6fbaabd2b9280393f3beb813b04e48982629177
SHA5125a93992d4bbf0ca9c87e283e13f9982403d690dafc110d2f6e00ba905e279daaeca95a906bac7972cb82e527655e6340f0fbb3522111a27470a1f9d517a1077c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5748f398b7ddc8b8da0ecbea2e003ba14
SHA12721d9e1a0517b8de47a0a754eea8cb790934a16
SHA256791210c91c1bed9ada72feaad78fc0d3861af533564018f8c9b1fbc75e309ae9
SHA512a0b856992f6b3be83af8b0a573af3d657020f196d7552113a609ec472613bc11ddb7ba5becffb1d74e04acb41ef3e0733cb1bd60f285e4cdacd53f101b5cc2f1
-
Filesize
6.9MB
MD57f3632afdee7118812dd116069729b41
SHA1ed116033aff765c3eb24c3059aff6c6fb0be0c0c
SHA2566c98e86a6d732761ef8b8b2df2646f55190657e02201ec8ab8b9137345154c5a
SHA51244948874e9d243c234882ab1db269fd729f57ad5fb36a3b22428e0d78a9fe5a05366ed2eb97d0331caa0ef1b622528130344016e13f809b266dc1bdc10ebf9ed
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
260B
MD545716889cbb4c94cc562add3457054e1
SHA1aaff9b083517314e3bdb48fd0b8a80053e63c33a
SHA2561b4e9ebe693d6324696ed842bb673a51f7f9fde40636b4ffb2a82ee74548b93c
SHA512bcb454b0006dc678337967088446891503e8dc2f66d8ce896fc8e0e290c6b9a1777fd93d25109972766b6fc803df86d9011225299061c6e79fa0829b2b853822
-
Filesize
132KB
MD5cfbb8568bd3711a97e6124c56fcfa8d9
SHA1d7a098ae58bdd5e93a3c1b04b3d69a14234d5e57
SHA2567f47d98ab25cfea9b3a2e898c3376cc9ba1cd893b4948b0c27caa530fd0e34cc
SHA512860cbf3286ac4915580cefaf56a9c3d48938eb08e3f31b7f024c4339c037d7c8bdf16e766d08106505ba535be4922a87dc46bd029aae99a64ea2fc02cf3aec04
-
Filesize
128KB
MD54bff5d1286ad16aab2904921dfd36327
SHA18248554571f4f44a362d4bfaf73e0788757cc022
SHA2567e0b3e717eadc63b46ed64da3827bf0b0cd5a089cda6993f852b8c02d6b87ec3
SHA5120234fc0e8d1cbbd7811ea8e606e8f06d740f835a30be29517ade4bdb4b153907d10f9a6df32b594fa9683432093213acf5b5c5d86b12a9a32c62944a0d958b01
-
Filesize
1016B
MD5a97e447e2f346f0249948a5011e9caa7
SHA1dad9742aa2ede128e5e018f8d5e286fa55347bac
SHA256e2e6a25bb5a582ddb6f7df2617027b9428d9f5479ddbc52f84dd4a0ee0cabaa0
SHA5126d2ab80e07ea58fc31371fa96e7a74e920ca72ca092ddea10e08454ec1bf10e3732072664feebb2409d36af227bb842a6dfe81c9ce6a0e69758b8febaabefdc5
-
Filesize
64KB
MD521ce90d45cf1028119414261adbaaa64
SHA107b32d8ede8479fcb2648be908ab2e7cba9fdfdc
SHA25601dc4cc3eb6e5af72e4e97d609edcbb2ca3e8b432c9a478478e54a4ecbb30ee9
SHA512a6b95fa5d1083bcf9c7e39cc594c0a3dcf60b486e7f658a32bf3b907a75085ff9e26dd1db8fe9e6d3e9b02f1d836d0f563baa999dd828f39811388870d88213f
-
Filesize
152KB
MD5cd061ddcfbd842b7e2f42b1ffb2827b9
SHA10dd946f55c138feda71075a438b6bf2f9e6ba3cc
SHA256092a186c576dadf88e2c7e95403be836d1d45ede2043e8f7271c5f7a30e5f071
SHA512db7705daa0aaf4e956a0092b91d02098690266594f7182a2121e7feda5864a5abb3b93288df35713f80f328b66d6dc87410a7b02d0da28b28c20e511c9020c9c
-
Filesize
340KB
MD58c8bbadd8869e3b0ec199ee961c10406
SHA1eb6c644a8586aeda0afd937510e7ab7ce9e047bb
SHA2564caca0a9aa79067b9dbb70ba47488b6adebc08ff0b5442a07c3887a3ef50fc1f
SHA512903881d7e33bdd94d91067becefa7dccc89b470c31faeead9f98456d89f9ede99572d3a1c1e5a55cf7aecdc92ad1e6a0253573a7f53666152bf21992514a3d68
-
Filesize
31KB
MD5fc9444541256a407a84039c50b1e4814
SHA11fc27896270e63e5df6b77290c986525eb2a1b91
SHA256ad9bceedd4ee4f5a5a7be08b203c06c7bd5a14d9b893e1b1d78f2ca28ca74071
SHA51267fafa6b14453459dea2d50e5818495d265de45ced22770fd606645b3c627c5ec690ec7a479362343f8c3301d7c611b5a5098915ec4d79ad741cdf50b0b17f7a
-
Filesize
7KB
MD591b71c6e569f429e88c03965ac5f4548
SHA1b0dbf0196e3180704877eb44974129f7b1bbdfef
SHA25602254d964cf97a7ec93b067c7a8eb801ba84e0d73a4a32d3515a7a3029b67cc4
SHA5124083d6cff5e69e117853e234260bf1690cb954459e2f96bc512725f5756404a790732b2c290759d10261a3c6d0ba30d68368b00bf9f4b17901969f938ff6f9f1
-
Filesize
64KB
MD5de0e76024a69bb4e719d083eeb22df41
SHA17ef2d0188cfd49369731132c67b911e5ada07677
SHA256680eb9268f4d886421f61e3858d3df456e73043f0a96b3f7531afff0ccd6a742
SHA512e4cc3b31f2d15cbf39579e78cc1b6d09f2da8646c00a4da9454832d0b1e9155aa9e0867097799a7784244b2b41e6f043d0d6b97f4cf86a0569f814cbc2cc72bc
-
Filesize
128KB
MD51ef20d0614ffaf802f5b1fd408078241
SHA1e054fdd02f7ef664ea75aaafb551b7444b9c33c8
SHA256e8587df7c290525cf5fd6f5869fd00ca29a8635cd5096dfcf08e0be25f15318c
SHA512dbd53b5af960367502796d9a0b7935fc287a53e3a401cc3c311977efcd5dc960b653cb497e487cfb18de25a30722498f020062f52da40704d22dfaa72816a969
-
Filesize
72KB
MD57946f3dacc30f2db03f536da47ed01f3
SHA11ed3c7169cf1bc12ef619129c709b19b980b270a
SHA25650147f9302609ff59579f2e6280368306e7ceb898e0e11d64c884b0445157886
SHA51290808476495fa48f3280280e7cf5f419a8b8acd5b746441140ec7b2fa40473c03461341b79d7b2d768094056fa8dbe917bada5ab437475ca75dba48dc0861c18
-
Filesize
56KB
MD5f2ae01c92f71abc3548bc0d57230e15e
SHA1f56d1c4c6bdde7f3cbc9a1119753e42ff89c77ef
SHA256864647a0241bee69af392f73ac760bc3507fb78095b1d84b24bac36a51f20a37
SHA512d3735b659c5af9b7a741b4d71161338731ae1c6af9d9053b3e85c8c696bec6dbab895da2ed669b7ccc75f721a41c4edfd3dfbab92ba51eb91b09cf26522aaa62
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1972_1986303645\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1972_1986303645\e4825c5c-5238-4c5b-932f-5591ed296261.tmp
Filesize132KB
MD5da75bb05d10acc967eecaac040d3d733
SHA195c08e067df713af8992db113f7e9aec84f17181
SHA25633ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA51256533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4432_1172075287\CRX_INSTALL\_locales\en_US\messages.json
Filesize1KB
MD564eaeb92cb15bf128429c2354ef22977
SHA145ec549acaa1fda7c664d3906835ced6295ee752
SHA2564f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c
SHA512f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def
-
Filesize
1KB
MD52d15a6576d5d85222f9f367c286205d5
SHA1a51fccba42570f45a57b3e3951da75eb553eeb81
SHA25631e923ef15ac783399d5a4ca5c67e96342cf7f18437843e2a3f55b551c6dbce6
SHA51292217626f79111b1329a3c91ac4923354aa8fc31fd7ba7428a256e9acb35825d6ea28fde02b4ae44914adf359b3dd11d16f274040dd8e675f2aba66139b52661
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HOCEYR9A3BAWJTG8N0XJ.temp
Filesize10KB
MD5250da245b68aad0c53243213e103e44a
SHA1ba3dd4f074c6abbbf2bdfc67c73d563b6c6dce24
SHA25692e177294ace33a0bdb0f4c62b5ea74ea242e0a44d51a0187a9c3731d321703e
SHA5128bcf11fbc23475d4da96af2931f0d3716eaf65fbc5907fb866e2b6204811eb59cb9cca28a93ee1413346e1942a2abd1eb9750cffc1c71f5f2b756078e75138e0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize11KB
MD5e8e01fe4f1186eee43ff9e3866e42970
SHA16389bb486d3044bb2805c24cdb9797e5b47fce3e
SHA256621bc4b5371cab5db4bf1071919ab952366fe2d80568ce143135c2f9e8efc75f
SHA5121a6281e0ee3f1457711288d06dc77e94bfff8508fa42f70ce8d98ff18f6f1003d89050c37884c1a564c22e12513ce446d3c5afa352aaee5c0bd6a2b08c7f61f6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize8KB
MD5c3746dd905d28094ba80c3500bf46cae
SHA14bfa599ee72e869aaa86c2a00ecb8d0093803978
SHA2563ec4585b1c4250edfa4757fc7b31797587b05a2787ec23469396418e3376d0e9
SHA5129fde4817df827ed27196de3a760486de48d342c43081554a1a67986f05e4cee067cd4cc3804567e2c1049416cbc5da1cfc980a8f92ff40cb703c1af129645a36
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD56a6004adf6a2736fa40496fb4745ea61
SHA1e4427425af3066d5ee4a8a1a8d41b3290607f793
SHA256ffea14dc22dd37c9f43ef769ae02ed5463663038eeff0a9f3aa57161ba731f22
SHA5122fc199bab7851e667583c421443b49cd6c1994ee7242e505fa0c8b01dbb4e405cd6df2b98382dd028eac6fe568544011bac5fc82bef6571cb3a97c94e303ed7b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD5915f0e89c443ddd19ab3291394ed7978
SHA1fb7c7b8c78949fda54abd20d76d5d05cc57d2f34
SHA256ac64f2f24452c65f3100e3388d065cbba1bd9fe9ca21cc3eb690841ebc0c88a1
SHA51252b6b2d8207f987cf5c8dcd4c18603b5c8266f5aa6c1ef98f632268fd2fa97fc258acbe0f2b7410c05dd2f0eed3b1a04800752279ba7aa756aec924c22020193
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD52d90c9d2727b8eacae9ce9112dec5a62
SHA100f2a0cfe1ba95835046df8ac718b4ed38ff64ab
SHA25671586c7c13c417a9110188e84c539490acc7d2e32611380cf3ac86e185c5b96b
SHA512000ef3d9f290fb9208deb7f6e71aec8b4d04bae04f5c1234bbbc31520d19dd79c76cd3bfb70d5d820929be6fe3f8d5ff4fa2e6e9f91eaabd1b1230b187d45dff
-
Filesize
1KB
MD5ded44e07efe631e076fcf595f22bf2f5
SHA1ff4c40f9b42b94e31784bf9245798fd2fd13c4a5
SHA256f9c88eb861c56276e7f027cceedd7871077236cb7ae7eae2b808b925d478ebfe
SHA512555a1c5abefaab484e9c880b0f47a98b96f5c3e307b1cd3736c59f3b3e496434c4a31433016598474f94834b67f1cb20f8424b47e4bf5140a7370df8deeb3e3b
-
Filesize
6.7MB
MD5da5705f4ae30d837139cb7380d941e1b
SHA108ae6cb9b2703df17b2bf554586a36f4b73502a6
SHA2569f205a55a45a2a45d2ebb98afb21499b191a4b2e26f4311568d0337b32faa1ca
SHA512f3042947d05222aff5facc14ac6123380d502435e98608dc6d053848997cdd0fb22b121a381e67df893c15ae14ed836a58fca5898540ea5dfb0a0da32ed8dbef
-
Filesize
13.9MB
MD54e6fe26833508db8276cc36a28898ced
SHA16d7b7ad45910af3107307c2a14fbcb690e6475ea
SHA256e44348efe434f7fa2fa93d30bcc5aee92f7636ac50e2b9b20fc8514814e49ad5
SHA512bd4c1e0721d79716e41fa627aca23d3b2d2697a4c8d00bc0d6f8c09d6c9e9731c8b6fa9aa228aeb250d31fa02f92d431ac63d5a96ca03fc13b947fc7db4269b5
-
Filesize
24.1MB
MD5b73ebd08858fc505a3a7ba7e7d6e7038
SHA1657c4551e1013d80b56f0e9b3f4dd52e06033674
SHA256740ca9ddd644a11f19c85d50df43a52979692251937b1b8be60ebc34bee57f3c
SHA51263a9c743b59fb31d2db5d1e87b571b5a7e77bd56331eeb0914dd5f03979e17b958c475d52fa016ca670aed3a71614e81a0d2691b0536766636a3fdabe1bbc376
-
\??\Volume{77a2731a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a3c82a83-dbed-4362-ad55-d33865f7af89}_OnDiskSnapshotProp
Filesize6KB
MD538fdde874d474d019c03fa3cb269e224
SHA130f8cd7cd7e319d0639200647d81691bd2741fc7
SHA256004c95ada4622cfdaff3b3c7b77ab316c4c954f8bbb940bc02ba2540014edb34
SHA51248d9b8f50d7c2feab307db1b3a6623a0ffb687d1bcb5a6b15bd3df3bea94a498e61f0a69985bd9b36e51167c0e2658c02807d979a12c0a246e0139de50f8c553