Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3luna-1.6.8.zip
windows7-x64
3luna-1.6.8.zip
windows10-2004-x64
10luna-1.6.8...er.zip
windows7-x64
1luna-1.6.8...er.zip
windows10-2004-x64
1Luna/Bootstrapper.exe
windows7-x64
1Luna/Bootstrapper.exe
windows10-2004-x64
1luna-1.6.8...g.json
windows7-x64
3luna-1.6.8...g.json
windows10-2004-x64
3luna-1.6.8/hash.txt
windows7-x64
1luna-1.6.8/hash.txt
windows10-2004-x64
8Analysis
-
max time kernel
896s -
max time network
800s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
luna-1.6.8.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
luna-1.6.8.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
luna-1.6.8/Bootstrapper.zip
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
luna-1.6.8/Bootstrapper.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Luna/Bootstrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Luna/Bootstrapper.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
luna-1.6.8/config.json
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
luna-1.6.8/config.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
luna-1.6.8/hash.txt
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
luna-1.6.8/hash.txt
Resource
win10v2004-20250129-en
General
-
Target
luna-1.6.8/hash.txt
-
Size
66B
-
MD5
663c32ed37147c98b24dcbd7219d3d34
-
SHA1
d5d4db10a72908522dd2977974e119f637b3e39b
-
SHA256
0e19a151b264885cdc2cb427e4c4acd296e7a184b380e3302d1eb2bf099c3d92
-
SHA512
784910780e05398e5a5bfcc8d11e190a1537a9f61b7b95beefc72137a77fbbf0f2e4a6e2b1fd49aeb9108318b83dbceb725e980cf7be686c42cb93eb51f6f091
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\132.0.2957.140\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 172 2952 Process not Found 306 3152 msedge.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 57 IoCs
pid Process 5204 Luna.exe 4588 Luna.exe 5600 MicrosoftEdgeWebview2Setup.exe 5648 MicrosoftEdgeUpdate.exe 3800 MicrosoftEdgeUpdate.exe 6080 MicrosoftEdgeUpdate.exe 4824 MicrosoftEdgeUpdateComRegisterShell64.exe 1144 MicrosoftEdgeUpdateComRegisterShell64.exe 5248 MicrosoftEdgeUpdateComRegisterShell64.exe 6060 MicrosoftEdgeUpdate.exe 2652 MicrosoftEdgeUpdate.exe 1988 MicrosoftEdgeUpdate.exe 524 MicrosoftEdgeUpdate.exe 5788 MicrosoftEdge_X64_132.0.2957.140.exe 5588 setup.exe 5748 setup.exe 5712 MicrosoftEdgeUpdate.exe 5848 msedgewebview2.exe 380 msedgewebview2.exe 5944 msedgewebview2.exe 1048 msedgewebview2.exe 6136 msedgewebview2.exe 5704 msedgewebview2.exe 1460 msedgewebview2.exe 2180 msedgewebview2.exe 5596 RobloxPlayerInstaller.exe 3480 RobloxPlayerInstaller.exe 6908 msedgewebview2.exe 7148 RobloxPlayerBeta.exe 2160 msedgewebview2.exe 6780 msedgewebview2.exe 6888 msedgewebview2.exe 4124 RobloxStudioInstaller.exe 2704 RobloxStudioInstaller.exe 5392 msedgewebview2.exe 5784 MicrosoftEdgeUpdate.exe 5036 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 2940 msedgewebview2.exe 2132 RobloxStudioBeta.exe 6640 RobloxCrashHandler.exe 6948 MicrosoftEdgeUpdate.exe 1920 msedgewebview2.exe 3568 MicrosoftEdge_X64_132.0.2957.140.exe 1552 setup.exe 4064 setup.exe 7024 RobloxPlayerBeta.exe 6344 setup.exe 4176 setup.exe 2668 msedgewebview2.exe 6932 msedgewebview2.exe 6172 setup.exe 4736 setup.exe 392 setup.exe 6540 setup.exe 7032 msedgewebview2.exe 4276 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 64 IoCs
pid Process 5204 Luna.exe 4588 Luna.exe 5648 MicrosoftEdgeUpdate.exe 3800 MicrosoftEdgeUpdate.exe 6080 MicrosoftEdgeUpdate.exe 4824 MicrosoftEdgeUpdateComRegisterShell64.exe 6080 MicrosoftEdgeUpdate.exe 1144 MicrosoftEdgeUpdateComRegisterShell64.exe 6080 MicrosoftEdgeUpdate.exe 5248 MicrosoftEdgeUpdateComRegisterShell64.exe 6080 MicrosoftEdgeUpdate.exe 6060 MicrosoftEdgeUpdate.exe 2652 MicrosoftEdgeUpdate.exe 1988 MicrosoftEdgeUpdate.exe 1988 MicrosoftEdgeUpdate.exe 2652 MicrosoftEdgeUpdate.exe 524 MicrosoftEdgeUpdate.exe 5712 MicrosoftEdgeUpdate.exe 4588 Luna.exe 5848 msedgewebview2.exe 380 msedgewebview2.exe 5848 msedgewebview2.exe 5848 msedgewebview2.exe 5848 msedgewebview2.exe 5944 msedgewebview2.exe 1048 msedgewebview2.exe 5944 msedgewebview2.exe 1048 msedgewebview2.exe 6136 msedgewebview2.exe 6136 msedgewebview2.exe 6136 msedgewebview2.exe 6136 msedgewebview2.exe 6136 msedgewebview2.exe 6136 msedgewebview2.exe 5704 msedgewebview2.exe 5704 msedgewebview2.exe 5704 msedgewebview2.exe 380 msedgewebview2.exe 5848 msedgewebview2.exe 1460 msedgewebview2.exe 1460 msedgewebview2.exe 1460 msedgewebview2.exe 1460 msedgewebview2.exe 1460 msedgewebview2.exe 1460 msedgewebview2.exe 2180 msedgewebview2.exe 2180 msedgewebview2.exe 6908 msedgewebview2.exe 6908 msedgewebview2.exe 7148 RobloxPlayerBeta.exe 2160 msedgewebview2.exe 2160 msedgewebview2.exe 6780 msedgewebview2.exe 6780 msedgewebview2.exe 6888 msedgewebview2.exe 6888 msedgewebview2.exe 6888 msedgewebview2.exe 5392 msedgewebview2.exe 5392 msedgewebview2.exe 5784 MicrosoftEdgeUpdate.exe 5036 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 2940 msedgewebview2.exe 2940 msedgewebview2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxStudioBeta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Luna.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxStudioInstaller.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: RobloxStudioBeta.exe File opened (read-only) \??\F: RobloxStudioBeta.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 156 raw.githubusercontent.com 157 raw.githubusercontent.com 145 raw.githubusercontent.com 146 raw.githubusercontent.com 155 raw.githubusercontent.com -
pid Process 1276 GameBarPresenceWriter.exe -
Checks system information in the registry 2 TTPs 20 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 3 IoCs
pid Process 7148 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 7024 RobloxPlayerBeta.exe 7024 RobloxPlayerBeta.exe 7024 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 7148 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\textures\ui\Controls\DesignSystem\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\textures\ui\MenuBar\icon_safety_off.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\Chrome\Integrations\MusicUtility\MusicEntrypoint.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\Settings\Enum\SeamlessVoiceStatus.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\GraphQL\GraphQL\utilities\coerceInputValue.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\Utils\lock.toml RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\InsertableObjects\Dark\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\Flags\GetFFlagEnableInExpMicPermissionsAnalytics.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\NetworkingFriends\NetworkingFriends\FRIENDS_URL.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\UIBlox\UIBlox\App\Menu\BaseMenu.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\Qml\QtQuick\Controls.2\designer\ToolSeparatorSpecifics.qml RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\models\Thumbnails\Mannequins\R6.rbxm RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\InspectAndBuy\Actions\SetView.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\Foundation\Foundation\Providers\Foundation\Flags.story.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\concrt140.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\telclient.dll setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\ExtraContent\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\textures\ui\Controls\PlayStationController\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Lua\DeveloperFramework\Light\Large\Warning.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\fonts\IndieFlower-Regular.ttf RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\InsertableObjects\Light\Large\TaskScheduler.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\Utility\Dark\Large\Group.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\PublishAssetPrompt\Thunks\OpenPublishAvatarPrompt.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\content\fonts\families\Oswald.json RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\ExtraContent\textures\ui\Controls\DesignSystem\ButtonL1.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\RibbonConfig\UITab.json RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\textures\ui\VoiceChat\SpeakerNew\Error.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Trust Protection Lists\Mu\Social setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Lua\Explorer\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\Cursors\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\Dash-31ab8d40-0.1.9\Dash\reverse.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\textures\ui\Controls\DesignSystem\DpadDown.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\Navigation\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\EmotesMenu\Analytics.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\PurchasePrompt\Actions\RequestAssetPurchase.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\ExtraContent\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\textures\ui\PlayerList\NotificationOff.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\FTUX\init.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\Collections\Collections\Object\keys.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\textures\ui\Settings\Slider\Less.png RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Lua\StartPage\Dark\SI-Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\ContactList\.robloxrc RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\DevConsole\Components\ScriptProfiler\Actions\SetAverage.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\SocialLibraries\SocialLibraries\RoactLayout\vertical.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\content\textures\GameSettings\ToolbarIcon.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\avatar\heads\headB.mesh RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\avatar\scripts\CompositorAnimate\v1betaRC2\AnimateDependencies.rbxm RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\Foundation\Foundation\Components\InternalTextInput\init.lua RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\Debugger\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\Ribbon\Dark\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\PlatformContent\pc\shared_compression_dictionaries\876303bc5322fbc5499ad5d572b4a57fc6305ca10adf81769b9121c45b7d3a38.dict RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\scripts\CoreScripts\Modules\AvatarEditorPrompts\GetAssetsDifference.lua RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\edge_feedback\camera_mf_trace.wprp setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Lua\Terrain\Light\Large\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\InsertableObjects\Dark\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\InsertableObjects\Light\Standard\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\InsertableObjects\Dark\Large\[email protected] RobloxStudioInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\content\studio_svg_textures\Shared\InsertableObjects\Light\Large\[email protected] RobloxStudioInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Locales\az.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Trust Protection Lists\Sigma\Fingerprinting setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\content\textures\FillCursor.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\ExtraContent\textures\ui\LuaApp\icons\ic-favorite.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\ExtraContent\LuaPackages\Packages\_Index\JestCore\JestCore\testSchedulerHelper.lua RobloxStudioInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 524 MicrosoftEdgeUpdate.exe 5712 MicrosoftEdgeUpdate.exe 4276 MicrosoftEdgeUpdate.exe 6060 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedgewebview2.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 26 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxStudioBeta.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxStudioInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxCrashHandler.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxStudioInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxCrashHandler.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxStudioBeta.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxStudioInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\PROTOCOLEXECUTE\ROBLOX-STUDIO RobloxStudioInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\132.0.2957.140\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio-auth\WarnOnOpen = "0" RobloxStudioInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\132.0.2957.140\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxStudioInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio-auth RobloxStudioInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133831564102038358" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\CurVer\ = "MicrosoftEdgeUpdate.ProcessLauncher.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\ = "IEToEdgeBHO Class" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ = "ICurrentState" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\MIME setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ = "IGoogleUpdateCore" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods\ = "17" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\ = "Microsoft Edge PDF Document" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\Application setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ = "IPolicyStatus2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\WinPos1280x720x96(1).left = "276" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService.1.0\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback\CurVer\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.43\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ = "IBrowserHttpRequest2" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/pdf setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2}\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ = "IProgressWndEvents" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass.1\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc\CLSID\ = "{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ = "IGoogleUpdate3Web" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.43\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\.pdf setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ = "IGoogleUpdate3WebSecurity" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC} MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 299918.crdownload:SmartScreen msedge.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5836 explorer.exe 2132 RobloxStudioBeta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 3152 msedge.exe 3152 msedge.exe 936 msedge.exe 936 msedge.exe 1192 identity_helper.exe 1192 identity_helper.exe 5012 msedge.exe 5012 msedge.exe 6056 Bootstrapper.exe 6056 Bootstrapper.exe 5648 MicrosoftEdgeUpdate.exe 5648 MicrosoftEdgeUpdate.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe 5648 MicrosoftEdgeUpdate.exe 5648 MicrosoftEdgeUpdate.exe 5648 MicrosoftEdgeUpdate.exe 5648 MicrosoftEdgeUpdate.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 4588 Luna.exe 4588 Luna.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 380 msedgewebview2.exe 6100 chrome.exe 6100 chrome.exe 5208 msedge.exe 5208 msedge.exe 7148 RobloxPlayerBeta.exe 6888 msedgewebview2.exe 6888 msedgewebview2.exe 5784 MicrosoftEdgeUpdate.exe 5784 MicrosoftEdgeUpdate.exe 5784 MicrosoftEdgeUpdate.exe 5784 MicrosoftEdgeUpdate.exe 5036 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 2132 RobloxStudioBeta.exe 2132 RobloxStudioBeta.exe 2132 RobloxStudioBeta.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2132 RobloxStudioBeta.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 52 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 5848 msedgewebview2.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 5836 explorer.exe Token: SeCreatePagefilePrivilege 5836 explorer.exe Token: SeDebugPrivilege 6056 Bootstrapper.exe Token: SeDebugPrivilege 5204 Luna.exe Token: SeDebugPrivilege 4588 Luna.exe Token: SeDebugPrivilege 5648 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 5648 MicrosoftEdgeUpdate.exe Token: SeShutdownPrivilege 6100 chrome.exe Token: SeCreatePagefilePrivilege 6100 chrome.exe Token: SeShutdownPrivilege 6100 chrome.exe Token: SeCreatePagefilePrivilege 6100 chrome.exe Token: SeShutdownPrivilege 6100 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 5836 explorer.exe 4588 Luna.exe 5836 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe 6100 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2132 RobloxStudioBeta.exe 5860 OpenWith.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 7148 RobloxPlayerBeta.exe 5036 RobloxPlayerBeta.exe 3380 RobloxPlayerBeta.exe 7024 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 1300 4416 chrome.exe 100 PID 4416 wrote to memory of 1300 4416 chrome.exe 100 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 4616 4416 chrome.exe 101 PID 4416 wrote to memory of 1408 4416 chrome.exe 102 PID 4416 wrote to memory of 1408 4416 chrome.exe 102 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 PID 4416 wrote to memory of 2160 4416 chrome.exe 103 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\luna-1.6.8\hash.txt1⤵PID:1920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4432
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffbd733cc40,0x7ffbd733cc4c,0x7ffbd733cc582⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,11694311332950741290,14599550521647319438,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2108,i,11694311332950741290,14599550521647319438,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2228 /prefetch:32⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,11694311332950741290,14599550521647319438,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,11694311332950741290,14599550521647319438,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3320,i,11694311332950741290,14599550521647319438,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3728,i,11694311332950741290,14599550521647319438,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4736,i,11694311332950741290,14599550521647319438,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5068,i,11694311332950741290,14599550521647319438,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4760,i,11694311332950741290,14599550521647319438,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbd71f46f8,0x7ffbd71f4708,0x7ffbd71f47182⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3624 /prefetch:82⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6396 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6836 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:12⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1392 /prefetch:12⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7164 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7244 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5208
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
PID:5596 -
C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\RobloxPlayerBeta.exe" -app -clientLaunchTimeEpochMs 0 -isInstallerLaunch 55963⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:7148
-
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2856 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:6924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6876 /prefetch:12⤵PID:6668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6564 /prefetch:12⤵PID:6664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:6772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7100 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7292 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7508 /prefetch:12⤵PID:6156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6720 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:12⤵PID:6388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2006786267940688440,11330825886378345078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7152 /prefetch:12⤵PID:5388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2636
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:5772
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5836
-
C:\Users\Admin\Downloads\Bootstrapper\Luna\Bootstrapper.exe"C:\Users\Admin\Downloads\Bootstrapper\Luna\Bootstrapper.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6056 -
C:\Users\Admin\Downloads\Bootstrapper\Luna\luna\Luna.exeluna\Luna.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5204 -
C:\Users\Admin\Downloads\Bootstrapper\Luna\luna\Luna.exeC:\Users\Admin\Downloads\Bootstrapper\Luna\luna\Luna.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeC:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5600 -
C:\Program Files (x86)\Microsoft\Temp\EU3AA9.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU3AA9.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"5⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5648 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3800
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6080 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4824
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1144
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5248
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE0Ny4zNyIgbmV4dHZlcnNpb249IjEuMy4xOTUuNDMiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjY1NDQ0NjE5MjkiIGluc3RhbGxfdGltZV9tcz0iMzIyNiIvPjwvYXBwPjwvcmVxdWVzdD46⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:6060
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{304D755B-B63E-4817-AA60-34CBA3D8F7DE}"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msSmartScreenProtection --mojo-named-platform-channel-pipe=4588.2612.147752957911467658214⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:5848 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x178,0x17c,0x180,0x154,0x188,0x7ffbd1b3b078,0x7ffbd1b3b084,0x7ffbd1b3b0905⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1828,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1832 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6136
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=1896,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2100 /prefetch:35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5944
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=2304,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2320 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1048
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3608,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3644 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5704
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2892,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3852 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1460
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=3800,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4772 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2180
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4356,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2052 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6908
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4812,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2000 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4760,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1824 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6780
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1208,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:6888
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4624,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5392
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4288,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1764 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2940
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=3824,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4912 /prefetch:85⤵
- Executes dropped EXE
PID:1920
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4796,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3852 /prefetch:25⤵
- Executes dropped EXE
PID:2668
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=4828,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3868 /prefetch:25⤵
- Executes dropped EXE
PID:6932
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView" --webview-exe-name=Luna.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4404,i,4605747540722130415,12199968151842606495,262144 --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4756 /prefetch:85⤵
- Executes dropped EXE
PID:7032
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1988 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzgxNDMwNjUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MjYxNTUzNDAwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2NTY0OTIxOTA5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:524
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FFA3CC67-A08F-4828-8BB6-D890957CCCF7}\MicrosoftEdge_X64_132.0.2957.140.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FFA3CC67-A08F-4828-8BB6-D890957CCCF7}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:5788 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FFA3CC67-A08F-4828-8BB6-D890957CCCF7}\EDGEMITMP_12399.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FFA3CC67-A08F-4828-8BB6-D890957CCCF7}\EDGEMITMP_12399.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FFA3CC67-A08F-4828-8BB6-D890957CCCF7}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
PID:5588 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FFA3CC67-A08F-4828-8BB6-D890957CCCF7}\EDGEMITMP_12399.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FFA3CC67-A08F-4828-8BB6-D890957CCCF7}\EDGEMITMP_12399.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FFA3CC67-A08F-4828-8BB6-D890957CCCF7}\EDGEMITMP_12399.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x21c,0x220,0x224,0x1fc,0x228,0x7ff6263ba818,0x7ff6263ba824,0x7ff6263ba8304⤵
- Executes dropped EXE
PID:5748
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMzIuMC4yOTU3LjE0MCIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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_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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI4MTMxNjk2NTcwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMTAzOCIgZG93bmxvYWRfdGltZV9tcz0iMjQwNTciIGRvd25sb2FkZWQ9IjE3NzE4MDIxNiIgdG90YWw9IjE3NzE4MDIxNiIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iMTI2MDI4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5712
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:6100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd4,0x108,0x7ffbd733cc40,0x7ffbd733cc4c,0x7ffbd733cc582⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,6165433606706985612,2573429761439276470,262144 --variations-seed-version=20250203-180727.403000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1892,i,6165433606706985612,2573429761439276470,262144 --variations-seed-version=20250203-180727.403000 --mojo-platform-channel-handle=1968 /prefetch:32⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,6165433606706985612,2573429761439276470,262144 --variations-seed-version=20250203-180727.403000 --mojo-platform-channel-handle=2264 /prefetch:82⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,6165433606706985612,2573429761439276470,262144 --variations-seed-version=20250203-180727.403000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:5616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,6165433606706985612,2573429761439276470,262144 --variations-seed-version=20250203-180727.403000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3696,i,6165433606706985612,2573429761439276470,262144 --variations-seed-version=20250203-180727.403000 --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,6165433606706985612,2573429761439276470,262144 --variations-seed-version=20250203-180727.403000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5096,i,6165433606706985612,2573429761439276470,262144 --variations-seed-version=20250203-180727.403000 --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4880,i,6165433606706985612,2573429761439276470,262144 --variations-seed-version=20250203-180727.403000 --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵PID:3748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd71f46f8,0x7ffbd71f4708,0x7ffbd71f47182⤵PID:5816
-
-
C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe"C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_5A1CF\RobloxStudioInstaller.exeC:\Users\Admin\AppData\Local\Temp\Roblox\RobloxStudioInstaller_5A1CF\RobloxStudioInstaller.exe2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
PID:2704 -
C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\RobloxStudioBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\RobloxStudioBeta.exe" -startEvent www.roblox.com/robloxQTStudioStartedEvent -firstLaunch3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Enumerates connected drives
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\RobloxCrashHandler.exe"C:\Program Files (x86)\Roblox\Versions\version-35ab2f0d73f349ee\RobloxCrashHandler.exe" --no-rate-limit --crashCounter Win-ROBLOXStudio-Crash --baseUrl https://www.roblox.com --attachment=attachment_0.658.0.6580461_20250204T153436Z_Studio_DD697_last.log=C:\Users\Admin\AppData\Local\Roblox\logs\0.658.0.6580461_20250204T153436Z_Studio_DD697_last.log --attachment=attachment_log_0.658.0.6580461_20250204T153436Z_Studio_DD697_csg3.log=C:\Users\Admin\AppData\Local\Roblox\logs\log_0.658.0.6580461_20250204T153436Z_Studio_DD697_csg3.log --attachment=attachment_log_0.658.0.6580461_20250204T153436Z_Studio_DD697_dcd.log=C:\Users\Admin\AppData\Local\Roblox\logs\log_0.658.0.6580461_20250204T153436Z_Studio_DD697_dcd.log --database=C:\Users\Admin\AppData\Local\Roblox\logs\crashes --metrics-dir=C:\Users\Admin\AppData\Local\Roblox\logs\crashes --url=https://uploads.backtrace.rbx.com/post --annotation=AppVersion=0.658.0.6580461 --annotation=Format=minidump --annotation=HardwareModel= --annotation=HasBootstrapper=true --annotation=InstallFolder=ProgramFilesX86 --annotation=OSPlatform=Windows --annotation=RobloxChannel=production --annotation=RobloxGitHash=6874f45ec658019a67f19ab7de6e688c50292b01 --annotation=RobloxProduct=RobloxStudio --annotation=StudioVersion=0.658.0.6580461 --annotation=UniqueId=184778647051398651 --annotation=UseCrashpad=True --annotation=app_arch=x86_64 --annotation=application.version=0.658.0.6580461 --annotation=host_arch=x86_64 --initial-client-data=0x414,0x418,0x41c,0x3ec,0x424,0x7ff689f490b0,0x7ff689f490c8,0x7ff689f490e04⤵
- Executes dropped EXE
- Enumerates system info in registry
PID:6640
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5784
-
C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:5036
-
C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3380
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:6948 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\MicrosoftEdge_X64_132.0.2957.140.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
PID:3568 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
PID:1552 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7b028a818,0x7ff7b028a824,0x7ff7b028a8304⤵
- Executes dropped EXE
PID:4064
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6344 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7b028a818,0x7ff7b028a824,0x7ff7b028a8305⤵
- Executes dropped EXE
PID:4176
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵
- Executes dropped EXE
PID:6172 -
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6c43ba818,0x7ff6c43ba824,0x7ff6c43ba8305⤵
- Executes dropped EXE
PID:392
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level4⤵
- Executes dropped EXE
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6c43ba818,0x7ff6c43ba824,0x7ff6c43ba8305⤵
- Executes dropped EXE
PID:6540
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjM1NDVGQzUtNTA1MC00OTkxLTlCQzUtN0VDQzhCRUQ2QjdFfSIgdXNlcmlkPSJ7NkZFMjhFREItNDVEMi00MDY4LTg5MEEtQTA3OTU1NzdBQzBEfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntFOTU2ODRBNy03MkFFLTRGRDYtOEJFMi1FMUU4MEQwMTM3MUJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE5NS40MyIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGNvaG9ydD0icnJmQDAuNjgiPjx1cGRhdGVjaGVjay8-PHBpbmcgcj0iNiIgcmQ9IjY2MDMiIHBpbmdfZnJlc2huZXNzPSJ7QTI1OEY4MUItQzIxMS00NjAxLTgyRDYtMUIzRDMyQ0M2RjBGfSIvPjwvYXBwPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSI5Mi4wLjkwMi42NyIgbmV4dHZlcnNpb249IjEzMi4wLjI5NTcuMTQwIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGlzX3Bpbm5lZF9zeXN0ZW09InRydWUiIGxhc3RfbGF1bmNoX2NvdW50PSIxIiBsYXN0X2xhdW5jaF90aW1lPSIxMzM4MzE1Njc1ODY3NjYxODAiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9Ijk5Mzk5Mzg4OTMiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iOTk0MDI0ODI0OSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI5OTc2OTk4NjkwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PHBpbmcgYWN0aXZlPSIxIiBhPSItMSIgcj0iLTEiIGFkPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0ie0I1M0Y4NDZFLTE2MzQtNEYyRC04M0E5LTc2ODEyNkU3QjM5Rn0iLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4276
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:1276
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5860
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\1f02249b3833478eb0827f074d2c8794 /t 3648 /p 21321⤵PID:5792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
PID:7164
-
C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-dd2acaf7460f42ee\RobloxPlayerBeta.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:7024
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Discovery
Browser Information Discovery
1Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
7System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5b4c8ad75087b8634d4f04dc6f92da9aa
SHA17efaa2472521c79d58c4ef18a258cc573704fb5d
SHA256522a25568bb503cf8b44807661f31f0921dee91d37691bf399868733205690bf
SHA5125094505b33a848badcffd6b3b93aad9ad73f391e201dee052376c4f8573ba351f0b8c102131216088ffb38d0ed7b5fe70ba95c3ac2c33a50c993584fe7c435e3
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{86903FBE-7872-4C9D-AA8F-9BAE24623903}\EDGEMITMP_26BC3.tmp\SETUP.EX_
Filesize2.6MB
MD5fa8b2df3480c5552aa1a1b3fcc0c2bd7
SHA1630a370a100f854904d223f5145cf77933c66e24
SHA256464543801afc88cca0a80b76fb8591e5ed70820f34268c983edde5b8d9908725
SHA512255b012683138f1d26619693c7b309214897be9f5689c5842cdeabdb613964aed63724b5f6e8e9f37f08fa9bd3c9af4f37831f62b7a45464d57ac753aeb9e4e4
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
182KB
MD58f7c44e937ecc243d05eab5bb218440b
SHA157cd89be48efe4cad975044315916cf5060bc096
SHA256bc3cdd57a892ce1841787061e23e526ad46575460cd66c1dc6dcf0f811563d59
SHA5129f0020b81d1945fea12efe1a0a5e59caae4a01432429e065e35c73b15db873253094b2ff1f8903a348446dfc9c9fb658f8bfed8c25bc56e8b546c16304a385a3
-
Filesize
201KB
MD570cc35c7fb88d650902e7a5611219931
SHA185a28c8f49e36583a2fa9969e616ec85da1345b8
SHA2567eca199201273f0bcff1e26778cb535e69c74a69064e7759ff8dad86954d42b1
SHA5123906ddb96b4b1b68b8c2acc940a62c856e8c3415a1b459f17cf2afc09e05751e0086f8e4e5e0ddd8e45cfb61f811bbe4dd96198db68072b45b6379c88d9ea055
-
Filesize
215KB
MD5714c34fe6098b45a3303c611c4323eae
SHA19dc52906814314cad35d3408427c28801b816203
SHA256fbf495968c4a385ff0790e6b65d26610ef917a2b36a5387eff7ae79d7a980ac5
SHA51268a65496275a1511b2d3bd98ac5592cb1c1eb9df0448471a8985cb2f458c66163e6d55545940de72dea80118ff8ec7ba0ad3276f51095f55c1243fb9f3311345
-
Filesize
262KB
MD5c8b26176e536e1bce918ae8b1af951a2
SHA17d31be0c3398d3bad91d2b7c9bc410f4e45f37be
SHA256be6ab7dd506e44a0a9eb0dd531929bd8aa0796d85a0353e6944bc6bf1630b717
SHA5125a362cbabebbffbb0797646576b65e2934a3b0a30306d74078ef2448fea3940df14f0b8f149691a100cc170bd548c9b420dcc8aa41eb1ea0700c9f155626c565
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD540cd707dd3011a9845ff9c42256ea7e3
SHA14045ae709979f75b1cf32142c1137b4be2ab9908
SHA2569f4c7072716e0be1be08207a7024a5e41162e288e677d805be8e5469a8bd4909
SHA512bf1ada8a0d9c3d9f39fb739d05fc4a61f0a7e0e1bb5eb44e6f0f5f58381ee6d80aad89dbc3211b70a6294fc69d5820c70fa8488ef2f793a3710ecff5ee90422e
-
Filesize
29KB
MD5e91e279752e741b25cf473338d5aac88
SHA12b8ea61868a26408cd1dd351cca5139a046bbb7b
SHA2565635ecedd84330f070a9d6f4cea8b8b81e9dad8592d336ebfd236b7d67e58acc
SHA5127404cdb82309351a21415b045fc7165137492aa262d00fd0f74bad4262ce10e86c3bde1718c38757b7133e41d044035e731c52cccea285d659c4a570776ae535
-
Filesize
24KB
MD5bd175cb3dfc1d43944223bd5d7177539
SHA1193623dc372937f31a545344d340360665b8d69a
SHA256bf0d65cebe0c29f15a616a0dda2f1a414e3f96fe7a28ff7876e811855be6621b
SHA512f5742352852837ce16f3cf1655e4d41e301f0351b68c7346457978aa310b95b69b1070741fc2ab8be5ff449f6fd44660df3b15811630efc1420ced1455fcaf5f
-
Filesize
26KB
MD542015aafd53012b9c8afa009ee501fa0
SHA1c1fc049feab4fb4b87faf96c31b3d1160f1c1d39
SHA25686858a1807e6cf0b91565ed7a5a15db24720b0a7f60ae41e67dbf9faeb6ef2fa
SHA5129ce323da000b51480ee35973872fc7d181e1f69e820ac737c62c36eaa81eb99965bae39fdd394459adfaf8f746f5dc3b768015e01d8724e2d0718f5286c29389
-
Filesize
29KB
MD58a54873d54a41442b62f9fea9492d3a6
SHA1fb19af151b15f4bdb7a555924f1835b0337ff1d7
SHA256af9bdd050b27b8883f72e3596179fe244a6a2e3545950c82889aac7198cf3c32
SHA5127cc0a578586853afd027264c3898cb1460b23a47eab9c79e064b9f327fbdee6e3f9bc7043a5a76a710ada05edae4ac0b47529be3ae67ca9b5afaaa16151797c7
-
Filesize
29KB
MD5e47db9afb646fb31cc8650837f487134
SHA1f304204c908ea1fe2bcaf76040d5d1f13f1e99e0
SHA2564e03ed7a538793fdcd4c646c62ddd278c46911099e6485bb2644a17ad3a8ecf6
SHA512b2b01c86c78ec3450635c0fdef9666ce302600956e8def3bb02d205ba2a11b3d422520a64361c6f666998bd82b5557ec96cbcaba9e1b712c756e75128c8f9bc0
-
Filesize
29KB
MD55887cd452245dc7bd0389a0ad5db98e0
SHA16486d0ae59ba338e8bce87b438f86691e955840d
SHA256922a102cae4e74bfc0b402bbb136116eddc71a8adcf7f1268d48006c858d1d60
SHA5120720aaebca04e84d8af2d7b153b0fc51e5651cf664051b8c4b44159ed4c6328eb237ba4f4c97bebedbb1a45ca5c1d0f249cdccac76c6d5619e0e761d12aaaba1
-
Filesize
29KB
MD56aab6d42c7b7a90523a3272ad3916096
SHA1cc638bd6ec6478734b243de2daa4a80f03f37564
SHA25667180722f255985e849ec3ab313dcdc0bf2834bad7b6163a0b14587fdf4b4c66
SHA512ebc17e0ef86b8e5bb938040ad78b299e33d1228c730666526aab27e464626b71ea900cb6dbe074bda5e42e77cd569b083637e233d757b8b0bdee2df2e0c509f2
-
Filesize
29KB
MD5abc20df0545611a835dcd895d2832cca
SHA139e90363156c461e5aef64a714ba43cc61617ee5
SHA25675d8c2e259b4d113c0967615af61e8f54eafb49c498767291627faae9fcf504b
SHA512732f31d175f08c5c69b9cf540e2b0e72b8986b44d1ebfdf0e56eb56b68bea64e6446932a546f1fc30dbbbad4ccaf6bc935177a6348c5280ef786d6d8dfa7b325
-
Filesize
29KB
MD5327e92c7a55ec996ce09dfcf8c89e753
SHA12a51c99519257ddebf0d8280d46e0c0fd416e7a5
SHA2562b61608a7aca43b7ea4374b79acc6e15deb382eef0fa8751c8e57e03e061cab0
SHA512ac3ca0f66b899759f0d23ba64ff291486edb1e1d3bb626ad3efe3e3a6fd2aa4081411546e4849ff1645dcd26161f35defbd8442278e6d6f66311780c60474296
-
Filesize
30KB
MD5e0d2675c6de1b8d4e5e463246529a304
SHA1132dace535b9cdc7a4e5f6137407d5becb23c4c6
SHA2564af082aa0193b9b15622eba1f6165d0b6032b4dab17ba16a8a9affb267ebec34
SHA512afafc1ca5abc636066ee98a6c68356d68f506fe3734a4b3e68073eed1f2ddc51840464e91d3cd3b28648fcc26b9457ef6484100f9543739220ad75a9eecb1e90
-
Filesize
30KB
MD5bfac1c3869df5375aedb24458cf321b7
SHA1848232c155c7dca65f6cb22d27a72f2c78e964d8
SHA256a9f5cf25b9512e1d30ecb769a5eeb694888b72b7f05b78c417814802c5aedbd7
SHA512732270e8e8036f8ec59c214ca3804c6c67420bcf5fd633347c764f90b06b25fd73a0c7aa75ec42461ae3d3570fbfec5c5a7eee10e8d494b805b7c7e0d4aa227e
-
Filesize
27KB
MD5cfb71031c56d9e8b9490d01fbe86302c
SHA19e11ecf5efc88e0beee1db46620bebc73f86dd21
SHA256b18e14d0e24546193822b83996c5b311500ca213beb4d497cbd1dda9dac9db2f
SHA5129cf993ea53673e416eead78d45a6d700b74001b69b1b987d479e77348ea8dc151f4ba6d6b1220db21ce792f9da51b9c83f33663621f9350b848a766ceae92370
-
Filesize
7.3MB
MD5e7fe5da37b9557006df98641d1324524
SHA1c3941a2ff73ac5dbe5b6ea7c8f7bc74e40dfe3a1
SHA2560b2ba3e0bd18a26b4e230c31b70d32900561085465e60772fe54e7d39a0aa831
SHA512239dc9e04db9857a68b7064d222d6a5bc798e215ca2d009e14a69ba784cda68b3472aa9b118a940491adce1866dae4b2b6450c3188c2aa46a708fe499c65d3a2
-
Filesize
280B
MD53a5bc8607236d7fed44145020a311638
SHA13dad533a7e3330dd877676b6552a15ffdf200c09
SHA2560c0e96965b97486c8202314501d67c22090ad0107256ec5417a135e700c35c7b
SHA5129d5d75a978225958384b9edec6eaff6304ce8ae8405e5071f1b8ec52d67d273e0c04cd9e5351da02b58f0792a7b67c97da52e1adce1695a0b3461cca6818687f
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0
-
Filesize
80B
MD59e72659142381870c3c7dfe447d0e58e
SHA1ba27ed169d5af065dabde081179476beb7e11de2
SHA25672bab493c5583527591dd6599b3c902bade214399309b0d610907e33275b8dc2
SHA512b887eb30c09fa3c87945b83d8dbddceee286011a1582c10b5b3cc7a4731b7fa7cb3689cb61bfead385c95902cab397d0aa26bc26086d17ce414a4f40f0e16a01
-
Filesize
289KB
MD524a3775317d74ceea8fba6f0cfbce562
SHA1fed5009eb51938d0894a9bb7aee8a97873d9b6f3
SHA256192b206ad6f649f6c8767f6a3b11d9c5354710602bf0aeb4157eea08d7461ef7
SHA512245951359283bff026aad50f7768a9aa59c1926ca7aa441c8f6a3715be34925332eeef4115a442a7841429400105d59d13937ee3aa9b80e83f1982893aefaa8e
-
Filesize
102B
MD52c2e90b63e0f7e54ffc271312a3d4490
SHA14eb9d97e1efc368420691acb2e6df1c61c75f7e4
SHA25672dbb7d6b647b664ef64b6a14771c2549c979b9c57712f3f712966edb02d7b2e
SHA5129ec9e8a34cc56a694ac845a4344600b479d11347ec5279d955ab4cf55590440f3491e0a1b635ddb9db821630885e5fd63c269fc2a5d1abd0a0d0062ae21dea8b
-
Filesize
114B
MD5e6cd92ad3b3ab9cb3d325f3c4b7559aa
SHA10704d57b52cf55674524a5278ed4f7ba1e19ca0c
SHA25663dfb8d99ce83b3ca282eb697dc76b17b4a48e4065fc7efafb77724739074a9d
SHA512172d5dc107757bb591b9a8ed7f2b48f22b5184d6537572d375801113e294febfbe39077c408e3a04c44e6072427cbe443c6614d205a5a4aa290101722e18f5e8
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
Filesize
116B
MD52188c7ec4e86e29013803d6b85b0d5bb
SHA15a9b4a91c63e0013f661dfc472edb01385d0e3ce
SHA256ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62
SHA51237c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656
-
Filesize
94KB
MD5de21473a5616e45b7ed4040257f3ca64
SHA1465b86f245817db5d8ecbe7a69d254989c1d05e8
SHA256ee56054d6aee56c6797af1335a0817591f433e165cf327ffa37b8660499a6b08
SHA512ddbdde3e2f98a7c46e684ac2e5a41bc5be7b5f0f8ef43bcac70e144d09c0a2c55b067fa58c607e03610b4a98961b49ac11b1488f1798354a5d2a7491c587d237
-
Filesize
40B
MD5382ed59c22f4d9dac1f22f54135a1d51
SHA12d231f98ac637ad15026bed1447e8fa3ad891b91
SHA2564527bdf816c6f5bddaefc88f3e50516ccd5a9493b374fe998873326b854b89c8
SHA5120fe1649d2c14c414bfa6f8efd052e1b8f97d352cf764ef34c89c1531f3a5f822f2c998ccd75c73c503fc9ad9a7bc5e3b7088e26493e5c851fd5134a58de552fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\76a1b303-c26d-4231-995f-9b30a2396231.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
214KB
MD5ba958dfa97ba4abe328dce19c50cd19c
SHA1122405a9536dd824adcc446c3f0f3a971c94f1b1
SHA2563124365e9e20791892ee21f47763d3df116763da0270796ca42fd63ecc23c607
SHA512aad22e93babe3255a7e78d9a9e24c1cda167d449e5383bb740125445e7c7ddd8df53a0e53705f4262a49a307dc54ceb40c66bab61bec206fbe59918110af70bf
-
Filesize
168B
MD5948e591fb2a696ccc334956acc6fd57f
SHA184325c4c1a9a2720df05f5d885f1b711dc9549e9
SHA2566587f30c63216f0595d75b4a3d203409a4d2cddc8cfce91525d127522137bf07
SHA512d44a4a88865ceda0ba7f18dbdfc5b6347b1d57160fa52dfc4931bdaf9d2a57892ff4458c37dfb0ec7693416860e1f5e65d427c643e676d883d7eec900ce7a249
-
Filesize
168B
MD57468748a31e1b3cd0e28151e37adf2b7
SHA14df3c9c65f02ad251fc498f07fef5de5aeed9b8e
SHA256cd03d02f5bd065d4932ffcf6af2a482db1b71dfa13616db62fe34c0601b059bc
SHA5122081a3f710cac36402b4a49c6f372cf1229e159fc30d31f7ebec9d98a66aedf2df81760b9c7c2c9ee00949d0a86276d7620f6e6dd0a2623121021f4a25352093
-
Filesize
2KB
MD5693af457c20ee58584cc7bb6e7aa59ee
SHA1185eb3aff3d496d6e6caa32196c1ad3fa4abf7c8
SHA25663543b10a426c079008699da9096da31add088ece5b89d9c041de2d8a555aee5
SHA5123beb935900818823cf5480147f6283415be7563e9003e708753b6b5052cbad520f46f00fcf189ec7b83fa188ae72ae5edc418b2e5ec997958237431f0acdefe6
-
Filesize
2KB
MD57c6b9d78642a2359b4cf99482d927f20
SHA195eda7c7f5a52e9e94049278ad2df8f1ed921256
SHA2564ff3ed10cdebbdd6203fe2fecc115469779bcd4f24736ab6ea107624f3eea0e8
SHA512ef82c6310d2cbb52de1160bab44af6d0c3711c193b1ffcebb6310ef9ffa66429e8dc26b64291f2c7dd211799be93e11e55c93d4c3ec40d4caf53ade16922e5f7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD55c4b0c0728d514cb299e1bcceba981d6
SHA194104234bb07750718bbf1d9646b340aceb5a39a
SHA256531d3b46471c68814f397aedacce34241890097453ff1c49232592e052c02c6c
SHA512a6fdca45c5f654f21388f43e4ef4d05625477e262d1e8e1f0229d29697fc4019adfc253b4fb13ed173726d699403da1b402cb2743dcc343cd40e95bf61d5af39
-
Filesize
356B
MD549718738f526542df03f0e9c5d1e191a
SHA181aefec943c2e5c070674d16c54a50b077fb5efa
SHA256fc660a8a495430677bd217cd356e026ce97f6f6f9bde37ff7e4e9c2543209262
SHA5126321f15e555d2b8cd49939cb29a23291b67cc6cba153a1deb82baeba67a8772aefded14fbd3813b55f1c1804f03ba0daba712ef0809c42805ba1a365e0e6d666
-
Filesize
8KB
MD5e17c2e3345c07e90490445b7c17fa7d6
SHA1e5174755adcaaac0ecf468914c4d6f89d0850ba8
SHA2566fc47ee86d9d29c863cbf828af855afa9c8668ed90db439fa0d9463fb45f465f
SHA51201e279c55094f4202cb70fc4d1940443b6f6d9f1d35f7af19cfdd90206963bef7fe55403401e7e19e5944523e3fb9142927035da8cfbe928b07a3ec92d8a118f
-
Filesize
9KB
MD5145a460e0315f29290f95fffadbe3a60
SHA1220ac9c0e6d92bc256deb2ce1821d3bc823b2c3c
SHA256138d3f093a2c789be2c94254f1b4fd1a2eaa136514f4829347c8fc729875c080
SHA512de5a3621a15a39a4b3963b436bffe04fef325a0f15e1d9fe5c9778b8a66190b198a8127ad11e41461ca02ca618c1df1c43dc593c9a933c23d8eb50ff47d1fd70
-
Filesize
8KB
MD50b6e525cc43e620f26275eff0d55c510
SHA18c9189fab4e4fe730a6c28e4302f0b3f316e7084
SHA256cd43eb77517074b2ecd8e3fb7dbb599adfd5ef5b57fd8f79c746e54087b55370
SHA51262cdf5b06cf27d675aac34d2980ec48197f6e0a6e54b4a00db22346026f01e137686dcf0d3e54571ac7ed7658026bed8a422061227ce3893cb2f38904edb13d4
-
Filesize
15KB
MD534d55681299148357c50237fc5b713f2
SHA1a23bccc790b1f95832f35c267a8c328d312c0c32
SHA256a1e2b8bccda4c8d49fd577260599a2557e63c531904b4f37d48cf0bbcf60322b
SHA51241d8be4a0c4d8e063b07baf6193ed23c5a24eebd96c5fc17f197c9dc067a369370a80e695084756f439dc12f8e64751e85f436a97d30fe8e5354b307abac8275
-
Filesize
243KB
MD5f24ed7ee79488635f9f6f8001f65559f
SHA12dd9277b391b40eb163bfb19b76877d834b11a89
SHA256662a7dab938c6c9a953af716c0171586b71f785d5460f167788727ed985cc9e0
SHA512c9ebed9577c275a96f7c330e8cdc6d201a6cb71f539929e86ce80f8990fc4c81eb06ab08c5c166064a468aac8a8137341718724af68a4b8abf69b2a6bc8e613b
-
Filesize
124KB
MD5068fb51afdec482b417aa8b6a6d7bea4
SHA1cab183dc5b37eb5e332060189040c17973ad6eb5
SHA256e2215eeae2221b5674a6f347b771b1b977e0809c7f16b4c65f87a7c4af0fa8b2
SHA5127cb301abd0bc3929e01c2944f4e2b7018dc184e8705498e48901fb05e63ab3dfdd0110a0a7fb96e6fa569348af099bea145fd5c8fbcab0434a58d83ee228d80c
-
Filesize
243KB
MD501716068f8c83fd7e8bb46efef0297e5
SHA1e54f047079d50c1a46fb28d3de239a4c2331fa3f
SHA256646216ea461a8aa20b2fa7b3e72f2d22f5e0237e1ac771335a175039607b9cf4
SHA51228ec3c61b916be1381255384dff710c916b3f7f4fa27758877b393958c7a55830f41a77f9c42816ba0675a52d2c62b59fb8f155472ade5bc3b4903f8485b46c2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
152B
MD58ea156392347ae1e43bf6f4c7b7bc6ec
SHA17e1230dd6103043d1c5d9984384f93dab02500a6
SHA25640b28bf59b3e2026ad3ebe2fecf464a03d7094fd9b26292477ad264d4efc1c75
SHA5122479b86a9a31aa2f260ff6a1c963691994242ced728a27ffa2ee4e224945446a191bdb49ce399ec5a7d5d362499716133072e97d4253b5b4f09582d58b25144f
-
Filesize
152B
MD5a7b5a5433fe76697fec05973806a648c
SHA1786027abe836d4d8ff674c463e5bb02c4a957b70
SHA256c8d623536ebdf5ffbefb84013d1c8ff5f853b59f1b09c80364c32b8ed5e4a735
SHA51227be4c82e26468bbb9ce698ef305320f6cac46c953f88c714a0372fa524d098b9af2a87a88b14a134ff0f5f4b3d671902908622d2c7ec48e2c7bc458d7f5cc16
-
Filesize
48KB
MD5df1d27ed34798e62c1b48fb4d5aa4904
SHA12e1052b9d649a404cbf8152c47b85c6bc5edc0c9
SHA256c344508bd16c376f827cf568ef936ad2517174d72bf7154f8b781a621250cc86
SHA512411311be9bfdf7a890adc15fe89e6f363bc083a186bb9bcb02be13afb60df7ebb545d484c597b5eecdbfb2f86cd246c21678209aa61be3631f983c60e5d5ca94
-
Filesize
67KB
MD569df804d05f8b29a88278b7d582dd279
SHA1d9560905612cf656d5dd0e741172fb4cd9c60688
SHA256b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608
SHA5120ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
25KB
MD5e580283a2015072bac6b880355fe117e
SHA10c0f3ca89e1a9da80cd5f536130ce5da3ad64bfe
SHA256be8b1b612f207b673b1b031a7c67f8e2421d57a305bebf11d94f1c6e47d569ee
SHA51265903ba8657d145cc3bbe37f5688b803ee03dd8ff8da23b587f64acaa793eaea52fcb6e8c0ec5032e0e3a2faacc917406ada179706182ce757d1c02979986dd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD50403197ff6c7d40519b7718f154e0d70
SHA139d08290778b6ab1a1952a02add332f2708a1481
SHA256895d8e6bfe9204cf1f89be5b72718c2240b52bbba80aeb0cbb5edbc26a062c5c
SHA512fb2ed67a2850c325c561c047e3b7a415607d96e41a9826a2e325adcf63d5aea64a80214611110f229f6b0a9e914b2e1b64fbc1237fbc73fceacdadeb778f932c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5b76fc8d6d6a52182819e826368b5e4f2
SHA1190c0caa6346463155674473115758cdbfe73bbb
SHA2563098b31221871db92f29a6499e22fc636f54d98a9a88b5e00a6e9df3c498b523
SHA5124d12d59b000dd330582789d751567648ffcd8743a7c5c7098749cc84df478113f6c9f3b4965ac867a97c4e1eea8acacc1e827ebf3915b1e796e8388549b16e08
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD552c4298a33e70f5123f4236b6a3d9b89
SHA11fb539015eb21d3d58e7bcb40b661bebc81b7334
SHA256461c0696033c94ae3396d6b1b408a797a1cab744768ca61a7434b974352f3211
SHA512243abaebb489dc218a43ae88a3d7d89221f49610b2beccc9b1aae86fd64d15ccb2dbc3f614ab8e7f048904c270e0e369492a76b3d7e3c9ca7cea53c1490b0f31
-
Filesize
1KB
MD56d586c035e7e94b3d627321fdaef4683
SHA1548c864149f7da79e3aec01db462ce907f597534
SHA256d86b0c07e8c28f0d70a4ce54803b4cae0fe31746a3b94b65c27914752e5b78f2
SHA5120d35fdb99ddf8b0ee4bba9ec63ac546fe0cbd63cea585fa7babfeb97bca12aecb95da65811da7f05a4f67bd3cfa990f705694872ee884ddca10f900dad106289
-
Filesize
1KB
MD509d31273b81f30b726482ebafaaa6b98
SHA1d20cfc7f43d0b303d610bb5c435c15590965c89f
SHA256870ccaa5eaad6b0f0b19b960a4422768f9b91983c3320f3fbec777daf574209a
SHA512606fb3dc97fe81b0f4bc7d6ed4982ab051d1dc70ed40f79f02e8728e8a0fd6c0e03589f3c7eab83aeb298b92495c731f12d1e12727cb3dc6c3d48116791cca7c
-
Filesize
1KB
MD572ff4c461d5edd1c9655f37fb3569e0d
SHA16f9467d81495cc1309686315164f143b8269161c
SHA25656c3ef5780e3265ed3ac6f59f8520972c9f1135acfd4f867f6e8884de33f7746
SHA512701e31e484cf9632c4bcd6e5fe5feef31a5234c5f13f90b021da462bdb5ab03d38199bd0859a053271d320154315c3480d1b0d5c0e7a668e95a5b32c11b214eb
-
Filesize
1KB
MD5332354ec83646ca5a1708e8d10089b89
SHA1aa87afa1ebaf5e310b4e3286006306aa5e23af55
SHA256b1b803206a9e34feb169d1983bb17b6f114f4778612eb35d6c17650b5dca7e98
SHA51227660e414d198286bc57b14399391727608ab00bed59325ae0dc11cf6f866ea0eadf50c0665226aaf75fc5a82404e5af4a9ade949a2cf313bfa7bded0f36bb96
-
Filesize
1KB
MD51b2e9ca54a7361b7c03fa93abbba8d70
SHA18dc282a960b4dc18a59e454aafa4e35da070ab0a
SHA2569ca9a4feaff7410c75d6a10ab6e99d390ec837573fbbefc20967fb4a9f7dcff6
SHA5128893d39c5b5ff794fdfc39e93bc46d1a77a03d13c1e3add43efbcb77c150230fff686aaf6b21c5a2a1c5314dbbdc949ba1a4dc38edce9b0b0afd748a5be29040
-
Filesize
7KB
MD599f9e342fcf9da11a674510897d646c3
SHA1c34950f6acccd493453aafbbbec54e20dc436bd4
SHA256a2b75d0efd8655e129e99c94aa1663f7145eefb70b9c085b51f30be1fdaf679b
SHA512d7b9bbad88c85647591586e431eb0c5ae5a0289483fc508e42ceff9b2b16c5e8ae49a2ee09e33ebdbdcd43ec6320a986b78edf4fc792957870971e73bee9a70a
-
Filesize
6KB
MD554174aa7e2bc5baf427f4fab0d472538
SHA1ed59f0c8396b14d4de1e1e6ac2a44982b2be1695
SHA256c45e49722fbc3941b1e31bed6ce6cc640e8ef4a2571e3ba8095b4271a93e4cb4
SHA512f4e269877260fac0be58b77245a7c5ccc51df3e45d9f4c7238abe950efee9e0cfc27c3785ec01a9cbf56c8774124099ab6f6767e7a764dc65b8eab1aee194a4d
-
Filesize
7KB
MD5f19c664fd62c5eaaf24c86f079792276
SHA1d293bb3ecefdd579c4361b456c49a554dee0acee
SHA256353e190ec044fcc3e1198221b52bfa05af276c5aca5e34ef71b616dbf4d0b5a3
SHA512ee522019ba4276b4bec57c2865f8d996ce0dc07b353934c609c29a772a2e558b7324b091233b27695401fef0c5a4829decf3c11f25291d8f85525637f2e170f1
-
Filesize
7KB
MD50ae056a1ceedb96fe591aa52a8e98f4d
SHA1c9adc3a79bf93c9473ee02d7527923a68261994d
SHA2565b61b012853270a32daece38e11c982404a57c46b1750a8b4ba2a8431fd2ea33
SHA51294897b3fca262489e99c2252c96fb1d13f145460e44c883c9d01efb8cf61ce5fddaef0d02f9472ff92f56851de99ac1713ca04250994b99ccdbc38339893028e
-
Filesize
7KB
MD5895224acea555dffa3e066dc3595c61c
SHA1b74a5ed7da63a2ee4d6fb28a8b18769fbda1ad39
SHA25676617a7a6f0dec8941c0dc9bec2f729a8550622e0c5f3b74b77e08a66166d726
SHA5128669d34ff5660a1d6ce62b864c64baabfa82d49ab289356baaa5faef8b63a59d31935ebf7ae69dc7b9c557b07bfefa5e655c4f1dbac6ab7e05fa83b3bfd32f0e
-
Filesize
7KB
MD5e73914b66585dcd73b3f07e6102ebcd0
SHA194d1fd7a293f32b9038b73b061209dcadf159686
SHA25620010e2bce9f0b1cadbad5c679104d177c8b6f1ec400e5bcd06104577a53e7fc
SHA51234633715699b690b81ce8f0e2f854c46c16cec137aa2f476368c19ce3275ff80b32066e6ab54c39b834380f7fe067d9e504bef901bc926a23a4a422df8965fd7
-
Filesize
6KB
MD527145e38f0560f039e73c17ad4315bd0
SHA19d5e7a951331ace218a7287d258b63787ea04436
SHA2566e0beecd7d3ca0c57bc1a05bd132da90d74c381584f263dbe753ee4645552a5d
SHA512ec93168e98115258d7a288c2404ef3e496a626d1613fbffdb2fd9a63db426db0d2760a78f53d6070c57bfe9fbc9f2ac6036ac8a23afe2bba4d9dd5efc260da55
-
Filesize
7KB
MD543b47308c14e56828f099f2769b5dd7f
SHA185545cb495424855786b56fb1aecfedec43a584d
SHA2564180dc71ab5dd34749b3596644d01e8ddbd7dafe5a68e36c092ff5461dc0919b
SHA512091832d051070c303b6cc2eda8b9ea40c89c0059737d8d66ce7737386a23f238f260df6a9f02d0a6e52b04d266e7bb47d81f3606e0e9dd357f20158396692e10
-
Filesize
2KB
MD57cda7fbbcae91625ee15447a8a9cc490
SHA16449f530fbc9b0dcb9e72173c63963ee3976cb59
SHA2564409418e1ff16db34db12cd82085b054a6e3e650724d7e590ebdb3c5985afb91
SHA5121ff987c66454b4069110e0aeecb1b45ab2fb49c131f09d0a12357a52b0546103cdf3e84bec3e73ea09dc66571f7d7f23eccc24dec45f3fbef80c6842c2c78336
-
Filesize
2KB
MD5ac75f38fd84481c2e4e32151830bd970
SHA13d5e08e76e4e8b5ee6c70245ee1ad784673a49cb
SHA25664c1b4327ce33bf469d395de3eb230a010042b74dc6bf46dfb3027c882fbf0d9
SHA512f842efa844803d7a62174769d8695ba023b8b4f4bb9802ae156fbfa49c6f7078c4d71bacb3d8de3c4a88e42bd1a80181cddff92439f8237dcf94bded7aa37433
-
Filesize
2KB
MD5cfd85c997d73d76d3285b07929d58e93
SHA12a18cde35e8ff78035755978893caa6c1e8a62e4
SHA256474f2c3f96781d2e3ee53c9dffacd875f6fd7ca346e6583acde8894996e04ecd
SHA5128e3bf47f584a233ccb1a5612fb48c93ddd1aa49b7f00d66d995db98e6df05e6b83f72ff5890520bf06726869905d8fdeeab413a59559fecf3c3f08370a18f789
-
Filesize
1KB
MD59a5d64411ce3761dbf89598da84fc628
SHA1850345d00635bfd79180bffa8274946bb470d5af
SHA25616cf2ac80983cf546f1b165c4fcb9202393594695ec63f069a159e8666204427
SHA512c3a0253dbdb12059ab9d10ae2b4b6a23e9825d84643651c33aacfc9525032d6c2280e7dd40ed98d32fb910736e2cd6b956f4654f0ae7d308f648ece84270878c
-
Filesize
1KB
MD5c80b4700c128cac2e37f7d94b1b50040
SHA1fb99ae330b18cac81cc63b2f202d58f400ebf910
SHA25648b7ced502a7bb72aabb9cc8655a9da8fa026b1de727d95b3869412e8f082259
SHA512fd1d5bf7ef4ab65099b4a47be58fb0bfa63e1c25f16e0e00224f07566c273aaffa6ddca302d4306b7fc731923f44e35745fb26bd13f2b4ce40461030e8e51caa
-
Filesize
2KB
MD5c7569fed16ef0b2bd263f2be7e6e6e23
SHA14b2ce7531de028ced7306071444a23cfc062fd5d
SHA25683c8ce8c9e34cad2e3d6686cf99c4b46d36d8594cd44f950e1410f5c0878f16c
SHA5122b68ca58f7df7e697d4c7d4593b049af701954d12037bdcdcbd4fa56dfea0b623546d1c5c81018a58dabd3c9c6e57fa34a5a344d0a9848492aaddd701265ab27
-
Filesize
536B
MD5a081f548db3b0e86158e362323673be7
SHA1932e01ee995c74c6c558572f093411797802b0be
SHA256d1e8b7a17c31ea92a21f35528335684b3f51845f16084bb5881ff2f08781394d
SHA512b53593be3d396660bbc8701a26a2365b343cab32b10363a00c4e2c95642b4ff1e6a6f7836cab06cb40f6314103b6d5a99af66dc1b324e39fef8fbef4ae8b68be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5872ac8900bea5d0c59ac503ec9992928
SHA1792955dccdffabfb8f1e2b782760d2f738db21c1
SHA256ea540986e76a2b879c92d6b9ee1b5b2b0f8d0a25834d43413cf4f2651d526537
SHA512247cc5743fe4e2e1462b2a1b17892d4e0abaaec6afdcca3030143e93cd702fa47dc24e0bb19ad04e99d11b22cbaaaad2eb4e67772644e5166e6f4f24a534e4f5
-
Filesize
11KB
MD52cc09480df33c63c67b79dd9091f3f63
SHA13a70bb33edb37a018d94682306df87d85409ec85
SHA25667078da8df874b5427d8d727277d2ea7ad80e1128683ed67fae37338307d2cd8
SHA512055d2f11cb0a73d1e3b43b9c03a0f07e3f4ea97564083cd0e42ba531cbd2d90172ef4d232fbae635d101bcdc38e05d9acaaf270282b8914c9e276c5526bdc5de
-
Filesize
11KB
MD5974946b4ae241c03ffeca4ac22758ab4
SHA1d483e37bc48c8f6039489e2dfdf5df1d12e95a66
SHA256e4ba42dcbdddd9223bbf2e5dd853a697c4705cc8153bda3134f7f953e65948b3
SHA512e500767eb20f18f128b1878eb91bdcc014f4496e3aedf1acafed58cbdde35d90e823af7e0fe00bce6abe4b09649738d33056618ad7d4cb9642858ee4c6ff5cc2
-
Filesize
11KB
MD506d5081a36e7697238eeb35a240ef0bc
SHA19d9e6bc351afcb4e99bdb19ff97e5000ee6291a4
SHA2564980f2687fa32e60bce4803441bbb75c93b87649f9a997e7f781eeb0d522a685
SHA512cd7c080c3b4c45c874f155be316f1f157692e4b9fd28b83a193f5869b4a5bbdb86c60001056ee888a5f1d066fb0a854314fc5ca16304f2714acd3d4506e07a9d
-
Filesize
11KB
MD5db25fd11c6c1eb2729f05675717bea95
SHA1e2d465c027e64fcb61209d6122bcf98ed3b3ed0d
SHA256e96ab3a258dd516ddc04135164dff99b3e040508741224e7bb96702288c23d55
SHA51275b509be035ea9bac393e89be55bc315460ee7614c4012f641e5f58532dc6e942cdbdfe46b1c29002f3eef1fe87de8bf8873c44a79574605bb2b264a7756113d
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5fe5ed4bb63030e4e1a2450756c1f31e9
SHA176be0fce7c745d5480726a080dc2e39c165c002b
SHA25640c160eea2c387cb32087c011d8478d6354b877230b29fcd8815bc57973538c9
SHA512540a5b5ebec10eaff2344c3eabc44a6cfbfdaca3c74fd7e65cd8ddf9cb0a184bc0a1109d9c7146563562ac82ab0611397f4393206ce76ee9461cddf0081a1501
-
C:\Users\Admin\AppData\Local\Roblox\logs\crashes\attachments\50eb9049-2c5b-4ffe-b55c-3c0d8a3456c2\attachment_0.658.0.6580461_20250204T153436Z_Studio_DD697_last.log
Filesize84KB
MD529941d0c72aae9ca052f07b892932aaa
SHA123f3eb2446e4c1f7fabdfbd1c5b6b3db3d3d0a0e
SHA256bb75fb1913c0da7e13f6309478ffbf76764b8c481f7a44758c212a3a427a4c41
SHA5129ae76768084ada2ad5f6e9c88ea0ef93bb633cbeb6c52ba9e42d76da16afec27fb145b699c614b4c5037d30a5654a7029cf254e941e3b8b34df9a7526def74b6
-
Filesize
1.6MB
MD5b49d269a231bcf719d6de10f6dcf0692
SHA15de6eb9c7091df08529692650224d89cae8695c3
SHA256bde514014b95c447301d9060a221efb439c3c1f5db53415f080d4419db75b27e
SHA5128f7c76f9c8f422e80ade13ed60f9d1fabd66fef447018a19f0398f4501c0ecc9cc2c9af3cc4f55d56df8c460a755d70699634c96093885780fc2114449784b5f
-
C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
Filesize
21KB
MD5846feb52bd6829102a780ec0da74ab04
SHA1dd98409b49f0cd1f9d0028962d7276860579fb54
SHA256124b7eeba31f0e3d9b842a62f3441204beb13fade81da38b854aecba0e03a5b4
SHA512c8759e675506ccc6aa9807798252c7e7c48a0ab31674609738617dc105cee38bce69d4d41d6b95e16731466880b386d35483cbeea6275773f7041ba6e305fae9
-
Filesize
16B
MD5654bd5e4184fe762c1e7ef5509bcee31
SHA19d5421aa395061774ac7048317e4535747d88c26
SHA25607a486481337b6b8670db113207cfe2547929490e12951ca9e59f21c549919cd
SHA512e350b74488893ef1852171a97ae5811b7a7e37bb9da75ff5ed0c04163bad9592b6147bbed0f59c7b386dad27dd6228e5831066d6d55122c8194796fcc255f7de
-
Filesize
114B
MD54289629e757ca5b96c375131d4448444
SHA13e33b83d313b061e6dd45e23bfc74df5e55d4ddf
SHA256f63b9ae080605896b0ccc9246ab194ca9e2f8b7a5b586f8481ade12079a2b46d
SHA512fa55b6b8f02e36501634f7a1688c4b317ba9f6bb84168874dd9566eeb3d64572ca61ecda3c3e4edab9df5d85faa837b9f509938d228639a34f0ad22cbe67b157
-
C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView\Crashpad\reports\6f24dc60-bfcb-499a-872d-504f3a40b208.dmp
Filesize6.1MB
MD51956cd934b42cb62e4ae880df5513e74
SHA180a0678be8614d6e71d26078834ed0fe4c91a574
SHA256f0129d5136449a76bbea40dae272b74422f4341d0f71a1fe5f090633f826a25e
SHA51290649e9e09e6ae8e7b2985f2f1a82c0eca42086b9c3ae6cd28b64989132d8dcb77b32837df98cc6d4114232f9f546605844b913b82e50d75bee0d7af1fc5de5a
-
C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView\Crashpad\reports\904c3bfc-77d7-4d5d-87a5-9f4217b85f8c.dmp
Filesize5.5MB
MD5de9787ccc72524cf738bcd39b7fcd7c0
SHA17a224edde637b391b21789ded6d3f29238e1ed9b
SHA2569c9b4b72a1963b5f8dee1d425e113c77ed811ad75f6a2bc2e889ba227fa00d6b
SHA5129bfc88609434de2ada5adc5b4fee511e0c03bae5f7f8456e03a2089827a75752f5eed2c92e254009da1a3d5b00536a4f8c480ef4d1d0d3db7ae72d22fbc722f1
-
C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView\Crashpad\reports\fdc63eaa-db06-41a7-8b9b-fd380acf4dc5.dmp
Filesize5.4MB
MD53cbed49f74f34edaf3b988f8a54d345c
SHA1a9d288f81e599280a6eb945b9a251185fb1a6387
SHA256963d428553e7e2384d7914daa36614e231917ced15328e30e56d4cda94ed093b
SHA51242d6eaa40f572be991a9c4adbcd9ff4dfe7f0004156945539da230c5503f6e074e9cfbf8871a455b5a8553ca4aa5261321c1ceb6c6e05143a02dc2614cd284b8
-
Filesize
280B
MD546d05e38f6cfece5afb9525fb4b3b898
SHA14d74ef72a37a831e090dcd562671a2210dd05fd1
SHA2567cb591acc65015145fd8090d0adf461a91b76ad65745c236e15f5fd1b4deefba
SHA512dd58669c6a5b5d38236138ff0fd173fdaa85b93dd86554fa1705cae67bf4cc43d56793312e83a2c690b6ffacc6a1e24fedaeadc788acec699f3c1a723fa8f50e
-
Filesize
48B
MD5c482cc3625a0ee09d6706c18876ad07e
SHA15449d151bf9b9c4819de4b7d037fa946f3db2e39
SHA2561ae1ad616a0a9959194e4c3c5e3ae762f141f07daa3a7d3618fe0f7d1c906cfc
SHA5120d89ecddb51f0ae67e712a67c73046843a7c59fc2e596f637b186f8bc00ee8c2fff812570806415f07cd7d7540ea81bae53d14ddbdd5f4dfb88972b7082d4ce2
-
Filesize
264B
MD55b9e109f01cc7778129933ce26644cca
SHA1ae6f4fb16de8734cb7f3e3045d5c2895c1cddca8
SHA2567adf712616d78e8471200db788050a16bcc76a67319c058c8fe5c39d40077426
SHA51221244eadbfaa6f86a1afe15d05cc275f0e21703856124427590381ed4093cb23839da8a87cb372efa5aee025ad17dab7154348785aa0fcd354b9a3ca295d1939
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5293ccfe786a2197dee0a973beb9d398b
SHA1b651b5c737d7badf0932bbc8d3c4c3a7a171edf1
SHA25696ccdf8cfb5de99484653cb015501ddee2b5e90501286513bb1841da5d879e96
SHA512c84cdffa014b66b4687f7a575bdc642051e7fe13509e50d819e153845fa2e24f58ea01a648316bf0b830762b11eacb019b965229bb3c4829092aff8ff0989828
-
C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView\Default\Network\Network Persistent State~RFe5e1d88.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
6KB
MD51f0028d521bf3568b0dbd441b331f62d
SHA13ec08f11ef94d328b005ff32e9d154b67afe9bc2
SHA25684a5c2cc32b4d27863fb7b53a1e795371dc3fc99dd9188f785244d038d8006a4
SHA5129404fc0a4861d8eb98d2b245663aab38d649ce61f7050e9b77c459f6c1de874ae5b0aad2494372287ffa272e1076cac9c1119f1f9cab32f3f94b64e063f08964
-
Filesize
6KB
MD527b079a81b27c222651a00a8b6703b57
SHA1d8780f19c4eeae155875029b66c4923e324a1511
SHA25647eb052e916453e62c41ae4dcdebc7c7a1315938c23a15f1327f8d44bcc1cb87
SHA5127089fae4a085a9b8622ff9b3301a066e29e843b94e84f754214f2782d87c2667146b23b75abeaafd6596d4020a29e466d0a9c2276398aa176cb058c9a41b86eb
-
Filesize
5KB
MD54721736778e5eadca752d832e8c211ae
SHA1a71556449917346af95497b82d7c75b0eb6d3bcf
SHA25645db947772eb1d888e65ead373f9b83ae7c970618612d03007b65b2aaf91c38a
SHA5127de857e80ffc3f968a2ae2bfb70a0c74fd2f6b117867389c377e523ff5bf8f262f39febbe665f887263195ac3d496283f7f964313f6230a21a77eea5b1612dc3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
18KB
MD583702d5fe68e19e9ed45fc767480a592
SHA1d59693e1ecb9a53c186b4d3d6abcf38bf837c945
SHA256de97dd7e1665bb7face66668dd3342e4f7df3b59fd0365454da500d5990f7a28
SHA512c87976ed2e51b73ca8aab384d6d6db1f43c73a4259f46da5eb1c2fe6303dd551e3e1028606dc61162fb0c42e8f241c9bd89525e98200f6faff466c5bd1e338d4
-
Filesize
1KB
MD52b4411118e8770610aa7d71c5e3ba5e6
SHA1adb38173f7927f75890785128d171bd5103a6ca5
SHA256075cffcdee973e52d4b1e4ee98f281ab156514bf5cec2b06c0ad930b4908d30b
SHA5129f9f4ff087ea2da3f4276a127da9e0c2c637caf86d604cf8d283104be3bfe7a101390270b0ba86750776e22fec3d1dcdf5ca2cae125e21094055baafeb4c692c
-
Filesize
2KB
MD5174e5c367d2d4cd250c7ced6be5de578
SHA18132e7b6742e4e27efac29762e53aa00521335ac
SHA2567709af635046cec102f0327517dcc0608fb286928de7df63775b6bd107d8b7d8
SHA5127c86885abff5150c885b70c3350f55896504f8630f34601cb8b7566cb0d9a698d6bd4de84f3923a07ea199803bbac0b71734b06ca95a245e392fc374a88f385f
-
Filesize
3KB
MD50b693e2c09fa41b0befedf0393902fa3
SHA197005fd1c5bc955f614d02079115a8dfb3d8c7d0
SHA25687823b627e4a9343fd9c0574263bd896373de49278561b367520fd1dad945093
SHA5124950116a97bd8a1e29ac39864e35371051c96e05ca0679acaff38d61c0b4c633be1efe7340464ad77f869efa4d1d8adb6fa2788ba4c69e40a825a4a7b2247340
-
Filesize
3KB
MD520ae18e61474e94621fa3c11f8ddd326
SHA174cba7bc27bffbc10e7f6e9a1e132165ada0eebb
SHA2567fb140b91beb1c8972dcee3926d9f4f95a41845d70fa603c4aead217627c38c1
SHA512b132d7ce0da417a22d38e297d3adbe6de5ab2347984f8042798d893f65af3fbaa88788bc980471530bf4dafbe532cbfaa246e5e20e919603d25e8dc9a2a9b535
-
Filesize
16KB
MD5340e2745bb7c0161e72051ce13264076
SHA175dd7c9b988dc7730cd28604037c965a75afde2b
SHA256f397938e5fbc4db5e392673a6a325bb408878ab7e8c8e72fbc167be7e1504a12
SHA512d1f0e76ecc2eb66cb15cce1cf7ec55f27f376522eb199538e976845075193ff47bc33e028dbd6cea5ae1f94c98f97907720f29c9b14c5593874f455f154cb629
-
Filesize
16KB
MD5091c5ddbbf113cdbb7ba61d557bedc03
SHA194a2d45088338c522f034a3b0a1a0d1ebe3e5697
SHA256af4c9c6d2ca62c9ea773f3870aba6bdbb66ccb3f37a0f101b179c74666d4a0f6
SHA512ce37cd1245ee4fa10390ce861d2d6bc3ec8969f8adce8522d0919c35bb80deca2a72e0f3809186ce92b12b2aa44ffbf201579449d8d44173e59d0d99cdf8e2b9
-
Filesize
18KB
MD5c72a5ec99e82d89171919261c147a453
SHA16cd64ca99dd13edc17e47d6791caf271dd512925
SHA2566a44418526a2cf32283854810f2549b53a53e659c6df537991ff6e8f7a27a2c4
SHA5122aae9a6b16d07d007562144e3279a8efecca74f04178d9234403c1b4bb908ae4a9281a05bef311860cc25353597750c769dacacec5cb1f5f4b794fd0f86a6cd3
-
Filesize
1KB
MD52c2dfba2816067690df4cb458d8431b4
SHA120c4f3e7c5a46099f022e14c0c63ea5a392898b7
SHA2561fcd43917cf32f219b151667807d97189c9b6bf0721b002ca282c316c27ab3f2
SHA512158c27bc16b31bd5f48d0ac38d330e96e7f9f4b0247e7cafdbc82d11693e6cd16876571360a9b16f0cecb782276fc2b9d6691bbc30f3c25bf8ebfafa51ffcec9
-
Filesize
10KB
MD509b6469de61db3473bdfe04951f08529
SHA1d64b455ae9c65d8d8629a128a9f3505ef3df3555
SHA2561c435f4448dcf1784637fa9470546d12d7db2420a11cf8b5d6343439dd401c60
SHA512049d3c0e05aa3ab1d4d51cc5bd72603f47aa33141bf771cb86baedc19b8973911445ce74256ff1118483175cf4a104262a22ae9431a6366cbd1f7d28553fcbb0
-
Filesize
11KB
MD52d8bcb7c4b2dc669429bd40f7048f62a
SHA143a332c99105dcfb67893ea167879c3ce6bac8db
SHA2567a0866cdd7bd21b8b08d166edb3f6adf8c859b47988b9b3ba3f0eaafabe10ff2
SHA51215d3c7c6df2c3c75daf7ea9165687c5a6f8acac3dfe83573e20aa1bd425dde8fc659fc2c1b050b3e8ddb28358a96b9e0c083e61fa5d63ae34fa4b0bb63db8a76
-
C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\Users\Admin\AppData\Roaming\Luna.exe\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
Filesize
6KB
MD5b4434830c4bd318dba6bd8cc29c9f023
SHA1a0f238822610c70cdf22fe08c8c4bc185cbec61e
SHA256272e290d97184d1ac0f4e4799893cb503fba8ed6c8c503767e70458cbda32070
SHA512f2549945965757488ecd07e46249e426525c8fe771f9939f009819183ab909d1e79cbb3aeca4f937e799556b83e891bbb0858b60f31ec7e8d2d8fbb4cb00b335
-
Filesize
5.5MB
MD59ba94ac44294258328b5b23e6fbcaf4a
SHA13ef50da71c5800f02680733b184bb11bb0ca309b
SHA256a9e76b770fb8a61f793a61ca6701e1f76ea95282d5a3647d8dfccf1b560f401a
SHA51252e3118e8e40d621275d0ce3157138bb0e9a4d56c1c570666930de60e46e8050af8e0c377aea2e5ccee2ff78c427576bd4954226a0f800eac6cabbaa70f267ce
-
Filesize
1.3MB
MD53a87fb61f757bc7f8aaa333663a55c78
SHA1fb1beedbf2479e3f7584a6f281eee7b4e051233a
SHA2565ea93e328a9d7cb9230acddc01b38dc09f3b94792f81f9db8ca3d30185a94c74
SHA5124246a81245192968299bec9809557478201f89f717124e4d5242ae7a95e228258add92e9d369369e427ed89db4b1af4514e4289ecf693a53160022b16c627f35
-
Filesize
19.4MB
MD5a2842d2b6d2677b12afeb22f395629f6
SHA10d7508574ea5c5ab6f1955f602387b584242ebb3
SHA25604a58bd743a1491c156fcdc697399030b98938484ba97badaed7eefba9beebd4
SHA5121b2131016a9f08e9e8c5126ad34ba8cfcc7f4b6efd1f0c308a22576194fd428cc311fc1b8f9b542e20c5ad449578a6ccda5892f127cbccef9ef990239a7ef52d
-
Filesize
7.3MB
MD54a2d895aa6bb027fb20d16f09334ec55
SHA1b3de5ce877b672aeb249aee0cae6fe93e5eb79aa
SHA256cab25639d765d84ed24e9cb9e833600cdf20c2cf019a6d5f417cab6bca53184c
SHA512d08ea449f36c2bd100c53ec1de56c5afc13e46f637f9f1ec3bfffef9d06fc626eb7019b03dd63c1d3bcd506164acbc56d43ef0349c2c660d3906190e17cf1c2e