Analysis
-
max time kernel
2700s -
max time network
2603s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
WaveInstaller (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
WaveInstaller (1).exe
Resource
win10v2004-20240508-en
General
-
Target
WaveInstaller (1).exe
-
Size
1.5MB
-
MD5
b075f4320e46d0d5e78a649e8ee011cc
-
SHA1
b0dd50171323f0f83dbea0340e9ed8cf44bea38e
-
SHA256
8581823244a50bbed9709d09f3eba29dd9989681d96bff2b6c19245053069feb
-
SHA512
e08024b5fa50dc344ca18413a6c21e0f20490c22c90c565d6f663014f1673643da1d5d748e0cefca8a7cbae91a62470289803ad588d3aa5cf3dc6292d7393d47
-
SSDEEP
24576:VviinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pq081ind2:MinbT3ipTD0anywJAaD/3U2pqjindT
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
setup.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\126.0.2592.68\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Bloxstrap.exenode.exeMicrosoftEdgeUpdate.exeCefSharp.BrowserSubprocess.exeBloxstrap-v2.6.1.exeBloxstrap.exeBloxstrap.exeWaveWindows.exeBloxstrap-v2.6.1.exeCefSharp.BrowserSubprocess.exeBloxstrap.exeWaveInstaller (1).exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Bloxstrap.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation node.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CefSharp.BrowserSubprocess.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Bloxstrap-v2.6.1.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Bloxstrap.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Bloxstrap.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Bloxstrap-v2.6.1.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CefSharp.BrowserSubprocess.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Bloxstrap.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WaveInstaller (1).exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
Processes:
WaveWindows.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exenode.exeBloxstrap.exeMicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exeMicrosoftEdgeUpdate.exewave-luau.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeCefSharp.BrowserSubprocess.exeMicrosoftEdgeUpdate.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exeMicrosoftEdge_X64_126.0.2592.81.exesetup.exesetup.exeMicrosoftEdgeUpdate.exeBloxstrap-v2.6.1.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeBloxstrap.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateSetup_X86_1.3.187.41.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeBloxstrap.exeRobloxPlayerBeta.exeBloxstrap.exeRobloxPlayerBeta.exeBloxstrap-v2.6.1.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeBGAUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_126.0.2592.68.exesetup.exesetup.exesetup.exesetup.exesetup.exesetup.exesetup.exesetup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exepid process 3600 WaveWindows.exe 2556 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 456 node.exe 3860 Bloxstrap.exe 7740 MicrosoftEdgeWebview2Setup.exe 744 MicrosoftEdgeUpdate.exe 1668 MicrosoftEdgeUpdate.exe 4448 MicrosoftEdgeUpdate.exe 3868 MicrosoftEdgeUpdateComRegisterShell64.exe 3892 MicrosoftEdgeUpdateComRegisterShell64.exe 6092 MicrosoftEdgeUpdateComRegisterShell64.exe 4936 CefSharp.BrowserSubprocess.exe 4684 CefSharp.BrowserSubprocess.exe 3336 MicrosoftEdgeUpdate.exe 2908 wave-luau.exe 5028 MicrosoftEdgeUpdate.exe 3212 MicrosoftEdgeUpdate.exe 1072 CefSharp.BrowserSubprocess.exe 6076 MicrosoftEdgeUpdate.exe 6576 CefSharp.BrowserSubprocess.exe 5344 CefSharp.BrowserSubprocess.exe 5676 MicrosoftEdge_X64_126.0.2592.81.exe 5788 setup.exe 5204 setup.exe 5812 MicrosoftEdgeUpdate.exe 6856 Bloxstrap-v2.6.1.exe 1836 RobloxPlayerBeta.exe 5796 MicrosoftEdgeUpdate.exe 3372 Bloxstrap.exe 6328 RobloxPlayerBeta.exe 4396 MicrosoftEdgeUpdate.exe 6532 MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe 7816 MicrosoftEdgeUpdate.exe 7348 MicrosoftEdgeUpdate.exe 3244 MicrosoftEdgeUpdate.exe 5876 MicrosoftEdgeUpdate.exe 5860 MicrosoftEdgeUpdateComRegisterShell64.exe 7524 MicrosoftEdgeUpdateComRegisterShell64.exe 7604 MicrosoftEdgeUpdateComRegisterShell64.exe 7824 MicrosoftEdgeUpdate.exe 5964 Bloxstrap.exe 6472 RobloxPlayerBeta.exe 6648 Bloxstrap.exe 5424 RobloxPlayerBeta.exe 7188 Bloxstrap-v2.6.1.exe 7324 RobloxPlayerBeta.exe 5368 MicrosoftEdgeUpdate.exe 7964 MicrosoftEdgeUpdate.exe 6976 MicrosoftEdgeUpdate.exe 2728 BGAUpdate.exe 5452 MicrosoftEdgeUpdate.exe 2208 MicrosoftEdgeUpdate.exe 1292 MicrosoftEdge_X64_126.0.2592.68.exe 8024 setup.exe 6572 setup.exe 5800 setup.exe 6068 setup.exe 3924 setup.exe 7536 setup.exe 1512 setup.exe 1428 setup.exe 4116 MicrosoftEdgeUpdate.exe 7528 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 64 IoCs
Processes:
WaveWindows.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exepid process 3600 WaveWindows.exe 3600 WaveWindows.exe 3600 WaveWindows.exe 3600 WaveWindows.exe 3600 WaveWindows.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 3600 WaveWindows.exe 744 MicrosoftEdgeUpdate.exe 1668 MicrosoftEdgeUpdate.exe 4448 MicrosoftEdgeUpdate.exe 3868 MicrosoftEdgeUpdateComRegisterShell64.exe 4448 MicrosoftEdgeUpdate.exe 3892 MicrosoftEdgeUpdateComRegisterShell64.exe 4448 MicrosoftEdgeUpdate.exe 6092 MicrosoftEdgeUpdateComRegisterShell64.exe 4448 MicrosoftEdgeUpdate.exe 4684 CefSharp.BrowserSubprocess.exe 4684 CefSharp.BrowserSubprocess.exe 4684 CefSharp.BrowserSubprocess.exe 4684 CefSharp.BrowserSubprocess.exe 4684 CefSharp.BrowserSubprocess.exe 4936 CefSharp.BrowserSubprocess.exe 4936 CefSharp.BrowserSubprocess.exe 4936 CefSharp.BrowserSubprocess.exe 4936 CefSharp.BrowserSubprocess.exe 4936 CefSharp.BrowserSubprocess.exe 4684 CefSharp.BrowserSubprocess.exe 4684 CefSharp.BrowserSubprocess.exe 4936 CefSharp.BrowserSubprocess.exe 4936 CefSharp.BrowserSubprocess.exe 3336 MicrosoftEdgeUpdate.exe 5028 MicrosoftEdgeUpdate.exe 3212 MicrosoftEdgeUpdate.exe 3212 MicrosoftEdgeUpdate.exe 5028 MicrosoftEdgeUpdate.exe 6076 MicrosoftEdgeUpdate.exe 1072 CefSharp.BrowserSubprocess.exe 1072 CefSharp.BrowserSubprocess.exe 1072 CefSharp.BrowserSubprocess.exe 1072 CefSharp.BrowserSubprocess.exe 1072 CefSharp.BrowserSubprocess.exe 1072 CefSharp.BrowserSubprocess.exe 1072 CefSharp.BrowserSubprocess.exe 6576 CefSharp.BrowserSubprocess.exe 6576 CefSharp.BrowserSubprocess.exe 6576 CefSharp.BrowserSubprocess.exe 6576 CefSharp.BrowserSubprocess.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
BGAUpdate.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\!BCILauncher = "\"C:\\Windows\\Temp\\MUBSTemp\\BCILauncher.EXE\" bgaupmi=9259AC19473D40E6A425415C80F00A60" BGAUpdate.exe -
Checks for any installed AV software in registry 1 TTPs 25 IoCs
Processes:
WaveWindows.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\Session WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\FontSize WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\RedirectCompilerError WaveWindows.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\TopMost = "0" WaveWindows.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\FontSize = "14" WaveWindows.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\KasperskyLab WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\LastUsername WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\ContinueOnStartUp WaveWindows.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\RefreshRate = "60" WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\Minimap WaveWindows.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\LastUsername = "Axskid" WaveWindows.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\RedirectCompilerError = "1" WaveWindows.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\UsePerformanceMode = "0" WaveWindows.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\KasperskyLab WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\UsePerformanceMode WaveWindows.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\SendCurrentDocument = "1" WaveWindows.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\ContinueOnStartUp = "0" WaveWindows.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\Minimap = "0" WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\InlayHints WaveWindows.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\InlayHints = "1" WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\SendCurrentDocument WaveWindows.exe Key queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab WaveWindows.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\Session = "Bearer 44e0319e-e339-45f7-b8a6-3c9e338461db" WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\TopMost WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\KasperskyLab\RefreshRate WaveWindows.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
WaveWindows.exedescription ioc process File opened (read-only) \??\Q: WaveWindows.exe File opened (read-only) \??\R: WaveWindows.exe File opened (read-only) \??\Z: WaveWindows.exe File opened (read-only) \??\A: WaveWindows.exe File opened (read-only) \??\M: WaveWindows.exe File opened (read-only) \??\J: WaveWindows.exe File opened (read-only) \??\T: WaveWindows.exe File opened (read-only) \??\U: WaveWindows.exe File opened (read-only) \??\W: WaveWindows.exe File opened (read-only) \??\G: WaveWindows.exe File opened (read-only) \??\H: WaveWindows.exe File opened (read-only) \??\L: WaveWindows.exe File opened (read-only) \??\O: WaveWindows.exe File opened (read-only) \??\V: WaveWindows.exe File opened (read-only) \??\I: WaveWindows.exe File opened (read-only) \??\K: WaveWindows.exe File opened (read-only) \??\N: WaveWindows.exe File opened (read-only) \??\P: WaveWindows.exe File opened (read-only) \??\S: WaveWindows.exe File opened (read-only) \??\X: WaveWindows.exe File opened (read-only) \??\Y: WaveWindows.exe File opened (read-only) \??\B: WaveWindows.exe File opened (read-only) \??\E: WaveWindows.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
setup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
Processes:
flow ioc 60 raw.githubusercontent.com 61 raw.githubusercontent.com 62 raw.githubusercontent.com 197 camo.githubusercontent.com 199 raw.githubusercontent.com 49 raw.githubusercontent.com 50 raw.githubusercontent.com 59 raw.githubusercontent.com -
Checks system information in the registry 2 TTPs 30 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 1 IoCs
Processes:
setup.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 3 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 1836 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe 5424 RobloxPlayerBeta.exe 5424 RobloxPlayerBeta.exe 5424 RobloxPlayerBeta.exe 7324 RobloxPlayerBeta.exe 7324 RobloxPlayerBeta.exe 7324 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
Processes:
setup.exesetup.exesetup.exeMicrosoftEdgeUpdateSetup_X86_1.3.187.41.exeMicrosoftEdgeWebview2Setup.exesetup.exeMicrosoftEdge_X64_126.0.2592.68.exedescription ioc process File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\msedge.dll.sig setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Trust Protection Lists\Mu\Cryptomining setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Trust Protection Lists\Mu\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Locales\lo.pak setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\ac74591a-ce7b-4e05-aa6b-ae60cf26b98a.tmp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\mr.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU3FB2.tmp\msedgeupdateres_cy.dll MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe File opened for modification C:\Program Files (x86)\Microsoft\Temp\EU3FB2.tmp\MicrosoftEdgeUpdateSetup.exe MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\VisualElements\LogoCanary.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\Locales\gu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Locales\km.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\msedgeupdateres_bg.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\ro.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\fi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\Locales\bn-IN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\BHO\ie_to_edge_bho.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Locales\el.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\cy.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\or.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.81\VisualElements\SmallLogo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.81\Locales\bs.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\delegatedWebFeatures.sccd setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\ca-Es-VALENCIA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.81\msedge_100_percent.pak setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\mspdf.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\mspdf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Locales\et.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Locales\ru.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\Installer\setup.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Locales\gu.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\msedgeupdateres_lo.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\MicrosoftEdgeUpdateSetup.exe MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\vulkan-1.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.81\Locales\kok.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.81\Extensions\external_extensions.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\MSEDGE.PACKED.7Z MicrosoftEdge_X64_126.0.2592.68.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.81\Trust Protection Lists\Sigma\Staging setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.81\Locales\qu.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\psuser_arm64.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\msedgeupdateres_ro.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\msedgeupdateres_sr-Cyrl-RS.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\copilot_provider_msix\copilot_provider_neutral.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\ur.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\VisualElements\LogoBeta.png setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\Locales\ur.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\msedgeupdateres_ka.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\km.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.81\Locales\sr-Latn-RS.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\Locales\th.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\VisualElements\SmallLogoBeta.png setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\msedgeupdateres_gu.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\ug.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\onnxruntime.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\PdfPreview\PdfPreviewHandler.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\VisualElements\SmallLogo.png setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\msedgeupdateres_am.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Locales\ml.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.81\Locales\tt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\Locales\en-GB.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\vcruntime140.dll setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
setup.exewwahost.exeSearchApp.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU wwahost.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU wwahost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\126.0.2592.68\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\126.0.2592.68\\BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdateComRegisterShell64.exesetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ = "IPolicyStatus4" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32\ = "{0DD41A78-E3D4-44A8-9EAE-697BCF1781A3}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ = "IAppCommand2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{0DD41A78-E3D4-44A8-9EAE-697BCF1781A3}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{0DD41A78-E3D4-44A8-9EAE-697BCF1781A3}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods\ = "23" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe\AppID = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\ELEVATION MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{82CCB536-D2EE-4F19-9067-40531F08D1D4} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\.svg\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods\ = "43" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\ProgID\ = "MicrosoftEdgeUpdate.ProcessLauncher.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32\ = "{0DD41A78-E3D4-44A8-9EAE-697BCF1781A3}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.ProcessLauncher" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\runas\ProgrammaticAccessOnly setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.htm setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WaveWindows.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exeMicrosoftEdgeUpdate.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exeBloxstrap.exechrome.exeBloxstrap-v2.6.1.exeRobloxPlayerBeta.exeMicrosoftEdgeUpdate.exepid process 3600 WaveWindows.exe 2556 CefSharp.BrowserSubprocess.exe 2556 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 3088 CefSharp.BrowserSubprocess.exe 3600 WaveWindows.exe 744 MicrosoftEdgeUpdate.exe 744 MicrosoftEdgeUpdate.exe 4684 CefSharp.BrowserSubprocess.exe 4684 CefSharp.BrowserSubprocess.exe 4936 CefSharp.BrowserSubprocess.exe 4936 CefSharp.BrowserSubprocess.exe 1072 CefSharp.BrowserSubprocess.exe 1072 CefSharp.BrowserSubprocess.exe 6576 CefSharp.BrowserSubprocess.exe 6576 CefSharp.BrowserSubprocess.exe 5344 CefSharp.BrowserSubprocess.exe 5344 CefSharp.BrowserSubprocess.exe 5344 CefSharp.BrowserSubprocess.exe 5344 CefSharp.BrowserSubprocess.exe 744 MicrosoftEdgeUpdate.exe 744 MicrosoftEdgeUpdate.exe 744 MicrosoftEdgeUpdate.exe 744 MicrosoftEdgeUpdate.exe 3860 Bloxstrap.exe 8112 chrome.exe 8112 chrome.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 1836 RobloxPlayerBeta.exe 1836 RobloxPlayerBeta.exe 3600 WaveWindows.exe 3600 WaveWindows.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 5796 MicrosoftEdgeUpdate.exe 5796 MicrosoftEdgeUpdate.exe 5796 MicrosoftEdgeUpdate.exe 5796 MicrosoftEdgeUpdate.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe 6856 Bloxstrap-v2.6.1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
Processes:
chrome.exepid process 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WaveInstaller (1).exeWaveWindows.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exedescription pid process Token: SeDebugPrivilege 1856 WaveInstaller (1).exe Token: SeDebugPrivilege 3600 WaveWindows.exe Token: SeDebugPrivilege 2556 CefSharp.BrowserSubprocess.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeDebugPrivilege 3088 CefSharp.BrowserSubprocess.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe Token: SeShutdownPrivilege 3600 WaveWindows.exe Token: SeCreatePagefilePrivilege 3600 WaveWindows.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
Processes:
Bloxstrap.exechrome.exeBloxstrap-v2.6.1.exeBloxstrap.exeBloxstrap.exeWaveWindows.exeBloxstrap.exeBloxstrap-v2.6.1.exepid process 3860 Bloxstrap.exe 3860 Bloxstrap.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 6856 Bloxstrap-v2.6.1.exe 3372 Bloxstrap.exe 5964 Bloxstrap.exe 3600 WaveWindows.exe 6648 Bloxstrap.exe 6648 Bloxstrap.exe 7188 Bloxstrap-v2.6.1.exe 8112 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
Bloxstrap.exechrome.exeBloxstrap-v2.6.1.exeBloxstrap.exeBloxstrap.exeBloxstrap.exeBloxstrap-v2.6.1.exepid process 3860 Bloxstrap.exe 3860 Bloxstrap.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 8112 chrome.exe 6856 Bloxstrap-v2.6.1.exe 3372 Bloxstrap.exe 5964 Bloxstrap.exe 6648 Bloxstrap.exe 6648 Bloxstrap.exe 7188 Bloxstrap-v2.6.1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
WaveWindows.exeSearchApp.exewwahost.exepid process 3600 WaveWindows.exe 2392 SearchApp.exe 2392 SearchApp.exe 6820 wwahost.exe -
Suspicious use of UnmapMainImage 3 IoCs
Processes:
RobloxPlayerBeta.exeRobloxPlayerBeta.exeRobloxPlayerBeta.exepid process 1836 RobloxPlayerBeta.exe 6328 RobloxPlayerBeta.exe 6472 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
WaveInstaller (1).exeWaveWindows.exeBloxstrap.exeMicrosoftEdgeWebview2Setup.exeMicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exenode.exeMicrosoftEdgeUpdate.exeMicrosoftEdge_X64_126.0.2592.81.exesetup.exedescription pid process target process PID 1856 wrote to memory of 3600 1856 WaveInstaller (1).exe WaveWindows.exe PID 1856 wrote to memory of 3600 1856 WaveInstaller (1).exe WaveWindows.exe PID 1856 wrote to memory of 3600 1856 WaveInstaller (1).exe WaveWindows.exe PID 3600 wrote to memory of 2556 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 2556 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 2556 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 3088 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 3088 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 3088 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 456 3600 WaveWindows.exe node.exe PID 3600 wrote to memory of 456 3600 WaveWindows.exe node.exe PID 3600 wrote to memory of 3860 3600 WaveWindows.exe Bloxstrap.exe PID 3600 wrote to memory of 3860 3600 WaveWindows.exe Bloxstrap.exe PID 3860 wrote to memory of 7740 3860 Bloxstrap.exe MicrosoftEdgeWebview2Setup.exe PID 3860 wrote to memory of 7740 3860 Bloxstrap.exe MicrosoftEdgeWebview2Setup.exe PID 3860 wrote to memory of 7740 3860 Bloxstrap.exe MicrosoftEdgeWebview2Setup.exe PID 7740 wrote to memory of 744 7740 MicrosoftEdgeWebview2Setup.exe MicrosoftEdgeUpdate.exe PID 7740 wrote to memory of 744 7740 MicrosoftEdgeWebview2Setup.exe MicrosoftEdgeUpdate.exe PID 7740 wrote to memory of 744 7740 MicrosoftEdgeWebview2Setup.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 1668 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 1668 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 1668 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 4448 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 4448 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 4448 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 4448 wrote to memory of 3868 4448 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdateComRegisterShell64.exe PID 4448 wrote to memory of 3868 4448 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdateComRegisterShell64.exe PID 4448 wrote to memory of 3892 4448 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdateComRegisterShell64.exe PID 4448 wrote to memory of 3892 4448 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdateComRegisterShell64.exe PID 4448 wrote to memory of 6092 4448 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdateComRegisterShell64.exe PID 4448 wrote to memory of 6092 4448 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdateComRegisterShell64.exe PID 3600 wrote to memory of 4684 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 4684 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 4684 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 1072 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 1072 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 1072 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 4936 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 4936 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 4936 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 744 wrote to memory of 3336 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 3336 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 3336 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 456 wrote to memory of 2908 456 node.exe wave-luau.exe PID 456 wrote to memory of 2908 456 node.exe wave-luau.exe PID 744 wrote to memory of 5028 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 5028 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 744 wrote to memory of 5028 744 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 3212 wrote to memory of 6076 3212 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 3212 wrote to memory of 6076 3212 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 3212 wrote to memory of 6076 3212 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe PID 3600 wrote to memory of 6576 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 6576 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 6576 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 5344 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 5344 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3600 wrote to memory of 5344 3600 WaveWindows.exe CefSharp.BrowserSubprocess.exe PID 3212 wrote to memory of 5676 3212 MicrosoftEdgeUpdate.exe MicrosoftEdge_X64_126.0.2592.81.exe PID 3212 wrote to memory of 5676 3212 MicrosoftEdgeUpdate.exe MicrosoftEdge_X64_126.0.2592.81.exe PID 5676 wrote to memory of 5788 5676 MicrosoftEdge_X64_126.0.2592.81.exe setup.exe PID 5676 wrote to memory of 5788 5676 MicrosoftEdge_X64_126.0.2592.81.exe setup.exe PID 5788 wrote to memory of 5204 5788 setup.exe setup.exe PID 5788 wrote to memory of 5204 5788 setup.exe setup.exe PID 3212 wrote to memory of 5812 3212 MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
setup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WaveInstaller (1).exe"C:\Users\Admin\AppData\Local\Temp\WaveInstaller (1).exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=gpu-process --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2040,i,4720817674037256497,16962753559825043741,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --mojo-platform-channel-handle=2028 /prefetch:2 --host-process-id=36003⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Luau Language Server\node.exe"C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=36003⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Luau Language Server\shared\bin\wave-luau.exe"C:\Users\Admin\AppData\Local\Luau Language Server\shared\bin\wave-luau.exe" lsp "--definitions=C:\Users\Admin\AppData\Local\Luau Language Server\shared\bin\globalTypes.d.luau" "--definitions=C:\Users\Admin\AppData\Local\Luau Language Server\shared\bin\wave.d.luau" "--docs=C:\Users\Admin\AppData\Local\Luau Language Server\shared\bin\en-us.json"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=2812,i,4720817674037256497,16962753559825043741,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --mojo-platform-channel-handle=2808 /prefetch:3 --host-process-id=36003⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe" /silent /install4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"5⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTJFQzczQkUtNDNFRi00MDRBLTkxMzYtNkJCQjE3RTlERDk3fSIgdXNlcmlkPSJ7N0U4MEZEM0EtMDIxMi00QTNCLUE5MDUtRjYxQkNBRDBEQjRBfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntFRURBNUI2RS00QTVGLTREODAtQUM1OC1EQTMzQ0IzMDA2REN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-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⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{A2EC73BE-43EF-404A-9136-6BBB17E9DD97}" /silent6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6552,i,4720817674037256497,16962753559825043741,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --mojo-platform-channel-handle=6548 /prefetch:8 --host-process-id=36003⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=renderer --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --no-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=6624,i,4720817674037256497,16962753559825043741,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --mojo-platform-channel-handle=6612 --host-process-id=3600 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=renderer --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --no-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=6684,i,4720817674037256497,16962753559825043741,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --mojo-platform-channel-handle=6676 --host-process-id=3600 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=7776,i,4720817674037256497,16962753559825043741,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --mojo-platform-channel-handle=6400 /prefetch:8 --host-process-id=36003⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=6900,i,4720817674037256497,16962753559825043741,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --mojo-platform-channel-handle=6880 /prefetch:8 --host-process-id=36003⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x4ec1⤵
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTJFQzczQkUtNDNFRi00MDRBLTkxMzYtNkJCQjE3RTlERDk3fSIgdXNlcmlkPSJ7N0U4MEZEM0EtMDIxMi00QTNCLUE5MDUtRjYxQkNBRDBEQjRBfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins4M0RFN0E3OC00MTVDLTRCNzgtQUQ4Qi1ENDY5RENEQkI2QjR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTEwLjAuNTQ4MS4xMDQiIG5leHR2ZXJzaW9uPSIxMTAuMC41NDgxLjEwNCIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjYxMjUyNjQ4MjEiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{06327991-3ADC-4A22-85B1-0F398A954DEF}\MicrosoftEdge_X64_126.0.2592.81.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{06327991-3ADC-4A22-85B1-0F398A954DEF}\MicrosoftEdge_X64_126.0.2592.81.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{06327991-3ADC-4A22-85B1-0F398A954DEF}\EDGEMITMP_20CBB.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{06327991-3ADC-4A22-85B1-0F398A954DEF}\EDGEMITMP_20CBB.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{06327991-3ADC-4A22-85B1-0F398A954DEF}\MicrosoftEdge_X64_126.0.2592.81.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{06327991-3ADC-4A22-85B1-0F398A954DEF}\EDGEMITMP_20CBB.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{06327991-3ADC-4A22-85B1-0F398A954DEF}\EDGEMITMP_20CBB.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.127 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{06327991-3ADC-4A22-85B1-0F398A954DEF}\EDGEMITMP_20CBB.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.81 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff60c22aa40,0x7ff60c22aa4c,0x7ff60c22aa584⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTJFQzczQkUtNDNFRi00MDRBLTkxMzYtNkJCQjE3RTlERDk3fSIgdXNlcmlkPSJ7N0U4MEZEM0EtMDIxMi00QTNCLUE5MDUtRjYxQkNBRDBEQjRBfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5NkI4REMxOC03MzIxLTRFQUMtQUFFRi05M0I1MEQwQkIwMEZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMTI2LjAuMjU5Mi44MSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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_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-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Checks system information in the registry
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdb1bfab58,0x7ffdb1bfab68,0x7ffdb1bfab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3336 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4224 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4256 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4492 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4540 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff70435ae48,0x7ff70435ae58,0x7ff70435ae683⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4828 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4912 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3536 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2776 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5256 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5288 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5200 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5556 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\Bloxstrap-v2.6.1.exe"C:\Users\Admin\Downloads\Bloxstrap-v2.6.1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe" --app -channel production3⤵
- Executes dropped EXE
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3448 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=5624 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5660 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=5500 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5676 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=5928 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=5364 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=3380 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=5960 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=4496 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6412 --field-trial-handle=1860,i,9523442828617921246,13497647775840727977,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe" roblox-player:1+launchmode:play+gameinfo:iXrSBZ9VcWfR3oXriaWjPbR0XFyQkNE1N_JMayQmLP3g_hIQzXlTHNjECYN8kcxLSUfJG7ToKvWlCGzhk5jwDsNz5LlJHyOxQGYgjlAV8v0qmoCqlqx2fSVzvuhDaOmA_xMIdviztDu1-Os1KF4V0N0DwAtl0yulfWVbbECw3D4zlwRd_2KB4by6be6BwJCz71tdVaJTocEp9nFpGeVqZPuE20ihsLcb6sqb0jyXt0Q+launchtime:1719640503834+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1719640402847008%26placeId%3D14494334042%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D2c2157e6-0d69-4842-82fd-b26b05d85d80%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1719640402847008+robloxLocale:en_us+gameLocale:en_us+channel:zflag+LaunchExp:InApp2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe" --app -t iXrSBZ9VcWfR3oXriaWjPbR0XFyQkNE1N_JMayQmLP3g_hIQzXlTHNjECYN8kcxLSUfJG7ToKvWlCGzhk5jwDsNz5LlJHyOxQGYgjlAV8v0qmoCqlqx2fSVzvuhDaOmA_xMIdviztDu1-Os1KF4V0N0DwAtl0yulfWVbbECw3D4zlwRd_2KB4by6be6BwJCz71tdVaJTocEp9nFpGeVqZPuE20ihsLcb6sqb0jyXt0Q --launchtime=1719640507984 -j https://www.roblox.com/Game/PlaceLauncher.ashx?request=RequestGame&browserTrackerId=1719640402847008&placeId=14494334042&isPlayTogetherGame=false&joinAttemptId=2c2157e6-0d69-4842-82fd-b26b05d85d80&joinAttemptOrigin=PlayButton -b 1719640402847008 --rloc en_us --gloc en_us -channel zflag3⤵
- Executes dropped EXE
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe" --app -channel production2⤵
- Executes dropped EXE
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{628C3D30-1263-49A2-9EFC-F2C386F137BD}\MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{628C3D30-1263-49A2-9EFC-F2C386F137BD}\MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exe" /update /sessionid "{05F17872-41C1-46A0-A508-97A0967EE109}"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Temp\EU3FB2.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU3FB2.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{05F17872-41C1-46A0-A508-97A0967EE109}"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.187.41\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTg3LjQxIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iNTEiIGluc3RhbGxkYXRldGltZT0iMTcxNTE5NTM0NCI-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iOTgwMjAyODUzNSIvPjwvYXBwPjwvcmVxdWVzdD44⤵
- Executes dropped EXE
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MDVGMTc4NzItNDFDMS00NkEwLUE1MDgtOTdBMDk2N0VFMTA5fSIgdXNlcmlkPSJ7N0U4MEZEM0EtMDIxMi00QTNCLUE5MDUtRjYxQkNBRDBEQjRBfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins5QkIwRTkwMC01OEJELTQ4NzYtQTY5Qy02MkI1MzkzOEZENTV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE3MS4zOSIgbmV4dHZlcnNpb249IjEuMy4xODcuNDEiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iSXNPbkludGVydmFsQ29tbWFuZHNBbGxvd2VkPS10YXJnZXRfZGV2IiBpbnN0YWxsYWdlPSI1MSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSIxMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iOTQ0NzA2MzI0OCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI5NDQ3MTAzMjMwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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_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-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-PHBpbmcgcj0iLTEiIHJkPSItMSIgcGluZ19mcmVzaG5lc3M9Ins2MThFQjRGQS03QzkzLTQ1MjktODYzOS1CMDZGQTVCREVDNEF9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Checks system information in the registry
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe" --app -channel zflag2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\Bloxstrap-v2.6.1.exe"C:\Users\Admin\Downloads\Bloxstrap-v2.6.1.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\RobloxPlayerBeta.exe" --app -channel zflag2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjExMC4wLjU0ODEuMTA0IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1MSIgaW5zdGFsbGRhdGV0aW1lPSIxNzE1MTcxMjM1IiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNTk2NDM3NjU3MzAzOTgwIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjExNDMyNSIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTI3OTYxMjEyOTYiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A102990D-F22E-43A7-A377-CD1DC003C85E}\BGAUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A102990D-F22E-43A7-A377-CD1DC003C85E}\BGAUpdate.exe" --edgeupdate-client --system-level2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODcuNDEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Mjg2MTgwODMtN0QzOS00N0E3LUI5N0EtMTkzMTM2MUI5MkZDfSIgdXNlcmlkPSJ7N0U4MEZEM0EtMDIxMi00QTNCLUE5MDUtRjYxQkNBRDBEQjRBfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins1MTEyODcyMy1BODE3LTQ0QUQtOTIyQy0wQUEzNTJDMjU4M0Z9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7MUZBQjhDRkUtOTg2MC00MTVDLUE2Q0EtQUE3RDEyMDIxOTQwfSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMi4wLjAuMzQiIGxhbmc9IiIgYnJhbmQ9IkVVRkkiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMjgwMjgyNzE5NiIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEyODAyODU3MTY3IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMjM4MzgiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEzMjczNTkyNDI5IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJkbyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvNWYxOTU2MTItMzg0YS00OGVhLTg0MDgtYjRlZGU5ZGM1NmJiP1AxPTE3MjAyNDU1NzkmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9VUl6bkRIVmxQa1JsZ0RCeVgzaWlPM2ljeU43NXcxN2hMSDBLTHpJS0tTeUdacE8lMmZvSzYwSG13RnBicW5NRWsyaVdLVnpORmVLSTBYYUFsNjRadUE1ZyUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IiIgY2RuX2NpZD0iLTEiIGNkbl9jY2M9IiIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjAiIHRvdGFsPSIwIiBkb3dubG9hZF90aW1lX21zPSIzIi8-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-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⤵
- Executes dropped EXE
- Checks system information in the registry
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\MicrosoftEdge_X64_126.0.2592.68.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\MicrosoftEdge_X64_126.0.2592.68.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\MicrosoftEdge_X64_126.0.2592.68.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.114 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.68 --initial-client-data=0x238,0x23c,0x240,0x234,0x244,0x7ff6a80faa40,0x7ff6a80faa4c,0x7ff6a80faa584⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.114 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{9E6C9C0F-4520-4FDF-B5CD-DC97A984CE7F}\EDGEMITMP_1CCA0.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.68 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff6a80faa40,0x7ff6a80faa4c,0x7ff6a80faa585⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.114 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.68 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff63fb9aa40,0x7ff63fb9aa4c,0x7ff63fb9aa585⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.114 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.68\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.68 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff63fb9aa40,0x7ff63fb9aa4c,0x7ff63fb9aa585⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODcuNDEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MEJDRDg2MUMtOTM0RC00MDk5LTgxODgtMDcxMTMxRjVDQkQwfSIgdXNlcmlkPSJ7N0U4MEZEM0EtMDIxMi00QTNCLUE5MDUtRjYxQkNBRDBEQjRBfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins5QzE5RDM3NS1CNjE4LTQ4OTctOTdGRS1FMTY4NkVBQUEyRkN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-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-PHBpbmcgcmQ9IjYzODkiIHBpbmdfZnJlc2huZXNzPSJ7MkQ0NjZENTgtMTU0Ny00MTdFLTlDODgtQjRFQkU0RDdFNTU0fSIvPjwvYXBwPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSI5Mi4wLjkwMi42NyIgbmV4dHZlcnNpb249IjEyNi4wLjI1OTIuNjgiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iNTEiIGlzX3Bpbm5lZF9zeXN0ZW09InRydWUiIGxhc3RfbGF1bmNoX2NvdW50PSIxIiBsYXN0X2xhdW5jaF90aW1lPSIxMzM1OTY0ODcxMzQ1NDEyNjAiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEzMzczNjg2NjMzIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEzMzczNzM2NTQ4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PHBpbmcgcmQ9IjYzODkiIHBpbmdfZnJlc2huZXNzPSJ7QTRBMTI4QjctODk3Ny00RDE4LUFCOTEtNTZCMTk2MzJDRjcyfSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Checks system information in the registry
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness1⤵
-
C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe"C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch1⤵
-
C:\Windows\system32\wwahost.exe"C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /c1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Active Setup
1Event Triggered Execution
2Image File Execution Options Injection
1Component Object Model Hijacking
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Active Setup
1Event Triggered Execution
2Image File Execution Options Injection
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.68\Installer\setup.exeFilesize
6.5MB
MD505e320ae544022adea3f8c441646765d
SHA13c6266b8a8c0132a97b2785bcb9ae7546ac02cc9
SHA256e1618f31f476932871871ebc6e63d57aad643b74ea892d3d305e4125df1e6f10
SHA512c1cf5c001ddd6b3b3c68b697f8ec9f1cbd48b5881f9fc805d74eb14a13eedcdf71e958ca1b790353a4edc64008558295741cfb785e0a3824a8f3a62bc985d387
-
C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.81\Installer\setup.exeFilesize
6.5MB
MD57c44a5cba89f38d967b1f4e11225da0f
SHA144837f2ff9b3ebc7c371ee5f9e0cd5dcaad508dd
SHA256a10c3e0b2ec1286bfe6b3fe9005a9132fad01be9afc4bdd5adb29f174b8fb706
SHA51225b4cae7fc6d200dab70e94461b7f2e7899813975cab498fb367a32aa2e187fb7b1330545b60f6340d53fe5e04a1ecfb5d6b8bf004ac26ecaa7a8f6e387dfe99
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{1FAB8CFE-9860-415C-A6CA-AA7D12021940}\2.0.0.34\BGAUpdate.exeFilesize
17.2MB
MD53f208f4e0dacb8661d7659d2a030f36e
SHA107fe69fd12637b63f6ae44e60fdf80e5e3e933ff
SHA256d3c12e642d4b032e2592c2ba6e0ed703a7e43fb424b7c3ab5b2e51b53d1d433b
SHA5126c8fce43d04dd7e7f5c8bf275ba01e24a76531e89cc02f4b2f23ab2086f7cf70f485c4240c5ea41bf61cb7ceee471df7e7bdc1b17dfdd54c22e4b02ff4e14740
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.187.41\MicrosoftEdgeUpdateSetup_X86_1.3.187.41.exeFilesize
1.6MB
MD5a9ad77a4111f44c157a1a37bb29fd2b9
SHA1f1348bcbc950532ac2b48b18acd91533f3ac0be2
SHA256200a59abdeb32cc4d2cec4079be205f18b5f45bae42acb7940151f9780569889
SHA51268f58a15ef5ba5d49d8476bee4a488e9a721f703a645ddd29148915d555ca2eb451635c3b762e5a0f786d69bb5cba9bffac3eeee196f1ec7ad669e2d729fe898
-
C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\MicrosoftEdgeComRegisterShellARM64.exeFilesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\MicrosoftEdgeUpdate.exeFilesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\MicrosoftEdgeUpdateComRegisterShell64.exeFilesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\MicrosoftEdgeUpdateCore.exeFilesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\NOTICE.TXTFilesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\msedgeupdate.dllFilesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
C:\Program Files (x86)\Microsoft\Temp\EU8497.tmp\msedgeupdateres_en.dllFilesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3600_1603201455\manifest.jsonFilesize
984B
MD50359d5b66d73a97ce5dc9f89ed84c458
SHA1ce17e52eaac909dd63d16d93410de675d3e6ec0d
SHA256beeab2f8d3833839399dde15ce9085c17b304445577d21333e883d6db6d0b755
SHA5128fd94a098a4ab5c0fcd48c2cef2bb03328dd4d25c899bf5ed1ca561347d74a8aab8a214ba2d3180a86df72c52eb26987a44631d0ecd9edc84976c28d6c9dc16a
-
C:\Program Files\MsEdgeCrashpad\settings.datFilesize
280B
MD50e16b36b0c1ae3eddd06a5c6ebce6adc
SHA13f5207ac60550b544ee6907d71c8da28f1cc2741
SHA256bc3ae9796aa11050b459e9d76a25da441d0054e7ce10c4f879c793afa61547db
SHA5126a3c1edaeebe5cc131ce0a4516a8e9efeaa8c62d7b758ccdaf4c0f5e971abf77448b099d4408b6d70f5daee02b008b5f98dce0445d326e005f3b1767c112dbc3
-
C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.logFilesize
106KB
MD54ed073f32d725d6e68e40212249e5832
SHA14dfab816eb6a841b5420ef17391d94625827dd81
SHA256d7beb28cdef07f0865cf94815d07fe42682d718534a227013c5dd970110407ff
SHA5123427aeb60bc42f3da645ba2b4a1955cc9e0daa3ab272e2a13a133f45b1c452b5f0bcb96152fa38f78e357e5ddb430a9641e08fbf7e5443662944bca241deea84
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.dllFilesize
4.3MB
MD56546ceb273f079342df5e828a60f551b
SHA1ede41c27df51c39cd731797c340fcb8feda51ea3
SHA256e440da74de73212d80da3f27661fcb9436d03d9e8dbbb44c9c148aaf38071ca5
SHA512f0ea83bf836e93ff7b58582329a05ba183a25c92705fab36f576ec0c20cf687ce16a68e483698bda4215d441dec5916ffbdfa1763fb357e14ab5e0f1ffcaf824
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exeFilesize
249KB
MD5772c9fecbd0397f6cfb3d866cf3a5d7d
SHA16de3355d866d0627a756d0d4e29318e67650dacf
SHA2562f88ea7e1183d320fb2b7483de2e860da13dc0c0caaf58f41a888528d78c809f
SHA51282048bd6e50d38a863379a623b8cfda2d1553d8141923acf13f990c7245c833082523633eaa830362a12bfff300da61b3d8b3cccbe038ce2375fdfbd20dbca31
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.runtimeconfig.jsonFilesize
372B
MD5d94cf983fba9ab1bb8a6cb3ad4a48f50
SHA104855d8b7a76b7ec74633043ef9986d4500ca63c
SHA2561eca0f0c70070aa83bb609e4b749b26dcb4409784326032726394722224a098a
SHA51209a9667d4f4622817116c8bc27d3d481d5d160380a2e19b8944bdd1271a83f718415ce5e6d66e82e36819e575ec1b55f19c45213e0013b877b8d61e6feb9d998
-
C:\Users\Admin\AppData\Local\Bloxstrap\Modifications\ClientSettings\ClientAppSettings.jsonFilesize
120B
MD5636492f4af87f25c20bd34a731007d86
SHA122a5c237a739ab0df4ff87c9e3d79dbe0c89b56a
SHA25622a1e85723295eeb854345be57f7d6fb56f02b232a95d69405bf9d9e67a0fa0d
SHA512cd2e3a738f535eb1a119bd4c319555899bcd4ce1049d7f8591a1a68c26844f33c1bd1e171706533b5c36263ade5e275b55d40f5710e0210e010925969182cd0c
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\ExtraContent\textures\ui\LuaApp\graphic\shimmer_lightTheme.pngFilesize
20KB
MD54f8f43c5d5c2895640ed4fdca39737d5
SHA1fb46095bdfcab74d61e1171632c25f783ef495fa
SHA256fc57f32c26087eef61b37850d60934eda1100ca8773f08e487191a74766053d1
SHA5127aebc0f79b2b23a76fb41df8bab4411813ffb1abc5e2797810679c0eaa690e7af7561b8473405694bd967470be337417fa42e30f0318acbf171d8f31620a31aa
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\ExtraContent\textures\ui\LuaApp\graphic\[email protected]Filesize
71KB
MD53fec0191b36b9d9448a73ff1a937a1f7
SHA1bee7d28204245e3088689ac08da18b43eae531ba
SHA2561a03e6f6a0de045aa588544c392d671c040b82a5598b4246af04f5a74910dc89
SHA512a8ab2bc2d937963af36d3255c6ea09cae6ab1599996450004bb18e8b8bdfbdde728821ac1662d8a0466680679011d8f366577b143766838fe91edf08a40353ce
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\ExtraContent\textures\ui\LuaDiscussions\buttonFill.pngFilesize
247B
MD581ce54dfd6605840a1bd2f9b0b3f807d
SHA14a3a4c05b9c14c305a8bb06c768abc4958ba2f1c
SHA2560a6a5cafb4dee0d8c1d182ddec9f68ca0471d7fc820cf8dc2d68f27a35cd3386
SHA51257069c8ac03dd0fdfd97e2844c19138800ff6f7d508c26e5bc400b30fe78baa0991cc39f0f86fa10cd5d12b6b11b0b09c1a770e5cb2fdca157c2c8986a09e5ff
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeFilesize
1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\configs\DateTimeLocaleConfigs\zh-hans.jsonFilesize
2KB
MD5fb6605abd624d1923aef5f2122b5ae58
SHA16e98c0a31fa39c781df33628b55568e095be7d71
SHA2567b993133d329c46c0c437d985eead54432944d7b46db6ad6ea755505b8629d00
SHA51297a14eda2010033265b379aa5553359293baf4988a4cdde8a40b0315e318a7b30feee7f5e14c68131e85610c00585d0c67e636999e3af9b5b2209e1a27a82223
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\configs\DateTimeLocaleConfigs\zh-tw.jsonFilesize
2KB
MD5702c9879f2289959ceaa91d3045f28aa
SHA1775072f139acc8eafb219af355f60b2f57094276
SHA256a92a6988175f9c1d073e4b54bf6a31f9b5d3652eebdf6a351fb5e12bda76cbd5
SHA512815a6bef134c0db7a5926f0cf4b3f7702d71b0b2f13eca9539cd2fc5a61eea81b1884e4c4bc0b3398880589bff809ac8d5df833e7e4aeda4a1244e9a875d1e97
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\sounds\ouch.oggFilesize
6KB
MD59404c52d6f311da02d65d4320bfebb59
SHA10b5b5c2e7c631894953d5828fec06bdf6adba55f
SHA256c9775e361392877d1d521d0450a5368ee92d37dc542bc5e514373c9d5003f317
SHA51222aa1acbcdcf56f571170d9c32fd0d025c50936387203a7827dbb925f352d2bc082a8a79db61c2d1f1795ad979e93367c80205d9141b73d806ae08fa089837c4
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\Cursors\KeyboardMouse\IBeamCursor.pngFilesize
292B
MD5464c4983fa06ad6cf235ec6793de5f83
SHA18afeb666c8aee7290ab587a2bfb29fc3551669e8
SHA25699fd7f104948c6ab002d1ec69ffd6c896c91f9accc499588df0980b4346ecbed
SHA512f805f5f38535fe487b899486c8de6cf630114964e2c3ebc2af7152a82c6f6faef681b4d936a1867b5dff6566b688b5c01105074443cc2086b3fe71f7e6e404b1
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\StudioToolbox\Clear.pngFilesize
538B
MD5fa8eaf9266c707e151bb20281b3c0988
SHA13ca097ad4cd097745d33d386cc2d626ece8cb969
SHA2568cf08bf7e50fea7b38f59f162ed956346c55a714ed8a9a8b0a1ada7e18480bc2
SHA512e29274300eab297c6de895bb39170f73f0a4ffa2a8c3732caeeeac16e2c25fb58bb401fdd5823cc62d9c413ec6c43d7c46861d7e14d52f8d9d8ff632e29f167c
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\StudioUIEditor\valueBoxRoundedRectangle.pngFilesize
130B
MD5521fb651c83453bf42d7432896040e5e
SHA18fdbf2cc2617b5b58aaa91b94b0bf755d951cad9
SHA256630303ec4701779eaf86cc9fbf744b625becda53badc7271cbb6ddc56e638d70
SHA5128fa0a50e52a3c7c53735c7dd7af275ebc9c1843f55bb30ebe0587a85955a8da94ff993822d233f7ed118b1070a7d67718b55ba4a597dc49ed2bf2a3836c696f6
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\TerrainTools\checkbox_square.pngFilesize
985B
MD52cb16991a26dc803f43963bdc7571e3f
SHA112ad66a51b60eeaed199bc521800f7c763a3bc7b
SHA256c7bae6d856f3bd9f00c122522eb3534d0d198a9473b6a379a5c3458181870646
SHA5124c9467e5e2d83b778d0fb8b6fd97964f8d8126f07bfd50c5d68c256703f291ceaed56be057e8e2c591b2d2c49f6b7e099a2b7088d0bf5bdd901433459663b1f8
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\Thumbstick1.pngFilesize
641B
MD52cbe38df9a03133ddf11a940c09b49cd
SHA16fb5c191ed8ce9495c66b90aaf53662bfe199846
SHA2560835a661199a7d8df7249e8ae925987184efcc4fb85d9efac3cc2c1495020517
SHA512dcef5baccef9fff632456fe7bc3c4f4a403363d9103a8047a55f4bd4c413d0c5f751a2e37385fe9eba7a420dbdb77ca2ff883d47fcdd35af222191cc5bd5c7a9
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\[email protected]Filesize
1KB
MD5e8c88cf5c5ef7ae5ddee2d0e8376b32f
SHA177f2a5b11436d247d1acc3bac8edffc99c496839
SHA2569607af14604a8e8eb1dec45d3eeca01fed33140c0ccc3e6ef8ca4a1f6219b5dd
SHA51232f5a1e907705346a56fbddfe0d8841d05415ff7abe28ae9281ba46fedf8270b982be0090b72e2e32de0ce36e21934f80eaf508fd010f7ab132d39f5305fb68f
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\[email protected]Filesize
1KB
MD5499333dae156bb4c9e9309a4842be4c8
SHA1d18c4c36bdb297208589dc93715560acaf761c3a
SHA256d35a74469f1436f114c27c730a5ec0793073bcf098db37f10158d562a3174591
SHA51291c64173d2cdabc045c70e0538d45e1022cc74ec04989565b85f0f26fe3e788b700a0956a07a8c91d34c06fc1b7fad43bbdbb41b0c6f15b9881c3e46def8103e
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\Thumbstick2.pngFilesize
738B
MD5a402aacac8be906bcc07d50669d32061
SHA19d75c1afbe9fc482983978cae4c553aa32625640
SHA25662a313b6cc9ffe7dd86bc9c4fcd7b8e8d1f14a15cdf41a53fb69af4ae3416102
SHA512d11567bcaad8bbd9e2b9f497c3215102c7e7546caf425e93791502d3d2b3f78dec13609796fcd6e1e7f5c7d794bac074d00a74001e7fe943d63463b483877546
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\[email protected]Filesize
1KB
MD583e9b7823c0a5c4c67a603a734233dec
SHA12eaf04ad636bf71afdf73b004d17d366ac6d333e
SHA2563b5e06eb1a89975def847101f700f0caa60fe0198f53e51974ef1608c6e1e067
SHA512e8abb39a1ec340ac5c7d63137f607cd09eae0e885e4f73b84d8adad1b8f574155b92fbf2c9d3013f64ebbb6d55ead5419e7546b0f70dcde976d49e7440743b0f
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\[email protected]Filesize
1KB
MD555b64987636b9740ab1de7debd1f0b2f
SHA196f67222ce7d7748ec968e95a2f6495860f9d9c9
SHA256f4a6bb3347ee3e603ea0b2f009bfa802103bc434ae3ff1db1f2043fa8cace8fc
SHA51273a88a278747de3fefbaabb3ff90c1c0750c8d6c17746787f17061f4eff933620407336bf9b755f4222b0943b07d8c4d01de1815d42ea65e78e0daa7072591e9
-
C:\Users\Admin\AppData\Local\CEF\User Data\LocalPrefs.jsonFilesize
529B
MD542bcfb47cc8cd382c020cdfc3b1a1596
SHA1c1fa59510b76167af7932ed9299e61ced76b3431
SHA25688787cc8ff47b6db651d9c89dd3678ed5ab35a099ef494c655de32cfc6ffb073
SHA512ca7b3b2effcb788a0ca03d107dc5b5082026463b74b0d6589ea5fbf0ca793c09d1bbeb6e8c239f5189dcb64f3c089c8da88c2d1b36137b8a36dd1cd2bf302aa6
-
C:\Users\Admin\AppData\Local\CEF\User Data\LocalPrefs.jsonFilesize
738B
MD5018ddac36f875f8c196a0cc62af7281b
SHA13fa96480a55cb48c645357b46b5ae055a4b28b43
SHA2563b0bd2379381f76ce8bda1259ae4f4a0fffc200f999eefecb0c9af71a0449637
SHA512372aedfdfdbce67746dbdc36c60953a4494ac184af2c8993fdd529c82647ed5d33b5c7bb539bee6d7a490aedfa88bc9ec2ecb981a859a059fda768366ffde165
-
C:\Users\Admin\AppData\Local\CEF\User Data\LocalPrefs.jsonFilesize
850B
MD5957d1667ba20fd4929c459115f30e1c4
SHA14d5c266f1e764498659ee752432cf63e1d110609
SHA25646e60ec41bc6c7fd282c3b16cbd5b52656b8e7b436fd83e407482f7786291ced
SHA5120eb4374e75bf3d5d43136a4dd5ee2802f8cc92596163b095323c1da37ac3415f891b36124f6af9daafc30ab39271a224f6da14b41ba0d004bb7283e85917c149
-
C:\Users\Admin\AppData\Local\CEF\User Data\LocalPrefs.json~RFe59b23f.TMPFilesize
434B
MD57f2487ca5c9a440294f36a8281940201
SHA1650823dc04c3d12730d3c7059c2dee75335b6efd
SHA25644da3360c180966c1ba59b3ac3853e95adc2369306e73b5a1d20743706efe98d
SHA512b64e3d07f6093754cd022feeab7c0658378f8fbf45b747ebd5f83db7330c04dd476122efd2a47e1da3991fad6e0d93b276b2a69cc879a636b5d3203c45de2e80
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.Core.dllFilesize
915KB
MD5100c32f77e68a2ce962e1a28997567ea
SHA1a80a1f4019b8d44df6b5833fb0c51b929fa79843
SHA256c0b9e29b240d8328f2f9a29ca0298ca4d967a926f3174a3442c3730c00d5a926
SHA512f95530ef439fa5c4e3bc02db249b6a76e9d56849816ead83c9cd9bcd49d3443ccb88651d829165c98a67af40b3ef02b922971114f29c5c735e662ca35c0fb6ed
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exeFilesize
7KB
MD5516ff62b2e1f4642caa954c0968719e8
SHA1e349d0ce82e2109dd0d18416d9cf46e8411b7f15
SHA25619da58849cec5933860116e60a1e94b08e30d90e0f955768270b47998d612045
SHA5127aa4a0c87b29c2a84f585a884d8208fc2352a43f2cdb549c100e3b121837ad5f8dadb1101f57d1d3fcb7ebec9d9f22e07dc14239b7d2e2d25793c999becf288b
-
C:\Users\Admin\AppData\Local\CefSharp\CefSharp.dllFilesize
272KB
MD59ca06a8f9e5f7239ca225ab810274023
SHA1e1a219f567a7b7d3af9386df51b14c76e769c044
SHA2565fd00ae3e83e6ca156647ff6df87b49ffc7cad47c23fe3ae07c067c5adf6f74a
SHA512430c9bceed5439b987d5bd4840cfe32411ca61594f18597aca1948aa39a22c9d70beadf3bb9b1dd0373f81a94a25dcba17fa8e8c73abf06cba28d0971d5614c5
-
C:\Users\Admin\AppData\Local\CefSharp\chrome_100_percent.pakFilesize
667KB
MD5ae195e80859781a20414cf5faa52db06
SHA1b18ecb5ec141415e3a210880e2b3d37470636485
SHA2569957802c0792e621f76bbdb1c630fbad519922743b5d193294804164babda552
SHA512c6fef84615fe20d1760ca496c98629feb4e533556724e9631d4282622748e7601225cf19dfb8351f4b540ae3f83785c1bcea6fe8c246cf70388e527654097c1c
-
C:\Users\Admin\AppData\Local\CefSharp\chrome_200_percent.pakFilesize
1.0MB
MD51abf6bad0c39d59e541f04162e744224
SHA1db93c38253338a0b85e431bd4194d9e7bddb22c6
SHA25601cb663a75f18bb2d0d800640a114f153a34bd8a5f2aa0ed7daa9b32967dc29e
SHA512945d519221d626421094316f13b818766826b3bedddab0165c041540dddadc93136e32784c0562d26a420cb29479d04d2aa317b8d605cd242e5152bf05af197e
-
C:\Users\Admin\AppData\Local\CefSharp\chrome_elf.dllFilesize
1020KB
MD57191d97ce7886a1a93a013e90868db96
SHA152dd736cb589dd1def87130893d6b9449a6a36e3
SHA25632f925f833aa59e3f05322549fc3c326ac6fc604358f4efbf94c59d5c08b8dc6
SHA51238ebb62c34d466935eabb157197c7c364d4345f22aa3b2641b636196ca1aeaa2152ac75d613ff90817cb94825189612ddd12fb96df29469511a46a7d9620e724
-
C:\Users\Admin\AppData\Local\CefSharp\d3dcompiler_47.dllFilesize
3.9MB
MD53b4647bcb9feb591c2c05d1a606ed988
SHA1b42c59f96fb069fd49009dfd94550a7764e6c97c
SHA25635773c397036b368c1e75d4e0d62c36d98139ebe74e42c1ff7be71c6b5a19fd7
SHA51200cd443b36f53985212ac43b44f56c18bf70e25119bbf9c59d05e2358ff45254b957f1ec63fc70fb57b1726fd8f76ccfad8103c67454b817a4f183f9122e3f50
-
C:\Users\Admin\AppData\Local\CefSharp\icudtl.datFilesize
10.2MB
MD574bded81ce10a426df54da39cfa132ff
SHA1eb26bcc7d24be42bd8cfbded53bd62d605989bbf
SHA2567bf96c193befbf23514401f8f6568076450ade52dd1595b85e4dfcf3de5f6fb9
SHA512bd7b7b52d31803b2d4b1fd8cb76481931ed8abb98d779b893d3965231177bdd33386461e1a820b384712013904da094e3cd15ee24a679ddc766132677a8be54a
-
C:\Users\Admin\AppData\Local\CefSharp\libegl.dllFilesize
359KB
MD57dd6b0e4a31d35a0fae5ff425707073c
SHA1fbd12e9f8e2252c52ce555c2ebbd7f07e62a0140
SHA2568762d8001fc3ddd90e3129dfea172817e8d09b9936eaae391957de4326c8c906
SHA512726968df6b83ab5f589276672250d92f532fe2dcea2176e42031a7f1dcecf578b0320cfe2a7d88bb9883ad99387d71c6ebf1e9968272bb5e62850ef09abd2648
-
C:\Users\Admin\AppData\Local\CefSharp\libglesv2.dllFilesize
6.6MB
MD58803db5b167fb5a5f8a8c595c4e4d7c6
SHA17fde861151f3bea66c65b6c2487a30728048811a
SHA25652a58d25a41f4bd31cdb4a0d306217862e04ebf7c1925cc85330054a5523d719
SHA5122fa9a0eda221982896e41eb387b5e156198615ac1a1fbac0acffd13008919368b41a240df416c1fce2e48c20a14cd7af7cca9fba476ada5e64a0cadde84a44b7
-
C:\Users\Admin\AppData\Local\CefSharp\locales\en-US.pakFilesize
456KB
MD54430b1833d56bc8eb1f7dc82bb7f4bc9
SHA1dc15e6306625f155683326e859d83f846153c547
SHA256b44ddcfac9df4934007e6c55a3c7f5e7f14c7e5e29f35c81de917fc3b22aabbc
SHA512faf93bf371b2a88c1b874a5e2c54e4487fd152ad19c2a406a46f55ae75ecd421a779888c2e4c170857b16bfb5d8744bc1815a4732ed50b064b3cbd0c5ffad889
-
C:\Users\Admin\AppData\Local\CefSharp\resources.pakFilesize
8.0MB
MD54933d92c99afa246fc59eef010d5c858
SHA198d443654e93c73dd317f9f847f71fba3d5b3135
SHA25662f4674daa15245ee081920b8ee191e72f36ca8fe24f6b986a832f45676915b2
SHA512a3a69523c8e7310716daeebc06c2ba4fce673eccd1958e824ff179b82f4502d0ec095190179bbb387342e4150f952ea7533182fb6ba90377d17dafba8f4da623
-
C:\Users\Admin\AppData\Local\CefSharp\v8_context_snapshot.binFilesize
643KB
MD528477a60b4fbd51dfef5237245817690
SHA1b0afd5ea9f9d550124f23c65bc7851ddeffc662f
SHA256169ea86f544e5cdf2a460675f876a9abb7f56bbe122782e94bb03d624931fc12
SHA5123520658583bb498d5032a7f7ae77195fd2e5f8ed03c6531e56dee8320d8701102a723766e59f7766ab223f837e65a6d85cf862bb2bef6d2755ce45e672a47b22
-
C:\Users\Admin\AppData\Local\CefSharp\vk_swiftshader.dllFilesize
4.4MB
MD50ec149455727ace9acc09b3ba2c3a2b2
SHA16eeb990876cef6a34115b67f3190255db589f723
SHA256e2d8ef53897e864b5b66bc73606681c99461798a9f4c1e13ca5cef7bc774d7fd
SHA512c8eaa598c9439b1f2375fdac1f58896853510bddbd640707b9142c0d3793836120b28d7c2bd0407f0d5656dd19f14b312f37b7ac0165c9cc8b4c1a0f2af62531
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000aFilesize
69KB
MD52280e0e4c8efa0f5fc1c10980425f5cf
SHA11d78ccb26fef7f1bf5bf29de100811e1ac8bda23
SHA256b9225cb1f0df94ebe87b9eb2ad8c63cf664d2dfdb47aeaff785de6c7ce01aa74
SHA512b759fcbf578947c0290ab703652df9f37abb1f9f5cf6140acaa8c4d4ee655ee0ee1f9bee9d4fd210d9e12585a51358b52e0e9c0878abf2713e6fd69a496ac624
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000bFilesize
329KB
MD54bdb35f3f515f0cf3044e6a9684843b1
SHA112c960465daf100b06c58c271420a6be3dc508ae
SHA256b835bd77e17447a2dacfce2645a5e812733fe5a777a5e45d9daa56d28675cbef
SHA5129fa600b87843759b632c2d384596109cf1fb149a5ab38524cf43cab5833cb25c355479aee90d60462764200108cde5ec71f0988504c97ad09e25975cac65bfe5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000cFilesize
105KB
MD5b9295fe93f7bb58d97cc858e302878a9
SHA134c6b1246cad4841aa1522cbd41146f9a547e8c5
SHA256c0233c9b273aae7df532a992e710aaec409455b4b413b89a25854e9fb215c36c
SHA5124c44ddbd35807653a60e2718dbd2ea85f09d7107b270045bcc2484e2a0ba977fbbb5739236ce7edb71d584c8f68df31fa3bdd03229eeace60c19662469adafc5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000011Filesize
253KB
MD5f06054795aec96f20b59c5b65bc02193
SHA1b9421bd92bc505f904d789768dd19485e208c934
SHA256720513df12f0fb1a34e77024c741c34935488e98d86ece002ceb8b820403a6ce
SHA5127d37be3628e897fcfff747e038f8015676759af4c02ca9304444a9575e19996a50b6b24a831b8a599b02e7177d92c0fdff7ebd33d77e960230cd96a4626dc1fb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000012Filesize
163KB
MD5d5d7675604340f99633218bbe4793104
SHA1ca1df39b7a903dbb856a555db75770f6222e7dce
SHA256f7d966e98dacbf184660988f6b4482396b517d391e4d0475ffae4fa6f40971c6
SHA512bd202a6a44ba24d784e3a55556b02d7c20738553832bb42d7aa3205b069913e524c08cf0a348e255b6f0c697f118f190bb5056695ee9d37d37296b9675964236
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000013Filesize
206KB
MD57accce82a37b1478a68e4190522f92d0
SHA1d42bdb750ca4eb0d855d5929551a019978e937c1
SHA2567cb23f575f0795fc284800e63a1c64bd8538200f2b838fe72b117097a3f87152
SHA512bd963c28d166ed3ce72d38dc57e90e72ee84f984bb234fb8cc07854f3857f9ddf0400cbcb64dc7e2158850cf862369e87750c06b17e7e22a3e09fdc9908322f1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000014Filesize
42KB
MD554476cef20aa3e041c5b14de32a5ab6a
SHA1032a1be25a46f795208b0365455d34e1e3b17760
SHA256189be432c6fdba1e70841382153b3b2ac08aee391c80f6259066364be3ec461c
SHA5120b8ba7bec920a0b73393fdcdb8fe399473965646b32ddee7a6734fa222476780c40b8ff74e528b12b2844cc15278bf0c065ffef32c227243829950623946d56f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000025Filesize
19KB
MD5c52f3521639f61d058b371c90f7340a0
SHA126cda00aa74d363215fe8e5de80878cf767d9747
SHA25698dadb40ba05b9079b6c7cfdcdce83a11764b15cee748e1d6b06ef13e94f1736
SHA512ead5c9d264cb85f32a1e4e7ca84df51b2d8fcad89abe35b8a9e461cab914224e5ee9c3b0cbcaf720ffaf43566b9d9c958667024e0e6988f948640fd782ff3f23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00003eFilesize
8.4MB
MD58450908897067c9527740d735897740b
SHA171c993302b3174fe4fd712eaf8886a4842778e42
SHA256f5a04c5d6ddcb4cc3925656919c37a9ca18f20f3623c722dc45499cf1e4de8a8
SHA512841d6d732db87ca350dd7f4eda273584810dc976f6a368a141de8ea8d87113e8f8ef92c747ee2fa3dc8f906456e2c2c17b122d3f86dea9042c40acb9170848f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000048Filesize
98KB
MD565e56706c75f6e9a6919adb6a758b8ee
SHA110a88a193c4a11bc6ae69e032061fdf62b564173
SHA2564b9169f4e8dc65736458fb1d2d74ff0254cf5e3d883be7dfd05606eea40092c9
SHA5122049960c061dfaec124791e5842985662d70ac7fe7996448c7ca6960243f3fa09da77561c0840a32677f55656d3e96a330f6a5fea579c17b3643929588e583e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000076Filesize
51KB
MD5588ee33c26fe83cb97ca65e3c66b2e87
SHA1842429b803132c3e7827af42fe4dc7a66e736b37
SHA256bbc4044fe46acd7ab69d8a4e3db46e7e3ca713b05fa8ecb096ebe9e133bba760
SHA5126f7500b12fc7a9f57c00711af2bc8a7c62973f9a8e37012b88a0726d06063add02077420bc280e7163302d5f3a005ac8796aee97042c40954144d84c26adbd04
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\13986ccd40e3a0f0_0Filesize
303B
MD598401d3e586dffae563ec276a9b94da6
SHA1488cf60d181b7a4e4bafbfafdf11eb30e4edc1e7
SHA2568859641b12278c12496aa0eb2651ba1932b1b431b7dfb54a8838da4e9d2e0ac9
SHA512ea94a2b6e3b06efa63f353354858b371376b30d6f300c862380bada5000a16856b2f5f4b28b9e5ca3ec2a39ca47e959c7f35a95969aa9c3d058674c8cf27f8d1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\41f5c08c73172cce_0Filesize
53KB
MD505a3ae4f13f3291ee99fd57a221042a9
SHA1542b857e0e5e38be36df52d1341284e50af84dc9
SHA256aaa9f1161e521d860f93bfe5f942f1f836cf37ef2d7af4213c74a49f8a70814f
SHA5128f4434fd974580a1ef7b5575bb9d971944cb23c87809c9bd2e4701ac2b6048ecdc5b40ad44ddba3510eb750ac0d287466d100de006007bec1c7ef984970b8f7d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD570db5c6c93d03e5236fa84aa84616e3d
SHA1ab2398b26eb081fd79131b950f1819f75517874e
SHA256571a67833323e0359000d89267cc7efe98d9cd98051998ed6ba3e31d225b0da3
SHA51270b8ccf3efcc817cd80b76b69338ba20a2bee26983234ac4ac43b96bf14caab3f71a7e1cf5decd3d23bc076c71c7db7d59aee7b38ce619bf55a6752ba029f664
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
3KB
MD570b51b2a52b055b3051eb89ad3d37eb6
SHA14c4f385b09065221b228661c7a26112c42c4cef4
SHA2565fde328c6e4029af5ea308f44d7b564b8a32ef63291ae85e923a66cd19b4d3fb
SHA5121e6215a0fd448ecb9f9fbda38381e86d2330c0077a0dd5acefc81d59ef7546996ded38049f1c29ea038f279503318984b96f2fc6bde70da9c3e1421f3bd592e1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
8KB
MD54b174799b01e2bde075adf3d55837977
SHA10b5f18a99a66330afc59d733fe2bb8a130a07dc9
SHA25691323f006bca40ca22a90b93c8697b3338887190495f5958795b19f87a8aef04
SHA512c6964a67d778f576b44356b1439b2fad8c5a0c65add17eb1c2c5c2111e8c2d92cd10f3632b8820816eeb4b689828e6245bb4dc0942818f31f44c81e5d9b21f64
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.oldFilesize
387B
MD5487151ceec0ab4ca3faf5de45261c3d7
SHA16dc9c09a08ea3f7340bdb80deeaea9b431e5f72a
SHA2569ede4c7996bbcf932c089fe4973133e18643b42d01aa70a25dc3ee9e09beac10
SHA5123ed37efa1c29ac5527bd6cb9106d60ec4c2033341aded65eb406bf6dc96ce38ea999a5d5ee93587259f0cb20ed52883a6436bbe1b82b8e9b990667f7c64ff891
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.oldFilesize
387B
MD5efa2b536db5b37ba64e64e27e69c6380
SHA1c29ed64e7458cf388b7be49806074f2a3c2769ce
SHA256d46db8b34815ffce12ba6c433cfde5ec2d17fc9c520c38df43a738d7da3307aa
SHA51224d7830fbe7108601ae01d6a28ae966789299444a26923abdc5cf2c80c92bfe38e4956f7b853803694fb87d33f94937527baf50ee076973458b47a5f70756a3e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old~RFe5f648f.TMPFilesize
347B
MD5ef3664e5f0507156ddcceedcc3bf7b73
SHA1b67440e838e45918a0f08dbe3d6c1dbbc8a90fa2
SHA2566549355cad6a10a332b4d92963fd15ee7d27168e391590a144a0a66ff34f8df0
SHA512fef348c7ed69d412765c4f541b00000d17f44c5854775d0d85fed03287ed2ba41f36e0653bb55d4aa11c3f5a028ddb03185f69427a167fa6b31f25671aaeb164
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001Filesize
23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD57b5a613b4527cab9fb23cbce3768fc3f
SHA145b63ea58d336cc2ddf3352fdbabc92527f9130c
SHA256d5aaa6206ad78a3cb871c63b8b2366f3fab2c498610a93dd0411bc40b6d83254
SHA512a083e05589250ba432ed369bf720bf4659ab98d2b6dcc8d6e51da27463fc000e34f2642bbcca04978aab46ebc629db0a3ac1e21b36fa8188e83445223d1a7ec2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
6KB
MD5313dbde00e310f4c2db6dc0365e802d3
SHA188d5363215171e8765eab2eb2e2f139874c35949
SHA256c0c8a295e9f6c5248c41cf6c56edab1c729af6bd7fa62b24dbeae0d285fb87e8
SHA5120497f4dd764b83ad1b76617263f14eb12c4e36611bf44c1045e03020be429df0b5a56a0a7613c0fce555521dccbbe415730570866d56657298397a52d23339e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
11KB
MD5e69db2e2650183e07229fc752d005fd7
SHA1ca782897961caf1f08e8d7be35369e21e51d80ed
SHA256012d4760f362aabb8434e17dab084979c4a5a60bf4462b2945e24207135ab54f
SHA5120c05a8b507f0b43ada415b617fbfa3200d177e2425516abb45142fe174b0658cf2edf078fd574f83d9828ac7e3edede776335a807064e5bae66000cf355187af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD5785781b069996e14e2fd8997e4195f6a
SHA190eaae4b66884c64f0cad0fd650a1f3112b550e2
SHA25661bcbb9925b132d228fcda3bc6ae363a4c5e8e83f836ab0e9cde24cea0b24a63
SHA5122706911345384af221075c581fc06ec3b25143a508d5e29b73945daf27bc24ab58506257e03c6d3a4576def33bf7c8968d924b1ecbd973f9a9c7f59d9f8c3b7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD5323743e331363f8423314c82cadc435e
SHA1684d797b342e68e73a913df38b2f21b5b2da2026
SHA256c40d80a621f4cb46f495bbf9dc5abd811a1f7e5195137a1892606de668a3d184
SHA5122c22b3e0bf9747408980012344381b450a8d95794532031f0ea55975e46e50a059b169b728b061245133bc5bb9fecfce643aef8342e213921333899a294ba000
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD59b7dacd38d5826a1b8e99097e883337a
SHA1bba3f5a434be9edfdef230d6bd0b86ef014a780f
SHA2563050bcc84bc071cc8c4a54b543a329298c520a8636a13ef7dc9219e6988db884
SHA51256c8b19a6a6e0465fec3b5320ea314b0a827b0bb7ad90540b798954f55b1157d6f58f6a42fd3f60ff0e0d36f5da94e8fb05a53db1653906394d0aa5cded0b374
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
524B
MD5aef53666cca101c58cb938b5dbdf5d04
SHA1c21a78c4ad50e3c03aefdd50375ca0a3b2bd592b
SHA25627f65cf9063b4c795365fcbe0a9b34b0ef2b43ee9fcd4a285836984a63b340c9
SHA5128ab5f1dab65d85f4027329f08f7f1ae93c98e05404d334e5e95879022bc60c4c398ff9ea631d3c8f661643ea56dd54a2a71ab0ba1034c5aab18c0fd3f0de89e0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5645ad0626868d8ef676af7e5864e80a7
SHA13adcd2648fc0b12b164776371ac73115a1d9e758
SHA25690014b55357c70b9b66f29a2534381448c40a0904b6c428374da8c9105dbb88a
SHA512cb424a02a68c1cff84c1715e3d20c718a5629d69d2422ffb5331b43eb0bc4bea45c098ae59c6f596a38a4bd5fdd1e63823fba4f5a3e79365a0833735958612e1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD52c381e76b8d8907adabff27c9ac4f293
SHA17492f4944c00f947a65f9ee7508689faa28d8a99
SHA256782eee94ad2e22622453febee455cbd9e5ff5315ac36acc8e2f938a739aeb235
SHA5129ee33ce36533d16224349eaf5b7077b65f1a396efebf3e9ec006baefe32936bf79f9fd55709eccb761f474bf4d4cba8ba9d9cd1ff1c4b96cdd79b630bf8eb7cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD5f152a19119ea6af44027f329862fa7b6
SHA1167d1b121167eb7de79a3ad17139564a6c13f6bf
SHA25608e0cce9589f7e81b377b6f5a0fb60d4fcc9d38d66a38160894f4256b0e33aa1
SHA51264383c25ede653b69b00458f0a16ba18e2aa1aaec3fc23442016295cde74163c154a6af8e15a9815527b0abd90a754d094bbe28604fcd5bc12cac59193a0c445
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD560dc023cf9eb62e06aa6227c842c195d
SHA12c1b100393982fce2e36bf4142ee3c99e772f1fd
SHA2567bb904e11b6eb913cc2ace19b31cc480992ef17b42adda4a0a0f3e5abca6ae49
SHA512fe440c5e32dae340a2d85a55ffc04975a91ab986f942e68a928da5c31a7d8cf3c30de13df6e9eab15b99c3b323ba90498fe2fa1efaa2619d74e9cb92d6dbb2c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD565f698623b5c05dcf4b909919e873230
SHA1c27acbe5f02377f4f3919d1a4b0cfcf9b949292f
SHA2566e40afeaaa26727c9938f10b933efa6848344e49fe2505cfa0ecc6b9ac71929a
SHA512ea8087e8c907b8e8df177a1a51bf490c2e89a0ae8d33c2dbdd77cf783e9350bb06e573774933fc1e171af731be657b0749c5fa4d61727bd9dd2cc74a6d0d6425
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD52e3ade5ab4a7f162c15364bc39d54903
SHA10e3cfddc96169f6bc6bb6be83e080b65867c2245
SHA25673d0d85ff0017e4d9d4e8637c491287a85c36d6bf6d596a2112dc4ba31f81bf6
SHA51227b6b165e9b31ea7e4573134f6eb0bf1fa05c7cf99d87cf5232243c024153e4c47533c5f2c9078b354a13d70c5d45e54fe2bcb28558197a50cd1cd1bf9bcb9a6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD5b16bf52f51357cea68b6a7cb11697cb6
SHA1c59e828ca71e981b2cc81c241911a8c0085e086a
SHA2565120df9001d237843efebe4bd764bce911cb7ca750ebfbc1a7d80182e5d1ed81
SHA5126513bcd4d7aca58b7869b8be45476f5c522c2e24cfcdec6993e973e4c840b726f1294b67dee01843b3e306c67f0c742eb1c67eab1b106bead3b1fce40aee31fe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD5275f02f6f25065451b006937d00c394d
SHA11830597d4918c5a956a62ee9f0775d336a22c299
SHA2567e2bd3acd41498f87d706926357c998f19664ed0cc3b24875caafda06f9be987
SHA512935428c98760042701d16c5accc73bc79f0127c0abb8020a5f79269fbecd8e8fee9aa7563f0f6ca022069459f4f9049c9fa11788face60123bd76844d81dcd60
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD56d0cbf56fa4cca7821ea731abfd3eb45
SHA118ba8dd4bd59a8d1dcb43649411cdc77e92f4f61
SHA2567e7cd91a14f89f91a38c48c5d5171875dc1c64c10ea8d91b060334a22c56cd91
SHA51271f314269f921ce587ac48c12cc53ef4083d3db47f6edab9c63f2f1248553193be746a9ba6ef38457e4aa451ee30554e28de462f1580265342036bb84c3beaea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD5550f7b90c45231d5b3bc84d66c01b055
SHA10080e35fa5362f73a3bf10c0c56b8f9526b9ed06
SHA2563b636f17d024ff0f7361a5ce524b54f69c157c6b7078a60d070045f3fe30db80
SHA51271f7dcaaf8278054a934f1f18cbc6608bc53c5ae7f061d3a9a5bed112523076fd656d04803ef09546c1c76ac18fe2746f78dc6102d9af992f92d415c278844da
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD5df6ea94c071b9b0f35bc6c1ff8e1f0f6
SHA1e7ed5e14a39769adb39dd818a2572f9e41fb1850
SHA256341c966d7e92ccca504b1c626e489a2411b55f81df580729116e7a43c2abfe1e
SHA512e9c8469511e5ba465834dfffc123230ccbc4c753cfe387b41f4a708080c6fc15d8d48687f1263cdde1656c0cda24ce44753b726114f059118d46946192ceb417
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD509041eefc224657d451b87138746662b
SHA1bbdc7c06f7f5d1867ead3b4276541e05ab804823
SHA2567f60734ad692d255907323c1e81bb648009c10d6418ce0fb50647d5f7f4f658b
SHA51281a28c5d8e06d2b1f57f2e9468ef30f2d5ffeb5530d5bc7ca2c2883eacbac50d8b89e0b3183f72423b9dd13f6c2711831a8780d5c65da6dc94b5a818d5dded5c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD526915043512f0b7612e432a0ea56ec2f
SHA1c0510f2d2dc1c77c9e79a633e48b61f74364a4a8
SHA256cab975bf38583465dc287485109d5186e99b8605e8bba0c6270f1febe4bdb680
SHA512f7073733cd3e4a8dc2188f5c15d266c9331bf0828e51f345a85ea42e67a1dea63e1e5b35facf2c12c32800f2d809e13b369cb62f62924729f143bce3093771c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD5f575ca852eb92cc0c5b858710405dc93
SHA1812a8eab5d8e4b6f9007b8031bf748494ef50d78
SHA25662818f005f862a31ffe8a12b9bf9f009c96914eaa34e68b8e4506e25298fdb3e
SHA5122bbbde5f02e938f1c88797b9a7531be636135ff9160069111ab424593e8fe6f47367574230ba6a2da6cb6388251a434fbd603fd9d7b8382b6450d6b87dc914bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD516cf3906e20b361b8016161c8a14abf6
SHA1a0186707cf9d984bbe1aa10f611a78de49bd67f7
SHA25626857b7860d2c6bbebeb9bfede4826b444ef46c19a1a6f55ff051ebda47be17a
SHA5124f5372fd8f57b0a52cfde70d7a2ed810ff67b243cf47d75860024e7143ee224e8e3e6c1ac8cd4d7c71ea38712c5040dda64552380f773946c90aec2aa05c7ff1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD57950231c6a4fef75bad641b28d65d13d
SHA13cbd3eccda4750a9956933cf6a80ac42bd4f1950
SHA2564e5520872dd648bd364dbad7cb2c54b879d07a2487fc4fda117e4d514c097381
SHA512bc3168f53c5f9ec3d120d81b413aafc2d04455b90bac8d2e29c5190dc5d7e28b050a42f5247ae411f0b50a7011410df0b6eab06fd581b700067b3888867b0845
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD5940fca0ded87f01af66eea5e2c57f14a
SHA15370e257bc72d69d1f505def04429611799b300c
SHA2560be20660bed9b230dcea29fcd5d422840d24a93faac5e8d0e625a63afb4e20c4
SHA512393c712deb9379ceaa069453d0c5c1f277476be450e97759a9964f65159e689cbc8bcb88833a21d799333f773e75f38050361b85b9774d2ec79b63cbdb6be195
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5462151d269ee003db44101fbef8a645e
SHA12fc869bfdd96b01ec5adc9cdc1783c4082b99492
SHA25681d0de31997c40203a91e759ba9bfb316b9d58d9fb5b3ef8a373b405edfae484
SHA5120af42fbf05b3163ce6ab39298e002489028cbe289a55aa089295ec0e5dc0c63e04982ec7cec30ec7f2a654fcf35971945513cd56156139673297e657c757fb58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD52e24ec7eaa466d1ad758d0c005b4e55a
SHA18f953114c10dbf02a64d948b745d41e157822fd4
SHA256bc18f691673a94ca536a647e56d09468fd7076b87cb489cc6d413f3933bd559b
SHA512e840aae87d535b789ecae7a3e8468d6948dbbdc201a803c43718ba22c42d635d533c3eed23151451ebd9368ae07f57ef573bbb1e237f6aec369f67d4bb24bf6b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5a2e31b5cfb295eff07572b462cd6efc0
SHA1dbd976723b2a084d854cd53a2975ba260d0358c5
SHA2565aefe329ac92c578071cdecc45701e5929fc1403f2a95bfb7d2e2f94fb81c179
SHA5127e584cb74b6ba60d16053ac8519b7333a63553849f4a1422992d903ab98680d36ed977efbf42b1e53fc7c0440b8a38151f6e27caeb5d708bb2efd55796b680a0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD502a31474974ed8bda2c6362193608b5f
SHA1a813cd2f6b826c8aa1f88e35d33ef6ffb5724fe4
SHA25633f952bb4f171c984d6a3579437cd0f239798d59101d00b9713373bb253c0ef4
SHA512a78c678d4233a0b361e99f37acffb17fc7124a5900637bc65d8aa1a87604dbfae7a40d2a3729b8ea5deac7185e99f9b2cfc19ca9fcac2dcb0d5f885c5959dcf2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD593ca938d4af97216839e5abd2f52bb1d
SHA1d44f6f29b90ad15694c576aa57d061e4c8c8d196
SHA256208fe06bc3f240e6363546708ac1fbaaaf14c5b55f65110c2c10597af6260104
SHA51221fd3fb14f0fd2d3913944d204bc3e14051d11f95b8fb26ff84b9891de3e9b78b7c9b977c4926c13e0479de5c3a5ce7fc801a5e589d1598a993e4a969cde5f69
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD53255654ae7fa1a4ce0cb13030429b5ed
SHA1239e3468f55d16fe523278ba8b7ffb205f56a5f5
SHA256df3b26de989ab69e0eb17fdc872c7d8b4170d11b61d04cd02af4c18576a5e4ea
SHA51258646c863265c4d781bfd7634776cec978622e8d08ec717d35d3a31b4574d0814e4dc31b7632cd8ae299606681a738e63ea45fe547f948c31e4b452cc80c07c9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD50397a0e2c843ae2db8744c095a371ede
SHA1f8769b05e24dbc0e34275a5c2e0fbe432d3e0d4d
SHA256f79acaebb9d0787b0824cdc91b85ee03e20777dd5e762a87244796a600aebc60
SHA5129a927f4c9293afd1a30bab9bc8dfd4c21c9b54b41e456dba128a4f217a1dfa4165a7463fb608e7cdb0f2408f807e1f0e424337c53d6814ab9c34383b34519b7d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5d9db9e2cd2db5af7010a78ee7450c119
SHA190fe476272d33894ac199ee8e7e240c8157690e8
SHA25650e4ea7c2308490d6058339bc292f7661d8cc49013e940e45425283f01d90429
SHA51213f10edfc7976638bb683502fd0989ca6e98fdd55e87b2a253d29c2487b1a621267318d16a8dd03d22a30ee691082b57467828387b6c0c68a0c8b95ed83f4c36
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
272KB
MD5d8386e6ac1f1ab9859a930c6f2f7a0d6
SHA198176b94dcef84b2093c5600dae20845bc51db9f
SHA256307fa4faeda56d9c34f0702b797019eec528576057649f2f3d3cc6acc4967589
SHA512bca365dfc4caa7865980a64f02b26415299de72fde23f5eeb3b2724a33883acce8e7fcdbdfee86f272ed222031894b51bc6dc92e911033483a6348bd7786eae4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
272KB
MD575f99a4acf53d6d6c3d5dc4f67a36136
SHA1f5e82e7418e2f8439dbc81c7617bcce94e82f313
SHA256758e091295c5c9daaa851a06ba8b44df831bb8aac626bbff34bc89b774c74b17
SHA512be352e7f12621f686bc9d7008d546c0479ebb784290762d2465b4c3b851b269460ec7b4ff2b3ce8ec5b71661802a1286e109349a2638abaa17bc440cc7b9f4c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
272KB
MD5d959ef10b98dd86bbca84f99fe549e93
SHA1963a51564e5384f93570c123860123948272d278
SHA256c492a216b81767bb7e52e2d6d7448c60a8c1cd0dbb2464bdb09599958f58d160
SHA512fe324f9b3ba5dd3178806e8b4497fb7a837e0cdf61bb76277a99cd62b9259c2527344a8343b56c6369eb9037fa688a3b730556a9bae90e7f454e5a7150131cdf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
103KB
MD5438145d57ebce18b97470e3e0443da10
SHA16feb81b591fc02f8a3385cd6f7247cd9cad35115
SHA256cc6c82b8afc37ff31d3624820f626048902b1a12abb366186dd58d5543923ebe
SHA51237ede7a689106b11f8ee30a77c18a4ec4d5339a7d3b0aae73e4d619e18c56aeb3aa1c48f1ca4d06b3a436ae2e891b523f3b779b316f59bb9494ea953e803361e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
91KB
MD5c600b49b77b10ff1359420d20f484e2a
SHA1045bddbf4be55ccba369ef1d65231d769f6f73bc
SHA2567b6bc143b48ddd3eea35ff7280101b77d5a9952b8e8b634a766076a10536aae0
SHA512b65574aaece74f6cda9aac7e5865384e630c623c9b185cdeb2958b684970eb67481bf843e1a5acbba93f8875d6ba064ac7cb7564425a2222d53a0cf68f0a3819
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
106KB
MD5861b187b644ac78d2bea18114e864581
SHA1fcf5b6920f2200aeb3959dd6d1cdac9f50c71a74
SHA256cc799ef94f8b407ad748135657eca21834927dcc2f1ff9d4f8e50699c91189be
SHA512318eb1cd636c26964d399f86f462c50812045c760de5792f6e098e861beb57da00e9a69d00fc438f269e19bd65463a0b16827a24b7d3a0698f9f2f05ac090659
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
104KB
MD5ab18174722d0313de2efc0b5be4d0434
SHA18c9d2d68437da953c64bd5c59a3e2826a74c9948
SHA256b9b08b8e235677c7c30129a005ecf5b872373e6e5a3c7cc4157a003aecb6f165
SHA51272320a291f5505f841e167943aa341d037909e384b89a5997ae829b2249cb577a044a177674e77192d682196df4f9938eb3c719c5b25ee9909bbd0ca27dbffd4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5d27fd.TMPFilesize
88KB
MD5ab528c7ea7ecac2aa6e297e3b489a02d
SHA108e808132912492aabb5b7dc6920fc55af01531b
SHA256824e0e94d4a59a1cc3e15dfeec2f292c46ecf5f58cc2b9da927854ee1bc2dce7
SHA5125e0519543356f2a8db39030b89c9b6a9e1b007aa9f62a7cb646236651c29ca114b49dc68e65e17b46fc49487e03a2aa6f3c2aa31fa055da982881a7addc9ea3b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1Filesize
264KB
MD545099f0d5fb99aad0869a4e73a0b2949
SHA1e39457d87cc84c7cecff2f55295ff4f285629630
SHA2565ba7899e5c6210f31806124f826108288b6fc89f11d59637d3755c471593fe47
SHA5125b2c6dbbabfd27db8bdc98ad20e0eb23fc6c9f7cf21a80c4b4ce2a8005058223311c78a777ef5fb7fd1628ec1f627e8ff28bc52d93daf66bee94658c735ebd05
-
C:\Users\Admin\AppData\Local\Luau Language Server\server\index.jsFilesize
6.1MB
MD56b1cad741d0b6374435f7e1faa93b5e7
SHA17b1957e63c10f4422421245e4dc64074455fd62a
SHA2566f17add2a8c8c2d9f592adb65d88e08558e25c15cedd82e3f013c8146b5d840f
SHA512a662fc83536eff797b8d59e2fb4a2fb7cd903be8fc4137de8470b341312534326383bb3af58991628f15f93e3bdd57621622d9d9b634fb5e6e03d4aa06977253
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdbFilesize
896KB
MD550c09f2694e2b571c60486cfdfd372e9
SHA10953b665ee3eba86cec45fdb81124148bcfbbaa1
SHA25631f766c92ddc5473412316d09d7bea0297392e33f2acdeec7f53d1a4b7f690b2
SHA512ddd3a0e8032547cb835e831b9f4d7259d5211d72b2ecb724b4fb7c91db35995e2488d8e60500a76a6fc47e789145cfa60452891835e9289c1e0fa35a0956be27
-
C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bakFilesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe\LocalState\ThirdPartyNotice.html.~tmpFilesize
104KB
MD5effecce1b6868c8bd7950ef7b772038b
SHA1695d5a07f59b4b72c5eca7be77d5b15ae7ae59b0
SHA256003e619884dbc527e20f0aa8487daf5d7eed91d53ef6366a58c5493aaf1ce046
SHA5122f129689181ffe6fff751a22d4130bb643c5868fa0e1a852c434fe6f7514e3f1e5e4048179679dec742ec505139439d98e6dcc74793c18008db36c800d728be2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133641144837190956.txtFilesize
89KB
MD51542ac43ec57958851d0c104ce800cb6
SHA12820f4917909f29301a33af5c79db3c91e70b15f
SHA2569704ff1907c3919dc20e6f4a64de0ad0d549ad4fe8d84c143fc7fb652ae50337
SHA512c29eeaf2915563ef2b04b8bcc69b8b6d9ce1f15e3c5f6720aef022fdc7fe88f01ec94d3b749ff9914d2986437fe1c72c28ca72c8eaeedc70e6401e9cf0035842
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.datFilesize
23KB
MD57338ed3076888ab342b17b9806964e24
SHA16ae9d242f3e60df1cb920a78a9a0518983f00f83
SHA256497f144ca51203101731b29d76e91258db9c39b0639d8ec889a3c978492929ba
SHA512834f58269ab30c003b46f11ff6564686ef4529ae4461a15f4c50a3dc7a9cf438e95d0373bcc72a9b2760785fc79e44c330e5e5eb1a9d5f80b55d51781f59cbf0
-
C:\Users\Admin\AppData\Local\Wave\CefSharp.Core.Runtime.dllFilesize
1.3MB
MD509cba584aa0aae9fc600745567393ef6
SHA1bbd1f93cb0db9cf9e01071b3bed1b4afd6e31279
SHA2560babd84d4e7dc2713e7265d5ac25a3c28d412e705870cded6f5c7c550a5bf8d5
SHA5125f914fa33a63a6d4b46f39c7279687f313728fd5f8437ec592369a2da3256ccff6f325f78ace0e6d3a2c37da1f681058556f7603da13c45b03f2808f779d2aa1
-
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exeFilesize
7.5MB
MD58a2cd9abb3b07e6d39a196d489905b16
SHA1f632456bb3f8121efe7a93a5a440188eb69d76dd
SHA25632908075eab8e0137e3f4e02e1101fdc53906b56085ec84a2990a27fe147fb63
SHA512f31741334464b5e3d962e0e4c8d4a9634d7191e369023582af389261298295862b718eda01b123c0540e494d887b34cf5b3dd204953d778c814c57cf7629154f
-
C:\Users\Admin\AppData\Local\Wave\bin\Background.mp4Filesize
4.6MB
MD59782180eb68f73030fe24ef6a1735932
SHA1589827fe098ba048c9f871a28db8eae3e3537ff4
SHA2563a1cbb800f8f25c2ab703ba8bfdb01e938e4143c3bc0fea8ca734fb5ba779ba7
SHA512dc768638bae2d6d47d8910252ae64a656d8a6fd88efdf24165ddce51b7afdb4acb3fddd41dfe788737a2cab4fab66174db2f0d2f48bc8669af76d1656bca8be1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
memory/744-7439-0x000000005D670000-0x000000005D880000-memory.dmpFilesize
2.1MB
-
memory/744-7479-0x000000005D670000-0x000000005D880000-memory.dmpFilesize
2.1MB
-
memory/744-7438-0x00000000001B0000-0x00000000001E5000-memory.dmpFilesize
212KB
-
memory/1856-2-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/1856-240-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/1856-4-0x0000000009750000-0x0000000009788000-memory.dmpFilesize
224KB
-
memory/1856-8-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/1856-14-0x0000000000E50000-0x0000000000EE6000-memory.dmpFilesize
600KB
-
memory/1856-3-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/1856-6-0x000000007512E000-0x000000007512F000-memory.dmpFilesize
4KB
-
memory/1856-18-0x000000000A870000-0x000000000A8E2000-memory.dmpFilesize
456KB
-
memory/1856-0-0x000000007512E000-0x000000007512F000-memory.dmpFilesize
4KB
-
memory/1856-16-0x0000000001030000-0x0000000001038000-memory.dmpFilesize
32KB
-
memory/1856-5-0x0000000009730000-0x000000000973E000-memory.dmpFilesize
56KB
-
memory/1856-1-0x0000000000390000-0x0000000000522000-memory.dmpFilesize
1.6MB
-
memory/1856-15-0x0000000000EF0000-0x0000000000F16000-memory.dmpFilesize
152KB
-
memory/1856-7-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/1856-20-0x000000000A820000-0x000000000A82A000-memory.dmpFilesize
40KB
-
memory/1856-19-0x000000000A810000-0x000000000A81A000-memory.dmpFilesize
40KB
-
memory/2556-278-0x0000000004D90000-0x0000000004DDA000-memory.dmpFilesize
296KB
-
memory/2556-271-0x0000000004CA0000-0x0000000004D8A000-memory.dmpFilesize
936KB
-
memory/2556-267-0x00000000003F0000-0x00000000003F8000-memory.dmpFilesize
32KB
-
memory/3600-332-0x000000000DB10000-0x000000000DD84000-memory.dmpFilesize
2.5MB
-
memory/3600-7386-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-237-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/3600-238-0x0000000000B40000-0x00000000012CC000-memory.dmpFilesize
7.5MB
-
memory/3600-241-0x0000000005D80000-0x0000000005DCA000-memory.dmpFilesize
296KB
-
memory/3600-243-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/3600-7420-0x00000000163B0000-0x00000000163C0000-memory.dmpFilesize
64KB
-
memory/3600-7419-0x00000000163B0000-0x00000000163C0000-memory.dmpFilesize
64KB
-
memory/3600-7399-0x00000000163B0000-0x00000000163C0000-memory.dmpFilesize
64KB
-
memory/3600-7400-0x00000000163B0000-0x00000000163C0000-memory.dmpFilesize
64KB
-
memory/3600-7401-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7403-0x000000000A510000-0x000000000A520000-memory.dmpFilesize
64KB
-
memory/3600-7404-0x00000000163B0000-0x00000000163C0000-memory.dmpFilesize
64KB
-
memory/3600-7405-0x00000000163B0000-0x00000000163C0000-memory.dmpFilesize
64KB
-
memory/3600-7406-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7407-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7402-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7391-0x0000000015910000-0x0000000015A96000-memory.dmpFilesize
1.5MB
-
memory/3600-7390-0x000000000A510000-0x000000000A520000-memory.dmpFilesize
64KB
-
memory/3600-7379-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7380-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7381-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7383-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7384-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7385-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-8298-0x0000000005960000-0x000000000596A000-memory.dmpFilesize
40KB
-
memory/3600-7382-0x000000000EF80000-0x000000000EF90000-memory.dmpFilesize
64KB
-
memory/3600-7342-0x000000000AA40000-0x000000000AA48000-memory.dmpFilesize
32KB
-
memory/3600-7309-0x000000000A9C0000-0x000000000AA26000-memory.dmpFilesize
408KB
-
memory/3600-7305-0x000000000A440000-0x000000000A47E000-memory.dmpFilesize
248KB
-
memory/3600-7128-0x00000000118B0000-0x0000000011DDC000-memory.dmpFilesize
5.2MB
-
memory/3600-6908-0x000000000E440000-0x000000000E4E0000-memory.dmpFilesize
640KB
-
memory/3600-6886-0x0000000005FC0000-0x0000000005FF8000-memory.dmpFilesize
224KB
-
memory/3600-4795-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/3600-340-0x0000000075120000-0x00000000758D0000-memory.dmpFilesize
7.7MB
-
memory/3600-333-0x000000000DF50000-0x000000000E033000-memory.dmpFilesize
908KB
-
memory/3600-318-0x000000000FDC0000-0x0000000010114000-memory.dmpFilesize
3.3MB
-
memory/3600-317-0x000000000FB30000-0x000000000FB52000-memory.dmpFilesize
136KB
-
memory/3600-310-0x000000000DD90000-0x000000000DE42000-memory.dmpFilesize
712KB
-
memory/3600-252-0x0000000006600000-0x000000000675B000-memory.dmpFilesize
1.4MB
-
memory/3600-244-0x00000000062A0000-0x0000000006386000-memory.dmpFilesize
920KB
-
memory/3600-242-0x00000000034A0000-0x00000000034C4000-memory.dmpFilesize
144KB
-
memory/5344-7532-0x000000000A0A0000-0x000000000A0A1000-memory.dmpFilesize
4KB
-
memory/5344-7534-0x000000000A0A0000-0x000000000A0A1000-memory.dmpFilesize
4KB
-
memory/5344-7533-0x000000000A0A0000-0x000000000A0A1000-memory.dmpFilesize
4KB
-
memory/5344-7538-0x000000000A0A0000-0x000000000A0A1000-memory.dmpFilesize
4KB
-
memory/5680-11400-0x0000018EC40A0000-0x0000018EC40AE000-memory.dmpFilesize
56KB
-
memory/5680-11401-0x0000018EC4560000-0x0000018EC456A000-memory.dmpFilesize
40KB
-
memory/5680-11402-0x0000018EC4590000-0x0000018EC4598000-memory.dmpFilesize
32KB
-
memory/5680-11403-0x0000018EDEA00000-0x0000018EDEC49000-memory.dmpFilesize
2.3MB