Analysis

  • max time kernel
    95s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 16:37

General

  • Target

    https://mega.nz/file/FOtSDaTa#wnbW6tYGeQTOeNZImagMOUM_ub9UhH4fi6aGMno4usM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/FOtSDaTa#wnbW6tYGeQTOeNZImagMOUM_ub9UhH4fi6aGMno4usM
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e346f8,0x7fff76e34708,0x7fff76e34718
      2⤵
        PID:3088
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1948 /prefetch:2
        2⤵
          PID:4780
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2136
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:8
          2⤵
            PID:1728
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
            2⤵
              PID:1096
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
              2⤵
                PID:2404
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5136 /prefetch:8
                2⤵
                  PID:3528
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 /prefetch:8
                  2⤵
                    PID:4504
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:672
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:1
                    2⤵
                      PID:4868
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:1
                      2⤵
                        PID:4312
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:1
                        2⤵
                          PID:3632
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:1
                          2⤵
                            PID:3436
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5864 /prefetch:8
                            2⤵
                              PID:3368
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:1
                              2⤵
                                PID:3780
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,16074842594699164673,4476517830430529233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6152 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3992
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3568
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4544
                                • C:\Windows\system32\AUDIODG.EXE
                                  C:\Windows\system32\AUDIODG.EXE 0x518 0x4f8
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1744
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:2608
                                  • C:\Users\Admin\Downloads\BLTools v2.9 PRO\BLTools.exe
                                    "C:\Users\Admin\Downloads\BLTools v2.9 PRO\BLTools.exe"
                                    1⤵
                                    • Loads dropped DLL
                                    • Suspicious use of SetThreadContext
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5292
                                    • C:\Users\Admin\AppData\Local\Temp\evbFD4E.tmp
                                      "C:\Users\Admin\Downloads\BLTools v2.9 PRO\cookies.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5436
                                    • C:\Users\Admin\Downloads\BLTools v2.9 PRO\BLTools v2.9 PRO.exe
                                      "C:\Users\Admin\Downloads\BLTools v2.9 PRO\BLTools v2.9 PRO.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Modifies registry class
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5768

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    a8e767fd33edd97d306efb6905f93252

                                    SHA1

                                    a6f80ace2b57599f64b0ae3c7381f34e9456f9d3

                                    SHA256

                                    c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb

                                    SHA512

                                    07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    439b5e04ca18c7fb02cf406e6eb24167

                                    SHA1

                                    e0c5bb6216903934726e3570b7d63295b9d28987

                                    SHA256

                                    247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654

                                    SHA512

                                    d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    72B

                                    MD5

                                    d840a494e8ad36b049b7725357575e55

                                    SHA1

                                    6b8e31bacb13ca7fd184979a869ec95f041bcf63

                                    SHA256

                                    4dc3a8fdf4dfd01a71482cc5faf85ee847e99f61ef824d46263b8f4585947c50

                                    SHA512

                                    c96c0a11a004fac12ebd9612bcdef611e52c836869cbcfa1d7c4d17a2dea9b6fcebbe4923c941c45af6923694eb9116a7fc5a917b377609fc707601c8ce07a63

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    188B

                                    MD5

                                    008114e1a1a614b35e8a7515da0f3783

                                    SHA1

                                    3c390d38126c7328a8d7e4a72d5848ac9f96549b

                                    SHA256

                                    7301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18

                                    SHA512

                                    a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    b6baf347a2792051ac10072d3b7fbfb5

                                    SHA1

                                    f4d38d140bb2f99a4dd290b9ac6bd2d96e667b10

                                    SHA256

                                    24f2c7387b1b0e5f28eb509f88607f82cd975eee6b47c5215bad1cbda946ff0e

                                    SHA512

                                    8ad58e4ace7a576133b98d448d1279d4ec74ef1840825dab043dc4b8e90ae84c7ad4dd3fc4ab7eddd640fbcb1046da2fcfc56652646002a8ccfbdce31740e693

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    97407bc5aa8af0e1f9dff8f593c2a65b

                                    SHA1

                                    8729f2e273f580db6f3ed6851076e49f10819d15

                                    SHA256

                                    a4257b9ad36a7e8ee5f0ba9b3d001a0db73dbcb256ef7e8f0b0154eeb2cfb44b

                                    SHA512

                                    c74def0155dbec817c6e84c28c94ee018607bfcc4953a06b733dd1be57948e285c7f4e50f0885173d5327aae80eb826e6777deb53069828e516f6e44acc4784a

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    a3d8aeaecd38cdb0ced7116d07b39285

                                    SHA1

                                    1b22834a808d30eebd50ce3fd795b2705e1b3c4f

                                    SHA256

                                    b9e6732b4e068ee10733ccd703d11f960e9578a5593ec9a34921a9067f418d6c

                                    SHA512

                                    b3aa07a461108935e06032bc09a735ad8215b24b5aa2ac0f6c27b7576babbab80d54f4397ae6bd91341d9e17567994039cca51135b6919adf7b499903ffda798

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                    Filesize

                                    41B

                                    MD5

                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                    SHA1

                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                    SHA256

                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                    SHA512

                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                    Filesize

                                    72B

                                    MD5

                                    9d4c2a9e6dac38e7d6459e018715a5db

                                    SHA1

                                    c2c1a93224e5722ce933373812739acedc0efa84

                                    SHA256

                                    706e199db0763a2f762b25f1bccf1ffad4daa9c062c822e2e1407217e5b8a74f

                                    SHA512

                                    8842c7faef1f12053deb69a39da3afa43e0b48aed3277d73fb2fb5123f39baeb1b8b355909e0aceb52ef32b8dc38a928699cf2d4b22b5dd51422748c37a8022b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c256.TMP

                                    Filesize

                                    48B

                                    MD5

                                    427cf27fc1d32f4ae9d4f806e3d7c2a1

                                    SHA1

                                    df536f03e77c1b34d81afd13731e5d9d84c19199

                                    SHA256

                                    ff45015ab25b7d98bdb5ceac2ec95cc3f2a69b7912a9d3179d31a772777cdf77

                                    SHA512

                                    f44f99d7493615c7bb8d3d513a2e990185befb0bcab3a546c6180201a86608fc98cb6dfbcd2311fa662ad3eb617664f0cffc0cd03a3634688c839f066255e69c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    206702161f94c5cd39fadd03f4014d98

                                    SHA1

                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                    SHA256

                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                    SHA512

                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    ff172ec41c5cc921ac9c08230e899fc7

                                    SHA1

                                    cd185db8ba784b7163b0295d4413cd2d928c5ba4

                                    SHA256

                                    7b230a48d95e46fa256c94b922a550e5eb3a5d3da11bdd674e079cc3784fc61a

                                    SHA512

                                    7724fb1b9a57c2d16ad8ff38da501c4073394635e7844b4560f78339c9470fcf237f9738c7a202377b43c28a6e170db71fe566499e2f3d1c757e4cccb831e330

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    c6240cb490790f8f0e97b7e416d08415

                                    SHA1

                                    aac14d3badb8889a6c4fd2366a0929274939bfa8

                                    SHA256

                                    97c6bd17249feb4a38bb375b86019472793b01d557963adaea91c309a45dac81

                                    SHA512

                                    81d9b1b2eb39c7fe112d894e59d87054149efb9ab55a67391e58e37e8df4a460f8e3675d5fd39ce59ef7549b4571a9b9fd4a663c0817bccd943d445bbc9ca717

                                  • C:\Users\Admin\AppData\Local\Temp\evbFD0E.tmp

                                    Filesize

                                    1KB

                                    MD5

                                    db06a35e2ee985807f483d8413871491

                                    SHA1

                                    4c7d6bccea5ddddd9b0d19c6f9d7b7852b896987

                                    SHA256

                                    863d00444d1ce2e014b025f9fc84ac464c2ea08955edae963599a66b3f1dd95f

                                    SHA512

                                    a2519b47d05e5e5249ecd4220b4ed94cabc1c7f82d238d0442b32b6a601d908f0e804414dfdec15c1e7d87e1cdbb8fa0bef7a796c405aae28273be339ea8c1a1

                                  • C:\Users\Admin\AppData\Local\Temp\evbFD4E.tmp

                                    Filesize

                                    1KB

                                    MD5

                                    b8152180651818ef0e382061760fae83

                                    SHA1

                                    5aa82224ab08cd413f39138ac5735d412b386d17

                                    SHA256

                                    c1d8fa3babfd42de6cdb8a58ed9ab18ba420a5009e4702619441356cddc7ccf7

                                    SHA512

                                    99dc032861e0d799ecdb457b4bf3ce5eb317c1b56f46c0457227b6bc425fd9019b8a4be4fb106c5e73c9c4b4b80e9ba79bc78502c98f0b1d34eab90a342f854b

                                  • C:\Users\Admin\Downloads\BLTools v2.9 PRO.zip

                                    Filesize

                                    8.4MB

                                    MD5

                                    8f8ce924fb6347bbf49bd053b2962055

                                    SHA1

                                    de8034918d4988ab54c43463650af99e40a1ef8d

                                    SHA256

                                    59c7c798a4c51f32221a8bed581f00f8d6eaa21d2ff4065b41694021e1826067

                                    SHA512

                                    b2cc3965b791e1bd5bab491cde474d25dae5091e96a0faad5abfc84543a61a76df23c89ca866256e81ad18d8881ee5ec42f0f6478b0c872a2f3af5db0761c17f

                                  • C:\Users\Admin\Downloads\BLTools v2.9 PRO\BLTools v2.9 PRO.exe

                                    Filesize

                                    3.2MB

                                    MD5

                                    8c949c1a3189fc8845f22295ee72a150

                                    SHA1

                                    1df3585b887e077251008c68f233f128c08b0b74

                                    SHA256

                                    53b6b47c5dbfbb8ea17990309e9549acc44d8b5d4b1c9e76ec754653f5d31870

                                    SHA512

                                    b27d485b3cd4633edb245659c581458f20b67859f4e7d02205a68824d41dd216882989a807c01d5468e3f99beb78850fa7aeb217f7b8ac8ad30f3a652fc24066

                                  • memory/5292-215-0x00000000047F0000-0x0000000004E2C000-memory.dmp

                                    Filesize

                                    6.2MB

                                  • memory/5292-280-0x0000000140000000-0x00000001400D3000-memory.dmp

                                    Filesize

                                    844KB

                                  • memory/5436-218-0x0000000000110000-0x0000000000111000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5436-277-0x0000000140000000-0x000000014063C000-memory.dmp

                                    Filesize

                                    6.2MB

                                  • memory/5436-273-0x0000000140000000-0x000000014063C000-memory.dmp

                                    Filesize

                                    6.2MB

                                  • memory/5768-288-0x0000000007530000-0x0000000007AD4000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/5768-289-0x0000000006560000-0x00000000066A2000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/5768-284-0x0000000005D80000-0x0000000005DA0000-memory.dmp

                                    Filesize

                                    128KB

                                  • memory/5768-286-0x0000000006320000-0x0000000006370000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/5768-285-0x0000000006C00000-0x000000000752C000-memory.dmp

                                    Filesize

                                    9.2MB

                                  • memory/5768-287-0x00000000063D0000-0x0000000006430000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/5768-282-0x0000000003600000-0x0000000003601000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5768-283-0x0000000006160000-0x0000000006184000-memory.dmp

                                    Filesize

                                    144KB

                                  • memory/5768-292-0x0000000007AE0000-0x0000000007B9A000-memory.dmp

                                    Filesize

                                    744KB

                                  • memory/5768-293-0x0000000006B30000-0x0000000006BC2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/5768-294-0x0000000009AE0000-0x0000000009B18000-memory.dmp

                                    Filesize

                                    224KB

                                  • memory/5768-295-0x0000000009AB0000-0x0000000009ABE000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/5768-296-0x00000000097A0000-0x00000000097B2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/5768-297-0x0000000009720000-0x0000000009728000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/5768-281-0x0000000000C40000-0x0000000001368000-memory.dmp

                                    Filesize

                                    7.2MB