Analysis

  • max time kernel
    330s
  • max time network
    331s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2024 15:20

General

  • Target

    http://waveexecutor.com

Malware Config

Signatures

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 17 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Checks system information in the registry 2 TTPs 8 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://waveexecutor.com
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaeaf146f8,0x7ffaeaf14708,0x7ffaeaf14718
      2⤵
        PID:456
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:2
        2⤵
          PID:1620
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4828
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:8
          2⤵
            PID:2516
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
            2⤵
              PID:4692
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
              2⤵
                PID:244
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:1
                2⤵
                  PID:2316
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:1
                  2⤵
                    PID:1908
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1
                    2⤵
                      PID:2476
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 /prefetch:8
                      2⤵
                        PID:3160
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3520
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:1
                        2⤵
                          PID:3608
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5132 /prefetch:8
                          2⤵
                            PID:2896
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:1
                            2⤵
                              PID:5116
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6448 /prefetch:8
                              2⤵
                                PID:3452
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:1
                                2⤵
                                  PID:3512
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6496 /prefetch:1
                                  2⤵
                                    PID:1484
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:1
                                    2⤵
                                      PID:4960
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:1
                                      2⤵
                                        PID:4880
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6568 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:244
                                      • C:\Users\Admin\Downloads\WaveInstaller.exe
                                        "C:\Users\Admin\Downloads\WaveInstaller.exe"
                                        2⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1424
                                        • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe
                                          "C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"
                                          3⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1212
                                          • C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe
                                            "C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"
                                            4⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Checks for any installed AV software in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            PID:4772
                                            • C:\Users\Admin\AppData\Local\Luau Language Server\node.exe
                                              "C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=4772
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1912
                                            • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe
                                              "C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"
                                              5⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1748
                                              • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
                                                "C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe" /silent /install
                                                6⤵
                                                • Executes dropped EXE
                                                • Drops file in Program Files directory
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4856
                                                • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\MicrosoftEdgeUpdate.exe
                                                  "C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                                                  7⤵
                                                  • Event Triggered Execution: Image File Execution Options Injection
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Checks system information in the registry
                                                  • Drops file in Program Files directory
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:6556
                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                                    8⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4452
                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                                    8⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5424
                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                      9⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Modifies registry class
                                                      PID:5544
                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                      9⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Modifies registry class
                                                      PID:5500
                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                      9⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Modifies registry class
                                                      PID:5592
                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MDBGRkFCN0YtNjIwMS00RDlELTkzMEUtNTI0NzM1RkVGNkNGfSIgdXNlcmlkPSJ7MjE0NzM2NTMtRjFEMy00QzE5LUE3N0UtMTJGNEQ1QThFMDFGfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntEMEVDNTIyNy1GNDU5LTQyMDYtODk0OS0zQzYyMDUxQTJGRUZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7aFZmRGpNZEZHNkZnS3MwTno2ZW1yWUNTZzZUUXZEUG9tb2xSYXlRWEJLND0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4Ny40MSIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjcyMTkyMTA5MTAiIGluc3RhbGxfdGltZV9tcz0iNTczIi8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                    8⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Checks system information in the registry
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5728
                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{00FFAB7F-6201-4D9D-930E-524735FEF6CF}" /silent
                                                    8⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5808
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6120 /prefetch:2
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:312
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2188,9727141655111935477,8648831258218753513,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2352 /prefetch:8
                                        2⤵
                                          PID:464
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:4228
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:3240
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                            1⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Checks system information in the registry
                                            PID:5896
                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MDBGRkFCN0YtNjIwMS00RDlELTkzMEUtNTI0NzM1RkVGNkNGfSIgdXNlcmlkPSJ7MjE0NzM2NTMtRjFEMy00QzE5LUE3N0UtMTJGNEQ1QThFMDFGfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntGMDdFNDY4Qy02N0ZELTREM0ItOUY0QS03OEE4MzIwRDJFMzh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7aFZmRGpNZEZHNkZnS3MwTno2ZW1yWUNTZzZUUXZEUG9tb2xSYXlRWEJLND0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMDYiIG5leHR2ZXJzaW9uPSIxMjMuMC42MzEyLjEwNiIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjcyMjQ2MjA4NDEiLz48L2FwcD48L3JlcXVlc3Q-
                                              2⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Checks system information in the registry
                                              PID:852

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\EdgeUpdate.dat

                                            Filesize

                                            12KB

                                            MD5

                                            369bbc37cff290adb8963dc5e518b9b8

                                            SHA1

                                            de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                            SHA256

                                            3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                            SHA512

                                            4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\MicrosoftEdgeComRegisterShellARM64.exe

                                            Filesize

                                            179KB

                                            MD5

                                            7a160c6016922713345454265807f08d

                                            SHA1

                                            e36ee184edd449252eb2dfd3016d5b0d2edad3c6

                                            SHA256

                                            35a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9

                                            SHA512

                                            c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\MicrosoftEdgeUpdate.exe

                                            Filesize

                                            201KB

                                            MD5

                                            4dc57ab56e37cd05e81f0d8aaafc5179

                                            SHA1

                                            494a90728d7680f979b0ad87f09b5b58f16d1cd5

                                            SHA256

                                            87c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718

                                            SHA512

                                            320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

                                            Filesize

                                            212KB

                                            MD5

                                            60dba9b06b56e58f5aea1a4149c743d2

                                            SHA1

                                            a7e456acf64dd99ca30259cf45b88cf2515a69b3

                                            SHA256

                                            4d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112

                                            SHA512

                                            e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\MicrosoftEdgeUpdateCore.exe

                                            Filesize

                                            257KB

                                            MD5

                                            c044dcfa4d518df8fc9d4a161d49cece

                                            SHA1

                                            91bd4e933b22c010454fd6d3e3b042ab6e8b2149

                                            SHA256

                                            9f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2

                                            SHA512

                                            f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\NOTICE.TXT

                                            Filesize

                                            4KB

                                            MD5

                                            6dd5bf0743f2366a0bdd37e302783bcd

                                            SHA1

                                            e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                            SHA256

                                            91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                            SHA512

                                            f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdate.dll

                                            Filesize

                                            2.0MB

                                            MD5

                                            965b3af7886e7bf6584488658c050ca2

                                            SHA1

                                            72daabdde7cd500c483d0eeecb1bd19708f8e4a5

                                            SHA256

                                            d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19

                                            SHA512

                                            1c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_af.dll

                                            Filesize

                                            28KB

                                            MD5

                                            567aec2d42d02675eb515bbd852be7db

                                            SHA1

                                            66079ae8ac619ff34e3ddb5fb0823b1790ba7b37

                                            SHA256

                                            a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c

                                            SHA512

                                            3a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_am.dll

                                            Filesize

                                            24KB

                                            MD5

                                            f6c1324070b6c4e2a8f8921652bfbdfa

                                            SHA1

                                            988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf

                                            SHA256

                                            986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717

                                            SHA512

                                            63092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_ar.dll

                                            Filesize

                                            26KB

                                            MD5

                                            570efe7aa117a1f98c7a682f8112cb6d

                                            SHA1

                                            536e7c49e24e9aa068a021a8f258e3e4e69fa64f

                                            SHA256

                                            e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01

                                            SHA512

                                            5e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_as.dll

                                            Filesize

                                            28KB

                                            MD5

                                            a8d3210e34bf6f63a35590245c16bc1b

                                            SHA1

                                            f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693

                                            SHA256

                                            3b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766

                                            SHA512

                                            6e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_az.dll

                                            Filesize

                                            29KB

                                            MD5

                                            7937c407ebe21170daf0975779f1aa49

                                            SHA1

                                            4c2a40e76209abd2492dfaaf65ef24de72291346

                                            SHA256

                                            5ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9

                                            SHA512

                                            8670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_bg.dll

                                            Filesize

                                            29KB

                                            MD5

                                            8375b1b756b2a74a12def575351e6bbd

                                            SHA1

                                            802ec096425dc1cab723d4cf2fd1a868315d3727

                                            SHA256

                                            a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105

                                            SHA512

                                            aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_bn-IN.dll

                                            Filesize

                                            29KB

                                            MD5

                                            a94cf5e8b1708a43393263a33e739edd

                                            SHA1

                                            1068868bdc271a52aaae6f749028ed3170b09cce

                                            SHA256

                                            5b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c

                                            SHA512

                                            920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_bn.dll

                                            Filesize

                                            29KB

                                            MD5

                                            7dc58c4e27eaf84ae9984cff2cc16235

                                            SHA1

                                            3f53499ddc487658932a8c2bcf562ba32afd3bda

                                            SHA256

                                            e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98

                                            SHA512

                                            bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_bs.dll

                                            Filesize

                                            28KB

                                            MD5

                                            e338dccaa43962697db9f67e0265a3fc

                                            SHA1

                                            4c6c327efc12d21c4299df7b97bf2c45840e0d83

                                            SHA256

                                            99b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04

                                            SHA512

                                            e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

                                            Filesize

                                            29KB

                                            MD5

                                            2929e8d496d95739f207b9f59b13f925

                                            SHA1

                                            7c1c574194d9e31ca91e2a21a5c671e5e95c734c

                                            SHA256

                                            2726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df

                                            SHA512

                                            ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_ca.dll

                                            Filesize

                                            30KB

                                            MD5

                                            39551d8d284c108a17dc5f74a7084bb5

                                            SHA1

                                            6e43fc5cec4b4b0d44f3b45253c5e0b032e8e884

                                            SHA256

                                            8dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07

                                            SHA512

                                            6fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_cs.dll

                                            Filesize

                                            28KB

                                            MD5

                                            16c84ad1222284f40968a851f541d6bb

                                            SHA1

                                            bc26d50e15ccaed6a5fbe801943117269b3b8e6b

                                            SHA256

                                            e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b

                                            SHA512

                                            d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_cy.dll

                                            Filesize

                                            28KB

                                            MD5

                                            34d991980016595b803d212dc356d765

                                            SHA1

                                            e3a35df6488c3463c2a7adf89029e1dd8308f816

                                            SHA256

                                            252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e

                                            SHA512

                                            8a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_da.dll

                                            Filesize

                                            28KB

                                            MD5

                                            d34380d302b16eab40d5b63cfb4ed0fe

                                            SHA1

                                            1d3047119e353a55dc215666f2b7b69f0ede775b

                                            SHA256

                                            fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f

                                            SHA512

                                            45ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_de.dll

                                            Filesize

                                            30KB

                                            MD5

                                            aab01f0d7bdc51b190f27ce58701c1da

                                            SHA1

                                            1a21aabab0875651efd974100a81cda52c462997

                                            SHA256

                                            061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c

                                            SHA512

                                            5edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_el.dll

                                            Filesize

                                            30KB

                                            MD5

                                            ac275b6e825c3bd87d96b52eac36c0f6

                                            SHA1

                                            29e537d81f5d997285b62cd2efea088c3284d18f

                                            SHA256

                                            223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0

                                            SHA512

                                            bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679

                                          • C:\Program Files (x86)\Microsoft\Temp\EU4EE8.tmp\msedgeupdateres_en.dll

                                            Filesize

                                            27KB

                                            MD5

                                            4a1e3cf488e998ef4d22ac25ccc520a5

                                            SHA1

                                            dc568a6e3c9465474ef0d761581c733b3371b1cd

                                            SHA256

                                            9afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011

                                            SHA512

                                            ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245

                                          • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                            Filesize

                                            198KB

                                            MD5

                                            6a89157f426e59c1ceb29c335ddc6475

                                            SHA1

                                            de39dd701be058aab5f0866e9903acf855da6f2d

                                            SHA256

                                            62f9dfc46b857815c7e0cd3e15bb67af9b7064c5042b00d61e82350d4b90bff5

                                            SHA512

                                            b5e57bc6283f0263da63bdf41b9058b0f3a9720f8b70933e71aa2bc78e133722081d09497f4623f369cb818d811ce0e82a2f13f82e16aaba797cb04add554918

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.dll

                                            Filesize

                                            4.3MB

                                            MD5

                                            6546ceb273f079342df5e828a60f551b

                                            SHA1

                                            ede41c27df51c39cd731797c340fcb8feda51ea3

                                            SHA256

                                            e440da74de73212d80da3f27661fcb9436d03d9e8dbbb44c9c148aaf38071ca5

                                            SHA512

                                            f0ea83bf836e93ff7b58582329a05ba183a25c92705fab36f576ec0c20cf687ce16a68e483698bda4215d441dec5916ffbdfa1763fb357e14ab5e0f1ffcaf824

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe

                                            Filesize

                                            249KB

                                            MD5

                                            772c9fecbd0397f6cfb3d866cf3a5d7d

                                            SHA1

                                            6de3355d866d0627a756d0d4e29318e67650dacf

                                            SHA256

                                            2f88ea7e1183d320fb2b7483de2e860da13dc0c0caaf58f41a888528d78c809f

                                            SHA512

                                            82048bd6e50d38a863379a623b8cfda2d1553d8141923acf13f990c7245c833082523633eaa830362a12bfff300da61b3d8b3cccbe038ce2375fdfbd20dbca31

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.runtimeconfig.json

                                            Filesize

                                            372B

                                            MD5

                                            d94cf983fba9ab1bb8a6cb3ad4a48f50

                                            SHA1

                                            04855d8b7a76b7ec74633043ef9986d4500ca63c

                                            SHA256

                                            1eca0f0c70070aa83bb609e4b749b26dcb4409784326032726394722224a098a

                                            SHA512

                                            09a9667d4f4622817116c8bc27d3d481d5d160380a2e19b8944bdd1271a83f718415ce5e6d66e82e36819e575ec1b55f19c45213e0013b877b8d61e6feb9d998

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\ExtraContent\textures\ui\LuaApp\graphic\shimmer_lightTheme.png

                                            Filesize

                                            20KB

                                            MD5

                                            4f8f43c5d5c2895640ed4fdca39737d5

                                            SHA1

                                            fb46095bdfcab74d61e1171632c25f783ef495fa

                                            SHA256

                                            fc57f32c26087eef61b37850d60934eda1100ca8773f08e487191a74766053d1

                                            SHA512

                                            7aebc0f79b2b23a76fb41df8bab4411813ffb1abc5e2797810679c0eaa690e7af7561b8473405694bd967470be337417fa42e30f0318acbf171d8f31620a31aa

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\ExtraContent\textures\ui\LuaApp\graphic\[email protected]

                                            Filesize

                                            71KB

                                            MD5

                                            3fec0191b36b9d9448a73ff1a937a1f7

                                            SHA1

                                            bee7d28204245e3088689ac08da18b43eae531ba

                                            SHA256

                                            1a03e6f6a0de045aa588544c392d671c040b82a5598b4246af04f5a74910dc89

                                            SHA512

                                            a8ab2bc2d937963af36d3255c6ea09cae6ab1599996450004bb18e8b8bdfbdde728821ac1662d8a0466680679011d8f366577b143766838fe91edf08a40353ce

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\ExtraContent\textures\ui\LuaDiscussions\buttonFill.png

                                            Filesize

                                            247B

                                            MD5

                                            81ce54dfd6605840a1bd2f9b0b3f807d

                                            SHA1

                                            4a3a4c05b9c14c305a8bb06c768abc4958ba2f1c

                                            SHA256

                                            0a6a5cafb4dee0d8c1d182ddec9f68ca0471d7fc820cf8dc2d68f27a35cd3386

                                            SHA512

                                            57069c8ac03dd0fdfd97e2844c19138800ff6f7d508c26e5bc400b30fe78baa0991cc39f0f86fa10cd5d12b6b11b0b09c1a770e5cb2fdca157c2c8986a09e5ff

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe

                                            Filesize

                                            1.5MB

                                            MD5

                                            610b1b60dc8729bad759c92f82ee2804

                                            SHA1

                                            9992b7ae7a9c4e17a0a6d58ffd91b14cbb576552

                                            SHA256

                                            921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08

                                            SHA512

                                            0614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\configs\DateTimeLocaleConfigs\zh-hans.json

                                            Filesize

                                            2KB

                                            MD5

                                            fb6605abd624d1923aef5f2122b5ae58

                                            SHA1

                                            6e98c0a31fa39c781df33628b55568e095be7d71

                                            SHA256

                                            7b993133d329c46c0c437d985eead54432944d7b46db6ad6ea755505b8629d00

                                            SHA512

                                            97a14eda2010033265b379aa5553359293baf4988a4cdde8a40b0315e318a7b30feee7f5e14c68131e85610c00585d0c67e636999e3af9b5b2209e1a27a82223

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\configs\DateTimeLocaleConfigs\zh-tw.json

                                            Filesize

                                            2KB

                                            MD5

                                            702c9879f2289959ceaa91d3045f28aa

                                            SHA1

                                            775072f139acc8eafb219af355f60b2f57094276

                                            SHA256

                                            a92a6988175f9c1d073e4b54bf6a31f9b5d3652eebdf6a351fb5e12bda76cbd5

                                            SHA512

                                            815a6bef134c0db7a5926f0cf4b3f7702d71b0b2f13eca9539cd2fc5a61eea81b1884e4c4bc0b3398880589bff809ac8d5df833e7e4aeda4a1244e9a875d1e97

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\Cursors\KeyboardMouse\IBeamCursor.png

                                            Filesize

                                            292B

                                            MD5

                                            464c4983fa06ad6cf235ec6793de5f83

                                            SHA1

                                            8afeb666c8aee7290ab587a2bfb29fc3551669e8

                                            SHA256

                                            99fd7f104948c6ab002d1ec69ffd6c896c91f9accc499588df0980b4346ecbed

                                            SHA512

                                            f805f5f38535fe487b899486c8de6cf630114964e2c3ebc2af7152a82c6f6faef681b4d936a1867b5dff6566b688b5c01105074443cc2086b3fe71f7e6e404b1

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\StudioToolbox\Clear.png

                                            Filesize

                                            538B

                                            MD5

                                            fa8eaf9266c707e151bb20281b3c0988

                                            SHA1

                                            3ca097ad4cd097745d33d386cc2d626ece8cb969

                                            SHA256

                                            8cf08bf7e50fea7b38f59f162ed956346c55a714ed8a9a8b0a1ada7e18480bc2

                                            SHA512

                                            e29274300eab297c6de895bb39170f73f0a4ffa2a8c3732caeeeac16e2c25fb58bb401fdd5823cc62d9c413ec6c43d7c46861d7e14d52f8d9d8ff632e29f167c

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\StudioUIEditor\valueBoxRoundedRectangle.png

                                            Filesize

                                            130B

                                            MD5

                                            521fb651c83453bf42d7432896040e5e

                                            SHA1

                                            8fdbf2cc2617b5b58aaa91b94b0bf755d951cad9

                                            SHA256

                                            630303ec4701779eaf86cc9fbf744b625becda53badc7271cbb6ddc56e638d70

                                            SHA512

                                            8fa0a50e52a3c7c53735c7dd7af275ebc9c1843f55bb30ebe0587a85955a8da94ff993822d233f7ed118b1070a7d67718b55ba4a597dc49ed2bf2a3836c696f6

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\TerrainTools\checkbox_square.png

                                            Filesize

                                            985B

                                            MD5

                                            2cb16991a26dc803f43963bdc7571e3f

                                            SHA1

                                            12ad66a51b60eeaed199bc521800f7c763a3bc7b

                                            SHA256

                                            c7bae6d856f3bd9f00c122522eb3534d0d198a9473b6a379a5c3458181870646

                                            SHA512

                                            4c9467e5e2d83b778d0fb8b6fd97964f8d8126f07bfd50c5d68c256703f291ceaed56be057e8e2c591b2d2c49f6b7e099a2b7088d0bf5bdd901433459663b1f8

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\Thumbstick1.png

                                            Filesize

                                            641B

                                            MD5

                                            2cbe38df9a03133ddf11a940c09b49cd

                                            SHA1

                                            6fb5c191ed8ce9495c66b90aaf53662bfe199846

                                            SHA256

                                            0835a661199a7d8df7249e8ae925987184efcc4fb85d9efac3cc2c1495020517

                                            SHA512

                                            dcef5baccef9fff632456fe7bc3c4f4a403363d9103a8047a55f4bd4c413d0c5f751a2e37385fe9eba7a420dbdb77ca2ff883d47fcdd35af222191cc5bd5c7a9

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\[email protected]

                                            Filesize

                                            1KB

                                            MD5

                                            e8c88cf5c5ef7ae5ddee2d0e8376b32f

                                            SHA1

                                            77f2a5b11436d247d1acc3bac8edffc99c496839

                                            SHA256

                                            9607af14604a8e8eb1dec45d3eeca01fed33140c0ccc3e6ef8ca4a1f6219b5dd

                                            SHA512

                                            32f5a1e907705346a56fbddfe0d8841d05415ff7abe28ae9281ba46fedf8270b982be0090b72e2e32de0ce36e21934f80eaf508fd010f7ab132d39f5305fb68f

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\[email protected]

                                            Filesize

                                            1KB

                                            MD5

                                            499333dae156bb4c9e9309a4842be4c8

                                            SHA1

                                            d18c4c36bdb297208589dc93715560acaf761c3a

                                            SHA256

                                            d35a74469f1436f114c27c730a5ec0793073bcf098db37f10158d562a3174591

                                            SHA512

                                            91c64173d2cdabc045c70e0538d45e1022cc74ec04989565b85f0f26fe3e788b700a0956a07a8c91d34c06fc1b7fad43bbdbb41b0c6f15b9881c3e46def8103e

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\Thumbstick2.png

                                            Filesize

                                            738B

                                            MD5

                                            a402aacac8be906bcc07d50669d32061

                                            SHA1

                                            9d75c1afbe9fc482983978cae4c553aa32625640

                                            SHA256

                                            62a313b6cc9ffe7dd86bc9c4fcd7b8e8d1f14a15cdf41a53fb69af4ae3416102

                                            SHA512

                                            d11567bcaad8bbd9e2b9f497c3215102c7e7546caf425e93791502d3d2b3f78dec13609796fcd6e1e7f5c7d794bac074d00a74001e7fe943d63463b483877546

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\[email protected]

                                            Filesize

                                            1KB

                                            MD5

                                            83e9b7823c0a5c4c67a603a734233dec

                                            SHA1

                                            2eaf04ad636bf71afdf73b004d17d366ac6d333e

                                            SHA256

                                            3b5e06eb1a89975def847101f700f0caa60fe0198f53e51974ef1608c6e1e067

                                            SHA512

                                            e8abb39a1ec340ac5c7d63137f607cd09eae0e885e4f73b84d8adad1b8f574155b92fbf2c9d3013f64ebbb6d55ead5419e7546b0f70dcde976d49e7440743b0f

                                          • C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-1088f3c8e4a44cc7\content\textures\ui\Controls\XboxController\[email protected]

                                            Filesize

                                            1KB

                                            MD5

                                            55b64987636b9740ab1de7debd1f0b2f

                                            SHA1

                                            96f67222ce7d7748ec968e95a2f6495860f9d9c9

                                            SHA256

                                            f4a6bb3347ee3e603ea0b2f009bfa802103bc434ae3ff1db1f2043fa8cace8fc

                                            SHA512

                                            73a88a278747de3fefbaabb3ff90c1c0750c8d6c17746787f17061f4eff933620407336bf9b755f4222b0943b07d8c4d01de1815d42ea65e78e0daa7072591e9

                                          • C:\Users\Admin\AppData\Local\Luau Language Server\server\index.js

                                            Filesize

                                            6.1MB

                                            MD5

                                            6b1cad741d0b6374435f7e1faa93b5e7

                                            SHA1

                                            7b1957e63c10f4422421245e4dc64074455fd62a

                                            SHA256

                                            6f17add2a8c8c2d9f592adb65d88e08558e25c15cedd82e3f013c8146b5d840f

                                            SHA512

                                            a662fc83536eff797b8d59e2fb4a2fb7cd903be8fc4137de8470b341312534326383bb3af58991628f15f93e3bdd57621622d9d9b634fb5e6e03d4aa06977253

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            04b60a51907d399f3685e03094b603cb

                                            SHA1

                                            228d18888782f4e66ca207c1a073560e0a4cc6e7

                                            SHA256

                                            87a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3

                                            SHA512

                                            2a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            9622e603d436ca747f3a4407a6ca952e

                                            SHA1

                                            297d9aed5337a8a7290ea436b61458c372b1d497

                                            SHA256

                                            ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261

                                            SHA512

                                            f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2fec9b34-3f76-4c11-831d-a513514e50e7.tmp

                                            Filesize

                                            7KB

                                            MD5

                                            e6e775ba36cf22621f2e341e5c20f97e

                                            SHA1

                                            6d2c4b0151e97a683214d0865dc9dee8229df934

                                            SHA256

                                            dc16acf5de4e44d84118922af2d953f1bbbefc6841d9d464e86ca06021276cb3

                                            SHA512

                                            c61a8e33aa268ffdb95ffd26bc2957c156638edf068df93aea7b120447fd2c8fbd3a157fe37d0f9e76aec57ff1952fc502420965c97809ca55474ce11539b735

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000016

                                            Filesize

                                            2.3MB

                                            MD5

                                            8ad8b6593c91d7960dad476d6d4af34f

                                            SHA1

                                            0a95f110c8264cde7768a3fd76db5687fda830ea

                                            SHA256

                                            43e6ae7e38488e95741b1cad60843e7ce49419889285433eb4e697c175a153ab

                                            SHA512

                                            09b522da0958f8b173e97b31b6c7141cb67de5d30db9ff71bc6e61ca9a97c09bff6b17d6eaa03c840500996aad25b3419391af64de1c59e98ff6a8eac636b686

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            576B

                                            MD5

                                            4dd279dc3c78ec377669cedf94a23b26

                                            SHA1

                                            854c031061adab2b2fc13748980ed8bbd5565c4a

                                            SHA256

                                            f5a53d4b638cf1bfde60dfd5d3c54d649c7286895f2d06cda56ab5b281c4be74

                                            SHA512

                                            9016f14b6013ee9e6b76e7f6ada78befa50d7760af2c56f5f6356788a74daaeeb9c48cfd858b2fa10f5a645917efb793dcbfd78235bbd6b61dbc477e40acf608

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            2KB

                                            MD5

                                            9471fcfb7f403be55ec0e56e7ccc54c5

                                            SHA1

                                            37403a2cb91c13684e439d030a96eac8363bc5a4

                                            SHA256

                                            2943204154a3ea6bac95610911303a1f004629451b68fb054b416cb91a6569c4

                                            SHA512

                                            bc5571b1cfe9c94362d9fd06afa36ca4ef5386346a0d3ff7a37f6f3db57ec6122dc55cd05a5fa3486bd4eec5d98c37ee35c16bbe13972d0d8fd000e14b6271e4

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            2KB

                                            MD5

                                            3d0570d25153fd5ff1a043af4160d0c7

                                            SHA1

                                            811506e698b0b1b4b50c74a7cea22c612d31d6b9

                                            SHA256

                                            7bfba74b824ef5a50bab5a684f34d62bb33ed5e6a4754a70132752c12a970bf2

                                            SHA512

                                            1d932b4b1b90792c1f23f49e6ae9b7bc73fdf1319ed420020fae0949b9b29f789d7027f26c643f74f611bfcfbf4cc9accb9dada0c6488b4c8ae3167ae1fd79e4

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            7KB

                                            MD5

                                            324ca3a155734b5267c45af31d13ec7a

                                            SHA1

                                            f77f9d534343555f0afe58012829a9d088dfb904

                                            SHA256

                                            ae67a560b1b1c94b693bca1b16be252e17a5a43f2da343d035a2ac556f18a640

                                            SHA512

                                            20840fac156a4ad8cd0cc37fadc13502d419a9b23def62d106359f0f9f4e2f0d77185bef8fbbef9786c7ebd355372eaf6234df909f9dd51e73b25229dfd2dccc

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            00d9f403649aa951a12398afb051475c

                                            SHA1

                                            a10204ff0fe739e7125a3b47275b6cfcdf434642

                                            SHA256

                                            34b4d8f6b91c5057a251237cc276d0cbb7458963eddcbd9a3c33ca7a7ef56113

                                            SHA512

                                            951b682acbeaca0cc5da187c5448aaf83948afec631a8c66e9b42a5f8721008f54dd6f0351e29f3831298f4cd9da8efe4f8e7685872716ff716ffde05b116af9

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            8KB

                                            MD5

                                            b67e85db6cfb276cbbe59ba80add0777

                                            SHA1

                                            a57461d71ac1595edd06820e7c5bd587f9974085

                                            SHA256

                                            faf92710428d6e0eeb11f881bba9a6a018673d846165d2bf438fd544858bf865

                                            SHA512

                                            4959226e763d26e3bb037d5bf495171b5064b82bcaddc7899b7b501f09b6fd84825dcc300fc472308a9f7279b6cce54d28a0d30ab3104d0d441e2a1b9257291c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            206702161f94c5cd39fadd03f4014d98

                                            SHA1

                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                            SHA256

                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                            SHA512

                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT~RFe57dacf.TMP

                                            Filesize

                                            16B

                                            MD5

                                            46295cac801e5d4857d09837238a6394

                                            SHA1

                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                            SHA256

                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                            SHA512

                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            11KB

                                            MD5

                                            0d1db601accec68dfde56011ce86da18

                                            SHA1

                                            4ed46c32cb89c22435e44137a56bea52220a3c9f

                                            SHA256

                                            464810bf4199fe98979ed656b096f39a2fd0b756475fabe6e3a78f25d3183674

                                            SHA512

                                            23b5ec070c9dab1b3dafcfc71e23b6dad237e5f245c88275e2cfbdc5ed5719c01b9d9ec3caee3860b634c18efdbe11c0646731f85f1bc9f1d4b9b914b7b37c41

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            12KB

                                            MD5

                                            f43454af7ee9bd35622be060b34c53ff

                                            SHA1

                                            ff58e693a27ea9baea399bf0ba70a8b48246396c

                                            SHA256

                                            e23933681c5978b76dd758f9557d149fcfe300149a3f7851afeaf39cdfe13e6c

                                            SHA512

                                            031a3c58ccaac4fcd2ad0dc12e439bf3f52fff4a3ee532fe82921bdb2e47132630ddf0d8f05ac9cb960ec7b6d588333da3048855b660748c55c96ed4bbd27f4f

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            11KB

                                            MD5

                                            e5ac348d87dc0cacb50b5a2dfe9e7f17

                                            SHA1

                                            ae6ce75ae16b2c62dab032866761505e8a443bf9

                                            SHA256

                                            8cbe7e9f9eae0ad9fd6a43fcaa94f36a2011e39f3435194a44fed7c2c6ab9a02

                                            SHA512

                                            dd273675addeb4de151ff3431d7e76bd79ca3fc544eb7dd4008abeb48deac35334eaba14607e062f68421d614be98cdbe6e9e505537e29fea22af86b4db9f4e8

                                          • C:\Users\Admin\AppData\Local\Wave\D3DCOMPILER_47.dll

                                            Filesize

                                            3.9MB

                                            MD5

                                            3b4647bcb9feb591c2c05d1a606ed988

                                            SHA1

                                            b42c59f96fb069fd49009dfd94550a7764e6c97c

                                            SHA256

                                            35773c397036b368c1e75d4e0d62c36d98139ebe74e42c1ff7be71c6b5a19fd7

                                            SHA512

                                            00cd443b36f53985212ac43b44f56c18bf70e25119bbf9c59d05e2358ff45254b957f1ec63fc70fb57b1726fd8f76ccfad8103c67454b817a4f183f9122e3f50

                                          • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe

                                            Filesize

                                            949KB

                                            MD5

                                            8fb51b92d496c6765f7ba44e6d4a8990

                                            SHA1

                                            d3e5a8465622cd5adae05babeb7e34b2b5c777d7

                                            SHA256

                                            ab49d6166a285b747e5f279620ab9cea12f33f7656d732aa75900fcb981a5394

                                            SHA512

                                            20de93a52fff7b092cb9d77bd26944abed5f5cb67146e6d2d70be6a431283b6de52eb37a0e13dc8bc57dcf8be2d5a95b9c11b3b030a3e2f03dd6e4efc23527a6

                                          • C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe

                                            Filesize

                                            8.0MB

                                            MD5

                                            b8631bbd78d3935042e47b672c19ccc3

                                            SHA1

                                            cd0ea137f1544a31d2a62aaed157486dce3ecebe

                                            SHA256

                                            9cfda541d595dc20a55df5422001dfb58debd401df3abff21b1eee8ede28451c

                                            SHA512

                                            0c51d6247e39f7851538a5916b24972e845abfe429f0abdc7b532f654b4afe73dc6e1936f1b062da63bfc90273d3cbc297bf6c802e615f3711d0f180c070aa26

                                          • memory/1212-503-0x0000000000400000-0x00000000004F2000-memory.dmp

                                            Filesize

                                            968KB

                                          • memory/1212-505-0x0000000008B70000-0x0000000008C74000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/1212-506-0x00000000098A0000-0x00000000098B6000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/1212-507-0x00000000098E0000-0x00000000098EA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/1212-508-0x0000000009980000-0x000000000999E000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/1424-214-0x0000000005D10000-0x0000000005D18000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/1424-212-0x0000000005C50000-0x0000000005CD2000-memory.dmp

                                            Filesize

                                            520KB

                                          • memory/1424-210-0x0000000000EC0000-0x000000000110A000-memory.dmp

                                            Filesize

                                            2.3MB

                                          • memory/1424-211-0x0000000005BA0000-0x0000000005C52000-memory.dmp

                                            Filesize

                                            712KB

                                          • memory/1424-213-0x0000000005D00000-0x0000000005D08000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/1424-215-0x000000000A820000-0x000000000A858000-memory.dmp

                                            Filesize

                                            224KB

                                          • memory/1424-216-0x000000000A7F0000-0x000000000A7FE000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/1424-283-0x0000000006D70000-0x0000000006E06000-memory.dmp

                                            Filesize

                                            600KB

                                          • memory/1424-289-0x000000000B9D0000-0x000000000B9DA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/1424-288-0x000000000B9C0000-0x000000000B9CA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/1424-287-0x000000000BAA0000-0x000000000BB12000-memory.dmp

                                            Filesize

                                            456KB

                                          • memory/1424-285-0x000000000B9A0000-0x000000000B9A8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/1424-284-0x000000000B970000-0x000000000B996000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/4772-514-0x0000000000E60000-0x0000000001662000-memory.dmp

                                            Filesize

                                            8.0MB

                                          • memory/4772-557-0x0000000001E40000-0x0000000001E48000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/4772-556-0x0000000001A30000-0x0000000001A68000-memory.dmp

                                            Filesize

                                            224KB

                                          • memory/4772-527-0x000000000C0E0000-0x000000000C434000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4772-560-0x000000000B520000-0x000000000B546000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/4772-526-0x000000000C0B0000-0x000000000C0D2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4772-558-0x00000000065F0000-0x00000000065FA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/4772-520-0x000000000A760000-0x000000000A812000-memory.dmp

                                            Filesize

                                            712KB

                                          • memory/4772-7764-0x000000000E930000-0x000000000EE5C000-memory.dmp

                                            Filesize

                                            5.2MB

                                          • memory/4772-559-0x000000000B3B0000-0x000000000B3B8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/4772-515-0x0000000006090000-0x0000000006130000-memory.dmp

                                            Filesize

                                            640KB

                                          • memory/6556-7746-0x000000006B310000-0x000000006B520000-memory.dmp

                                            Filesize

                                            2.1MB

                                          • memory/6556-7751-0x000000006B310000-0x000000006B520000-memory.dmp

                                            Filesize

                                            2.1MB

                                          • memory/6556-7745-0x00000000006E0000-0x0000000000715000-memory.dmp

                                            Filesize

                                            212KB