Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
46s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/08/2024, 12:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bloxshade.com/
Resource
win11-20240802-en
General
-
Target
https://bloxshade.com/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5096 setup.exe 3824 setup.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Bloxshade\setup.exe Setup - Bloxshade.exe File created C:\Program Files\Bloxshade\installer.exe Setup - Bloxshade.exe File created C:\Program Files\Bloxshade\setup.exe Setup - Bloxshade.exe File created C:\Program Files\Bloxshade\installer.exe Setup - Bloxshade.exe File opened for modification C:\Program Files\Bloxshade Setup - Bloxshade.exe File opened for modification C:\Program Files\Bloxshade\installer.exe Setup - Bloxshade.exe File opened for modification C:\Program Files\Bloxshade\setup.exe Setup - Bloxshade.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4680 msedgewebview2.exe 3740 msedgewebview2.exe 1092 msedgewebview2.exe 1176 msedgewebview2.exe 960 msedgewebview2.exe 3584 msedgewebview2.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe -
Kills process with taskkill 4 IoCs
pid Process 5044 taskkill.exe 1176 taskkill.exe 1568 taskkill.exe 2836 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-970747758-134341002-3585657277-1000\{BE5CE870-5888-499D-856D-1F8BB0685662} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Bloxshade.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4256 msedge.exe 4256 msedge.exe 4700 msedge.exe 4700 msedge.exe 2816 msedge.exe 2816 msedge.exe 3848 identity_helper.exe 3848 identity_helper.exe 4476 msedgewebview2.exe 4476 msedgewebview2.exe 936 msedgewebview2.exe 936 msedgewebview2.exe 5852 msedge.exe 5852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 3744 msedgewebview2.exe 5044 msedgewebview2.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5044 taskkill.exe Token: SeDebugPrivilege 1176 taskkill.exe Token: SeDebugPrivilege 1568 taskkill.exe Token: SeDebugPrivilege 2836 taskkill.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 5096 setup.exe 3744 msedgewebview2.exe 3744 msedgewebview2.exe 3824 setup.exe 5044 msedgewebview2.exe 5044 msedgewebview2.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1172 Setup - Bloxshade.exe 5096 setup.exe 5032 Setup - Bloxshade.exe 3824 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4256 wrote to memory of 1820 4256 msedge.exe 81 PID 4256 wrote to memory of 1820 4256 msedge.exe 81 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4496 4256 msedge.exe 82 PID 4256 wrote to memory of 4576 4256 msedge.exe 83 PID 4256 wrote to memory of 4576 4256 msedge.exe 83 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84 PID 4256 wrote to memory of 1040 4256 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bloxshade.com/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe15373cb8,0x7ffe15373cc8,0x7ffe15373cd82⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2608 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6552 /prefetch:82⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3608 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,2208319862642621141,7375983297798866987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6556 /prefetch:12⤵PID:6056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3824
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Bloxshade.zip\Setup - Bloxshade.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Bloxshade.zip\Setup - Bloxshade.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1172 -
C:\Windows\system32\cmd.execmd.exe /c taskkill /F /IM installer.exe2⤵PID:2792
-
C:\Windows\system32\taskkill.exetaskkill /F /IM installer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /F /IM setup.exe2⤵PID:2644
-
C:\Windows\system32\taskkill.exetaskkill /F /IM setup.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
-
C:\Program Files\Bloxshade\setup.exe"C:\Program Files\Bloxshade\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5096 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=5096.3764.126452815089112695573⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3744 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x11c,0x120,0x124,0xf8,0x18c,0x7ffe15373cb8,0x7ffe15373cc8,0x7ffe15373cd84⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1804,713304807388361752,18135456122693579108,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1852 /prefetch:24⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3740
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1804,713304807388361752,18135456122693579108,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2092 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1804,713304807388361752,18135456122693579108,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2396 /prefetch:84⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1092
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1804,713304807388361752,18135456122693579108,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:14⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1176
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Bloxshade.zip\Setup - Bloxshade.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Bloxshade.zip\Setup - Bloxshade.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5032 -
C:\Windows\system32\cmd.execmd.exe /c taskkill /F /IM installer.exe2⤵PID:3340
-
C:\Windows\system32\taskkill.exetaskkill /F /IM installer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /F /IM setup.exe2⤵PID:1104
-
C:\Windows\system32\taskkill.exetaskkill /F /IM setup.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
-
C:\Program Files\Bloxshade\setup.exe"C:\Program Files\Bloxshade\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3824 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=3824.2972.45402225267263048673⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5044 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x194,0x7ffe15373cb8,0x7ffe15373cc8,0x7ffe15373cd84⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1776,957210517828155285,12331253318214640192,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1828 /prefetch:24⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:960
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1776,957210517828155285,12331253318214640192,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2160 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1776,957210517828155285,12331253318214640192,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2668 /prefetch:84⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4680
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1776,957210517828155285,12331253318214640192,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView" --webview-exe-name=setup.exe --webview-exe-version=2.8.11 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:14⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3584
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5078438ab11ae4b90ff636fbb0a2ab7b8
SHA1c441986385442a664866c5225575efcb4a1b0701
SHA256db1c0b6bb25e6adc22920093906c24d4dae6b6fe775da8119d17a14e54e93fcd
SHA51241ab1b142eaf573766d8f8b931add84df4831ee6c8164b022ff6b4f135684ed4002147c1360d9efc55ef0e75dc8bcba0a8ceef49144779c5f2d988b3e7f9cfa2
-
Filesize
6.6MB
MD532aed8eba58209c27bbe51b5ddd10894
SHA137c248f55117195c700788a52fdd6acddfaeb3c8
SHA256343c8f7d74ddbbd2d8c62d991128ce076d56c663b175e7b307b2f6e04c26814b
SHA512c88541952bd2ce3b39359d892b45b845c2092e469ad1087d038598563ec359794407625b9955b9d2092c988b76e82e9a42812d43fee0cc14c6d432b0497d7f34
-
Filesize
10KB
MD5cf2edba69d4ebad1077a0f5c1fee68eb
SHA1b85db5b53dfa453f02ef2ed587394b70833a5c41
SHA2568e6858d51fabaf8c01ef74caba1cd574b1c4bf1ee94e417593baa540aa4c8376
SHA512436d012fbf48b2112d2c98201c4dc29b234abc9c94ea5fa3f4510c8cbac046312649a14eeebaca678d7cceebe438d44026296bfa262edb66c8f33731908c697d
-
Filesize
152B
MD5a8276eab0f8f0c0bb325b5b8c329f64f
SHA18ce681e4056936ca8ccd6f487e7cd7cccbae538b
SHA256847f60e288d327496b72dbe1e7aa1470a99bf27c0a07548b6a386a6188cd72da
SHA51242f91bf90e92220d0731fa4279cc5773d5e9057a9587f311bee0b3f7f266ddceca367bd0ee7f1438c3606598553a2372316258c05e506315e4e11760c8f13918
-
Filesize
152B
MD5058032c530b52781582253cb245aa731
SHA17ca26280e1bfefe40e53e64345a0d795b5303fab
SHA2561c3a7192c514ef0d2a8cf9115cfb44137ca98ec6daa4f68595e2be695c7ed67e
SHA51277fa3cdcd53255e7213bb99980049e11d6a2160f8130c84bd16b35ba9e821a4e51716371526ec799a5b4927234af99e0958283d78c0799777ab4dfda031f874f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d61db9ff9e5bb683b423ce48da2c1567
SHA1bc2fbebd2b0ec789e5dcadc78b112218abc2b87e
SHA256c9865af3309f635933e034fbc6c15bc7508b53b22e21cd356a3677710c11fb0f
SHA5126762b8527babca2ab3524c64cd887d9e8ed792aad6d81ba7913f3c2b7f408510039dbcbdce9f918e6510076e6579597726b9d1b8da59bfd8be9a39f5e92794fe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5841bd1d9efde5cdb05d8ad6e6a2e8673
SHA145924a2b9e96935ca2296668eaaf0b3a1f253c12
SHA25621c90378ef878b4aa6767d1ee03d558f3b31481fe6e40fdfc8167b903ed97692
SHA512de7863782dc799958cb2416b99a3ba3391006b4bf7c9aabf019ca755b969e6573e3606342cbe0e05c0909e91c71a14702401b2e1fe2859fe165043d3280aad55
-
Filesize
3KB
MD59cb721492724bcfa929b9ebb47fc4696
SHA10f02e7a145a04c2b6ca1be4821e8021d6e02c11c
SHA256f68d3f8cdd2d268744a9731ec867041c85e3a741ce128a8bc186fffd79371009
SHA512b44e49eccb9c7a21f93ea48282158491dc9d496701bb38fb359fdf04c1504c245333c9aa36d6f12141ad9441b1559de62874de4adc2d7313b404b54ac6d17c6e
-
Filesize
5KB
MD5d5e22cf7db2713109d519b5f6353a12c
SHA1a2014c2243f02320cf7e13e665eff407c34c6218
SHA2567d981d60374f949924a5e2f904f638f1eab7359894fd816fa98540d94a7632cd
SHA512ecc91fb6d1290a100d35d6653132aacc6e57c96d17495ad7ebf18a92c80447b91ef0a96516be353eb5d5b53549343bed1820f219e8951f7260c9a475d98c670d
-
Filesize
6KB
MD52aab6e8c432560e83c0185c6d16b0f27
SHA18c783d3c72d38ecb2752bd887e59fc3364dd3ca1
SHA256d39bdae93ce67e34687c96fe6c035e03c421c3a8ab3cda46027a22b4015d0c11
SHA51284c74b2da5972392d6d00fc7c8593a0515af4624ba29fba8a303f663b7d37a6f2cc437cb810f7162e0c58e9103f15e3c62420cde3dcb280e986d1ad7c8174702
-
Filesize
7KB
MD53c40931521746fa778d3450694c84cd9
SHA1b05e621d0eafeca84c58e39b92ce7f40fc176b64
SHA256808d9167ba8ed81b429f746307fb0437edff943bf47ce584f5f241c0bb51a62d
SHA512bc3de3108c4ea8c220428b5a09abb9681c182b1a8ef414427113f521dc53f3eeee746ef926ba307cfcd5c70a87e232f451ebf2aeba55baeea818aeb284a27743
-
Filesize
7KB
MD50b52c56e7ee1d714ef1717c8d89d9045
SHA15834344d90300ae5f4a7c2ab27b9b81ae9d18cfd
SHA2563501a2641894c91c7da1f1241b74c5d41a0feb4de630a53294ca603ec1912b66
SHA512b25309a02bd45d20d3975825d6f8014102dcba062b6631fcabb54bdfa79f3a1f5a5d227f2d97387964acc9f5e667e4dbe683721258fc6c87cb15748e4e4f5e15
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\32cadb2b6d359d069dd3f3d132c212a43d223701\index.txt
Filesize99B
MD58e50e7fd73b099bc1023cea576b80114
SHA12f708f72600be9c4d5475e646e76f30a3da29a21
SHA256b99e607040b90c94c82f31b45a1c9754bdf08aa22d0f3d907e4fd8084eda089e
SHA5120d2d008f16ec82af9c9c81aeb22e73291b2c6bd91b40e3af530f0cd382f7b81d7d959adce17d26e5a42a053c07a7255730f5ccd9d241cf8add735e3702efe0a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\32cadb2b6d359d069dd3f3d132c212a43d223701\index.txt
Filesize35B
MD5343859b4ad03856a60d076c8cd8f22c3
SHA17954a27de3329b4c5eefd4bdcb8450823881aad6
SHA2568c79b653c087618aa7395d5e75198da7d3b04c08654c39e56b1027f9ef269c2f
SHA51258014a4e7f2b4b0d446fae3570196b8fb95d0d1b70bdab0dd34a74d6c62cd8d7ca494a486f19c1a829988a3af83a08d401f18d1769ce1799a02ee09807234254
-
Filesize
1KB
MD5cbedfd0448e2cb6696cce07f9d2f94ab
SHA1d41ff124b944d2f3b44c597b38d6d3c34900d87b
SHA256504e8ace1bc2394be47ef55a486c5812589516fc876288de26ce6a5dcd7bc033
SHA5124c772679df24c6142eee22d4b74bb0a312cce35859e72de22662bc0140b907deca2b42033bc1916abd3d57537b4a2848e8849de77a116d89cefb90b265ce1541
-
Filesize
874B
MD5dc8969982b03f999b8594f27f831fb1d
SHA1b2c43b34504b96e40e59291f6200fc82aeebb9fe
SHA256cf70a7dfbcd0317e29a5391b9be1219bed36945f5870faef6bb8cdf1696854b3
SHA51232b6aa28fc374b3618a0c1c79023e63c5371712636c53b63cf1a14d062d4226a280396f50f4b801a0c02483a1d96791c66dafd471c6921abdab1f18a90abc2d7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD519f147246c15fb6bf09d1b2a2e8d784f
SHA133cd2193f560918021c8bd7fd620748bed401426
SHA256a8ed7c63e41c4dcf410130d0849620477a37c8262e6a4e528c99f667d3879b81
SHA512e06e5cbbed91a43b8c8dad8dd697d8ed997f76edc35ca8a8a0daa49bc919ae4784073275bb44162a7447082a8dd7dbfcb6e13a26a278f727697257fa9aedf4ad
-
Filesize
11KB
MD53eacc40c7b6c6160b689c814278069ac
SHA122e60f5c6ed1682a2c24e112e6a4ad9da431245b
SHA2561330d98186b6a62f735f3e71326104200c50a52df59f7d59d84e5cd5c1a02be1
SHA5129b57dac42c8c0c63d1040c2b07bf7f8e72138383e91e4c8a87014d6a43d9a758aa3b68421948308a052f2f85ef5acb1402b1fc5f2a8c7b367c3567fa11c17c3d
-
Filesize
152B
MD5a419ae02f433ae86a61aad02cda77776
SHA10162a4be7156d78ba673ef19fe5ac6899d6a4f6d
SHA256ca3f6084979e27866d7cc857a6e7fa4e431a98d38d61e74fca4478bff5b72a7f
SHA512c265f83a377dea50e75aa02707e2e4b1912d8cbb9b032fd76a8867cd0800d6814a038932c4d5fd97e48fe281b73025446989d7e485d99f0a8d00117e8a43ff04
-
Filesize
152B
MD504b824c97c6f26c3b4d422194a1fb16e
SHA1a4366e9caf4ad4e420662cd60f00488bc8f51e35
SHA25611d9bb90e3f44294a61e33751cf39cf84b3d5c632ed3b39de0b5546210714fc1
SHA512c72359c2813f82833838f1056ee82e13cef13e4d41d2036b21077c7b5b63ab2e5da253db417aff1ad5247c96526dafcaf036acc0bdd28d83daeeee3162583c77
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView\Default\1b402172-047b-4381-bd66-77b477b1550b.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD573924de03bdc7213f45524491edd9216
SHA1e3bda42fbab4c9b268b161e79efccdfe991372f0
SHA2561f07d06a85afec373251dee49b9451c5b1e2a0a8c047b43f953f13ae4e4a58c4
SHA5128cd857c43f66c3fe14b41f1397226edca1344bfc15ef3a9890fe1d3b368fb690413346b61da295bef84ddd6bf13c0d6bcb1038aea63066c589ada101c262e834
-
C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index
Filesize48B
MD57c8b01fa3f977634e26c2064b0051d1f
SHA10b9fd82be3e096e70d57278967e8deac12823dc7
SHA25665c937c5efd8d46dc8953287ff9734c72ebda5636ad1cd17368f809d2778dd9c
SHA51214dc5aa4b1a4e51b25b90de691c5eba314a5d3aa432baac6a6a1cd14df7fb0f0452318ba9b26da88e85cda5b8997c140a12f0b57b26ff39679a95169ceba86eb
-
Filesize
20KB
MD55688ce73407154729a65e71e4123ab21
SHA19a2bb4125d44f996af3ed51a71ee6f8ecd296bd7
SHA256be1b822e970dfe1a120d248db7000eaf799bd6531929a1308676c70fe1608d60
SHA512eb6452b23ea36c39d03ead154185616c13583f12f382cb2456beeb1ba6e5febdfd2a6f1064283cf115ad1c517dbf409777cdacb128e00c9d3f401335db355537
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
256KB
MD5f61991e89188e18330b74238427b1d97
SHA17bffbfae071b415b52aa537d02b3e70cfd41166f
SHA256bb407617b3cb4aa4952bd4ba99e5b2d6745c1614275573ac641d75e73918c924
SHA512f002962cf16ef13ed460768d29aba1068a9068ba443d428536ff1b4d92bd5544d284077c379d8a80036ee6d2a410e0f7b0f28a101d0e2c8f5f1e04c844aef437
-
Filesize
116KB
MD54e2922249bf476fb3067795f2fa5e794
SHA1d2db6b2759d9e650ae031eb62247d457ccaa57d2
SHA256c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1
SHA5128e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da
-
Filesize
6B
MD5a9851aa4c3c8af2d1bd8834201b2ba51
SHA1fa95986f7ebfac4aab3b261d3ed0a21b142e91fc
SHA256e708be5e34097c8b4b6ecb50ead7705843d0dc4b0779b95ef57073d80f36c191
SHA51241a1b4d650ff55b164f3db02c8440f044c4ec31d8ddbbbf56195d4e27473c6b1379dfad3581e16429650e2364791f5c19aae723efc11986bb986ef262538b818
-
Filesize
301B
MD5f17d455fcdefcdfa8e5104ca99b58107
SHA1dba532bdddb8fc9a3e78b5f0a0b955f5720fdc10
SHA256c0757558d37930c18177093ffaa95a61d85eae6aafd0209d8c55e42fc62d4218
SHA51207b24078b57807d2b32591944ef2f1f9dca367cf56534e770de08b33e181a239096d770ba83955182000b87ad67d99ce2e443e2db74ae9d7fbd584bf71b9f6c5
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
76KB
MD5cf7ac318453f6b64b6dc186489ff4593
SHA1b405c8e0737be8e16a08556757dc817bd02af025
SHA256634434e865f1ba1b90039bd5afd8f01bad6d278377106022ea2a9c2d8778d31a
SHA512b64e484d16222d8de31f53cd60b719b7d855bbc552a7d052e202382bc3013e0edaceb31e3a287f2ea6b7117ccfdb8a56ea9d7da78535d2c606183072ecd084e4
-
Filesize
3KB
MD58f3081b1f4d54472eb711db8e7482c5d
SHA1e4cbb8ab80af54fcfc6ce8cd140511d360e3ed5a
SHA256580c1a569660d1d1828cfccda63508899e9ee48f61b69422a80d76276092ef0a
SHA5123c839e9b0e567962b95caaa18e01d98808943fc0cd22310dc9e6994cbadbff7988a33b5bbbbfbd9d4450c1bd0aa06b9b1b411225fcc03e883ee73fd5f8fee631
-
Filesize
3KB
MD5e69d68360b6e49266a2fd9e9ec3f5b54
SHA11d247a648fe66229c3e6237032023db6cd59cad7
SHA256dd8de031eefe288aa8a8fbe5ffb3e2eb990cd770daadfd45166eab322d648f88
SHA51263c9e69777298bad2d2de0d89af75456bc993308ff24c4befd5626b3d240e30a58627460ac5bdd7035550896cab3ed91375bda2bc88e92d09610a2290a1a2907
-
Filesize
8KB
MD5348827d0da1985b0b6631b155e54e17b
SHA15b08f7f7cd2755cb129212cb07ec09505dcbc7dc
SHA2566d428965c6a698fe5bf6f1018c4aff0ecf7fd694f6968ee73d31a4a6c20ca1c6
SHA512651e70099b76ca4dee0d7af35f60050f95f550c44f645f5a1b31e5ac0e500496e0c411f419b193a56821b3c55e06f722e9dac61db5ee8eb7c41673fe4ed0e1eb
-
C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView\Default\Site Characteristics Database\000003.log
Filesize40B
MD5148079685e25097536785f4536af014b
SHA1c5ff5b1b69487a9dd4d244d11bbafa91708c1a41
SHA256f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8
SHA512c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f
-
C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView\Default\Site Characteristics Database\LOG
Filesize317B
MD587ce747e49c8df8bc38c4608d347927a
SHA192b6e2ac0a812f9fd48a3bf74908e13d1b53c6e7
SHA2564855cb76e18835e259269c6596599b645207bf59a9ef2b2c8e553a5143834738
SHA512e4afb24da2bbfb82918972590e4ec8ad258a33a9f0adec570d7e475fd67bf8d217f36d1e276bb3bdff7ce9515c6a698adf4f90e5fbae1965a58c31ba144cc548
-
Filesize
46B
MD590881c9c26f29fca29815a08ba858544
SHA106fee974987b91d82c2839a4bb12991fa99e1bdd
SHA256a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a
SHA51215f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625
-
Filesize
293B
MD5ba24bf4304f86869f68aa48eae54c43d
SHA1315b85f74a1bc15fd1075eaba92b4e00a6d13d28
SHA25606a281339c8de643785b685c4f37d9c9325ff4e686d5f3e9cc3e27548bbfc991
SHA5128fd31d55c8713f3567bbc513c6e943f1a4f7bf91d4bf891af1103293c934edd51cec29f6ccbd082b7fd8cc5e10207a99579dc76788bb57994e9c6ca723c49686
-
C:\Users\Admin\AppData\Local\com.bloxshade.tauri\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
20KB
MD5325ddf165383376a8e530a8288a9fb73
SHA1f451204bb6f3de9de42f27bd887576b083026e87
SHA25653eb4fcb3cbcaacd4d94036c9379715990f86185b8ef7fd18cb27665193da6c8
SHA512edb9c49956741560f40df102b81c3b558b1ae9ce902040f89cecb2fbbf60277dcb73f68d8b7c60340a92c46915828b7a204420292d0a4906ac0e9082943ad528
-
Filesize
128KB
MD571d89208d4e4ce416cbdd90ba352d7e7
SHA1171ac83455e29d5b7131b76127c90b9d1220936d
SHA256a04d6aef3502c714bb9350ed8071321fcc9db64063d3d7677de0db8c73301e1b
SHA5121b89f01466e3cd3e56841131afa767f3b729cd33f1f83710d1a48a53f9d095fb4be3ecde28c8a51231f1eff6ef42f4b0f4d27eb4ee9a9f9a9c5d49408dea9e66
-
Filesize
110KB
MD512aff5c24b1e165da94cc9ddef6d752a
SHA1345a57b067d6c7561b149b6a7de1d0cf53e42cc9
SHA256b49ee954c97289b707fcaed55266f7c49720d1c24f4a8872038384155081aabf
SHA512fd584f3d7e3a5603ff2699e1b4930d6594b0ea09c0a194b7329f44d3d4d2e1e985a42ab512afc1b6a0f35412ef839d35f27fab1f6506e871d74c648c3adb0ae6
-
Filesize
44KB
MD5144dfaaa82df72858197f4ef7ddd34f2
SHA1e6bbbc5593c1d782e2d23c6ba6a5f5468e7548fa
SHA256fe2844d9713e3f49ff6e5c6d5e9f3b7af671fe9165cafe01ebbaf61bb1ae84b9
SHA5125a53b1dfd4729dd2cf7c5fb45b4b15e3b1729c7c7dca1a029b39964a6e0f9435bde61ba5c8e7b859254798fa135264c9814533409e5980159e52cdca2b1a5793
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
11B
MD5b29bcf9cd0e55f93000b4bb265a9810b
SHA1e662b8c98bd5eced29495dbe2a8f1930e3f714b8
SHA256f53ab2877a33ef4dbde62f23f0cbfb572924a80a3921f47fc080d680107064b4
SHA512e15f515e4177d38d6bb83a939a0a8f901ce64dffe45e635063161497d527fbddaf2b1261195fde90b72b4c3e64ac0a0500003faceffcc749471733c9e83eb011
-
Filesize
2KB
MD5cbd7eb89a160959d94dc9839820f58ea
SHA11dbc775a8b16cc166e5083fc78cd3f575d65a663
SHA256ab44638b07f1e86743b3574c4d1e2bd98ba2cb88c7eaec6bec03d27d485669b6
SHA5126d78f1e4de7e694ddd3d1f63c32d146e24599a612fa0d5faba6af80e863ff4986a99fb8dd77df9c18958f3e3317406f0af4c0cd252c60c88e183f48bb76f956d
-
Filesize
256KB
MD55cc426f0367c537f17b2a56ca8e7eb7e
SHA19e945d9881b6ac31fffd738efd6525ca7811e980
SHA256df379b1d46dfbfa3d9eb7698b0610b599a3b870ff77be664f2b2b52985888ef8
SHA512ea8044e370794bbeade0034d0c10ae4066deb3890d120c8fef04625218e4f9978a78a50ce17bc3028b9d05f3610100485f20b45eac26538a80e36705d5bb459f
-
Filesize
2KB
MD5881587fa2a8dc099a7fc0a9fb8538782
SHA1139b7ebb22d652a3b25eb197c4f0622651de7106
SHA256e1850120c0a6195c308b56cb375dd1302c3ad97c11cf361c6fd2573ae34ec2e5
SHA5121e2cf9b091f9d7c1e967bc2ecae2675ecc2197f5e5ab1ce606c55bc997db208ee8b92b230d4b29d40c64c1447c1c67953aa02d2bb2ca32f2157c4609306487d4
-
Filesize
3.9MB
MD5d6cda5dbd9bcb63a6c9e85433f180399
SHA196742728d53e4320c7110191a32039b36039a11c
SHA256a16d0c8ce1aef23e404c9d43450f94204112d6ca38e90792b7f8b4b0e5e7ae43
SHA512f90c4ef424f050af0f65e457345c6c6f849f0ce950ab16f96c0ace77dd224796a03b8b8f23422e62468bae97e52a174d43267ec5de5b5c6e137aaeac76aad6c4
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98