Analysis

  • max time kernel
    841s
  • max time network
    447s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    04/04/2025, 02:00

General

  • Target

    ui.exe

  • Size

    15.8MB

  • MD5

    7821f6e1ae3239e1f8250fd2e2b2272d

  • SHA1

    92d9aadd08d05b6c778b9f4ee628f315999b18e0

  • SHA256

    495fa56ca85a4e68837f4d2b0628e903a254540b8cef14caeeb7500137e747a1

  • SHA512

    4410fdd83d2ade40d9fd92d4b33a40c59b291f29fa7a2f4c0b1eb912261b10ecde541651bf7c83b41aed8b686e91aa5488ecfd8f2c23968167d02cf4abb6744d

  • SSDEEP

    98304:aPPbD4xnuPaRJRx74o09lHXnUhKRe7IZSMhpFyV7cxPrwqQ2jJ6cefe2vtjlprk/:aPWRt49TiKgwFK0VjJe99IXWNdU3

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Drops file in Windows directory 64 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ui.exe
    "C:\Users\Admin\AppData\Local\Temp\ui.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --lang=en-US --mojo-named-platform-channel-pipe=4404.5692.16850822841815348992
      2⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of WriteProcessMemory
      PID:5708
      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x184,0x188,0x18c,0xf4,0x194,0x7ffcb29cb078,0x7ffcb29cb084,0x7ffcb29cb090
        3⤵
          PID:5696
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1816,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=1780 /prefetch:2
          3⤵
            PID:4652
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=2052,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=2060 /prefetch:3
            3⤵
              PID:4720
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=2304,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=2272 /prefetch:8
              3⤵
                PID:4804
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3404,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=3412 /prefetch:1
                3⤵
                  PID:4188
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=3948,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4756 /prefetch:8
                  3⤵
                    PID:4780
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4752,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4780 /prefetch:8
                    3⤵
                      PID:1180
                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=780,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4768 /prefetch:8
                      3⤵
                        PID:1100
                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=3940,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4844 /prefetch:8
                        3⤵
                          PID:564
                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4764,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4824 /prefetch:8
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3720
                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4888,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4840 /prefetch:8
                          3⤵
                            PID:2864
                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4604,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4260 /prefetch:8
                            3⤵
                              PID:6012
                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4428,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4432 /prefetch:8
                              3⤵
                                PID:5776
                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=2808,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4820 /prefetch:8
                                3⤵
                                  PID:4624
                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView" --webview-exe-name=ui.exe --webview-exe-version=0.0.26 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=4780,i,18361997450565000530,13277559611588102806,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=4212 /prefetch:8
                                  3⤵
                                    PID:5076

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Crashpad\settings.dat

                                Filesize

                                280B

                                MD5

                                5463a425a9f96175f4b2d257bec8530d

                                SHA1

                                721840334c799862629d5ab881343f33ccb074d3

                                SHA256

                                64de099dfd85759a900869d113b5d882ad4ede124099b8e1f8e8e82bb0985732

                                SHA512

                                40a7115882048ea20c1664bf6bdfa5f15debc6a384bdae32a9bd05a10624a995c109c4947438fb1c688c890882d262cb1aff89c1e3a2da8687ba26df4a92508b

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Crashpad\settings.dat

                                Filesize

                                280B

                                MD5

                                a633c4484ad49b2163b3a3ee791b55e4

                                SHA1

                                64483f20ebed140bf563234465a33a66dd15f9bc

                                SHA256

                                738d7b963a887c72433d7f1eaa6d59b51c79e5fead03c1b2a9212c1963af10ad

                                SHA512

                                45096c1d7ecad70c6d3b941b5491fdcc44e13f866b67c211f40df6de8f30aaaa3456ddb75013e5a3c5452905adbff0db22ff594fb3917cb3563bcdad2e428aa2

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Crashpad\throttle_store.dat

                                Filesize

                                20B

                                MD5

                                9e4e94633b73f4a7680240a0ffd6cd2c

                                SHA1

                                e68e02453ce22736169a56fdb59043d33668368f

                                SHA256

                                41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                SHA512

                                193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                72B

                                MD5

                                62c0ea02b7ad9520562093ca64c6c650

                                SHA1

                                d7c0ef0b40ffea605da9908d483ae911f2d46b21

                                SHA256

                                0efdcd87969ba39b0f68911a807c2977807559bafe5317da5171c408747d7558

                                SHA512

                                80462060c5c1debf0e0897e40bde69c2a741e3e982a5a2dcf37e4ba76f2f5e865228c924dcc67f328687258fac8aa9f9f1b2dcf6f349ff73d72b7bdf915451ab

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe57ca45.TMP

                                Filesize

                                48B

                                MD5

                                618e22e481ad583267f2e2a36e7db129

                                SHA1

                                14c10c3c0ad2f112ef74a57cd5a40086fd2f41ab

                                SHA256

                                a660d132972511d0f93ef4f1ce43758507b606b74a63d8abebd512f26007483c

                                SHA512

                                298a62e5ac53e8566121c6d385e0fc0d47b489aca33c374b6cd50177fa65cf949e14be06ce9fc4e3e93b7f297e07eaad0dd283707caf6fb78b1b7a9bd92b02e2

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Default\Network\Network Persistent State

                                Filesize

                                813B

                                MD5

                                d5850cd5eea5268a996cc301056d8f6d

                                SHA1

                                9a86e32504c54d52d8cfd3c63460d13470c495e1

                                SHA256

                                8c5e0848c72e9418b3aa26b578541045d113c36847bb7f15b49604d14cbd3a62

                                SHA512

                                fb1c62ce85bb861e50e2084836ea4cfa73ded3a402cf6595aa75020218eec42eef88560bb5139c642eb55ed613c38a864bd9cb0f160fc95188fc5c9999c1ca67

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Default\Network\Network Persistent State~RFe588cf9.TMP

                                Filesize

                                59B

                                MD5

                                2800881c775077e1c4b6e06bf4676de4

                                SHA1

                                2873631068c8b3b9495638c865915be822442c8b

                                SHA256

                                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                SHA512

                                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                179ae53f8d8c909a8532076074261c9b

                                SHA1

                                f6413700c0c584d2599047b5a79e4d4dc93481bf

                                SHA256

                                962421370fa424da8ecd6578a53ce431b7be5d0510789e2686d23f6fe49f3c1f

                                SHA512

                                ed51b1ed67711bd47b24f9dcc2681fc46e62e6e741063f1237888c02bf47d74d25496e4415e7ffcc03c6982253605e5a7315085a1564128e3e7c9f762235b730

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Default\Preferences~RFe581400.TMP

                                Filesize

                                6KB

                                MD5

                                45dad6d272dbca14424e6833bb47cc36

                                SHA1

                                40f0e1c886fede5c9fc29433645265405b5eedfb

                                SHA256

                                25cb08cf65db84304ab8d78b51a14d2058dfe4888702f9017fa99b21b6b82259

                                SHA512

                                408fdc26d7ec4abfdcdde94ed09be363017aa86964ef53cf3c30c942432f9812b7428b2a2a3c302ca846922211082d99c868a79e99c91ee95e11eac1f9c2ad10

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Default\Site Characteristics Database\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Default\Site Characteristics Database\MANIFEST-000001

                                Filesize

                                41B

                                MD5

                                5af87dfd673ba2115e2fcf5cfdb727ab

                                SHA1

                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                SHA256

                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                SHA512

                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\GrShaderCache\data_0

                                Filesize

                                8KB

                                MD5

                                cf89d16bb9107c631daabf0c0ee58efb

                                SHA1

                                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                SHA256

                                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                SHA512

                                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\GrShaderCache\data_2

                                Filesize

                                8KB

                                MD5

                                0962291d6d367570bee5454721c17e11

                                SHA1

                                59d10a893ef321a706a9255176761366115bedcb

                                SHA256

                                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                SHA512

                                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\GrShaderCache\data_3

                                Filesize

                                8KB

                                MD5

                                41876349cb12d6db992f1309f22df3f0

                                SHA1

                                5cf26b3420fc0302cd0a71e8d029739b8765be27

                                SHA256

                                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                SHA512

                                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\GraphiteDawnCache\data_1

                                Filesize

                                264KB

                                MD5

                                d0d388f3865d0523e451d6ba0be34cc4

                                SHA1

                                8571c6a52aacc2747c048e3419e5657b74612995

                                SHA256

                                902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                SHA512

                                376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Local State

                                Filesize

                                1KB

                                MD5

                                c87919d6eac449c133b59efc4f8c7252

                                SHA1

                                9abfe92b8705d525c2419985c1c47432c13f0e61

                                SHA256

                                d3c8a528a21d13f380ff0a985611f090a13ae3d48aeef5e748d0d7a750218f23

                                SHA512

                                a009a7d731593253e2b49578f3a396f9e38b9adbbab23454b3e34d3828222fc2ab5c37e5d41c02ab269b7505b47c0ac3df2de7f2a091ec90288b26061e7b76f9

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Local State

                                Filesize

                                2KB

                                MD5

                                c36bc03328abdd47f669b1a26dd5f65f

                                SHA1

                                63e8aa7b7bf95f6c05c1b78d24f27632b93d76c9

                                SHA256

                                97b157f7f6acc42b369ffcfb7739b94a13a9d3a5f10c84ac8e689149a1e31e1d

                                SHA512

                                50f41e9339ea56196833eb45431ff3a53a96a9bf29868f40e4b6a37ea9cf484d1cec3e5d13e22be4f90ccb5e4c021c5775c83042c133bef3d82e48ef4fea264e

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Local State

                                Filesize

                                16KB

                                MD5

                                8bb8b2dd7ce87ec5900acf8003d33158

                                SHA1

                                74872cd45b99792025431ce1f80df47dc13aae56

                                SHA256

                                74fbb2ed03049cc07885ff00de8180f75cb70955d72a40c1d168d13969b994d6

                                SHA512

                                dff01c918685d38ce443f55bd93c9b3a96f11a3c8520fa614d850144281e15ba5f640ea954e9f00c2c849cde8a508c3c22a21719d3fa71a82d70e950260b8583

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Local State

                                Filesize

                                3KB

                                MD5

                                032f4a8cfddd669655f3003ea7ebd772

                                SHA1

                                a585e2ad726cf27e193b310cb0e9ead53ed1279a

                                SHA256

                                d788fbc331734b18320e46efb8dc8e39f7e832c15b6c6971f3957da42f48c171

                                SHA512

                                bd97eabb8179f545a4db8e1e8d975df9076d3524cd72173e03aff1f8a0fac8c1c076e0ddee740c1e9e350ac8b6ff7c3daa558e5bb7ce632b6b691b182747904d

                              • C:\Users\Admin\AppData\Local\com.awp.dev\EBWebView\Local State~RFe5776d6.TMP

                                Filesize

                                1KB

                                MD5

                                5bd5e27c926e111dfd8afec5ce321797

                                SHA1

                                25eff6acbb7e429bd3655d3b4b62249a4a5f9870

                                SHA256

                                1e0b0df825c7eeab3eb195f9f56246c4f6f1d50b53e106e9465b90ec16aaa3d5

                                SHA512

                                ddd9b800dec12bc085ceee52ad62134932a6e9aca7d70f8d9d09e249941a39eccb1c5ca0b0a7bf7b98c86b01c50dfd2bcb3139b72ee51e6256c181749647bf1d

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5708_1709548576\hyph-bn.hyb

                                Filesize

                                703B

                                MD5

                                8961fdd3db036dd43002659a4e4a7365

                                SHA1

                                7b2fa321d50d5417e6c8d48145e86d15b7ff8321

                                SHA256

                                c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe

                                SHA512

                                531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5708_1709548576\hyph-mr.hyb

                                Filesize

                                687B

                                MD5

                                0807cf29fc4c5d7d87c1689eb2e0baaa

                                SHA1

                                d0914fb069469d47a36d339ca70164253fccf022

                                SHA256

                                f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42

                                SHA512

                                5324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5708_1709548576\hyph-nn.hyb

                                Filesize

                                141KB

                                MD5

                                f2d8fe158d5361fc1d4b794a7255835a

                                SHA1

                                6c8744fa70651f629ed887cb76b6bc1bed304af9

                                SHA256

                                5bcbb58eaf65f13f6d039244d942f37c127344e3a0a2e6c32d08236945132809

                                SHA512

                                946f4e41be624458b5e842a6241d43cd40369b2e0abc2cacf67d892b5f3d8a863a0e37e8120e11375b0bacb4651eedb8d324271d9a0c37527d4d54dd4905afab

                              • memory/3720-379-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/3720-374-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/3720-370-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/3720-369-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/3720-375-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/3720-376-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/3720-380-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/3720-368-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/3720-378-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/3720-377-0x000001F3CE050000-0x000001F3CE051000-memory.dmp

                                Filesize

                                4KB

                              • memory/4188-77-0x00007FFCCEFA0000-0x00007FFCCEFA1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4652-29-0x00007FFCCEFA0000-0x00007FFCCEFA1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4804-70-0x00007FFCCEFE0000-0x00007FFCCEFE1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4804-69-0x00007FFCCEA90000-0x00007FFCCEA91000-memory.dmp

                                Filesize

                                4KB