Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 13:30
General
-
Target
LXQQ-2657PAYMENT.pdf
-
Size
710KB
-
MD5
562c957fabd0c1196a93fd297f568b1e
-
SHA1
0d2cf7c63f9cdc86dcaa27dd17ff8e4321fde205
-
SHA256
00f46dfb911093425295be6c3b9511d6c2577616c26d86b2cbfd3fac445ae144
-
SHA512
caf81a0f67f42f40f5a08f1686bbb3b1f38cfd20a471cb8af4de7a02aea1f26f2ba466ac8ec50e25f28b66b6c3dd28113cebc5a4a8c1528c752edbbba9352219
-
SSDEEP
12288:aZGGGGGGGGJaMGGGfGGGo8lH3GGGGGGGG1pYWdy4GGGGGGGGsCCCCCCCCCCoGGim:1tOH/YkyW4dOg9ytV
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\f3ad1951-3134-420c-a0a6-aadc9ee4fcbb.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230322143047.pma setup.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
msedge.exemsedge.exeAcroRd32.exeidentity_helper.exemsedge.exepid process 4572 msedge.exe 4572 msedge.exe 1504 msedge.exe 1504 msedge.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 5332 identity_helper.exe 5332 identity_helper.exe 5708 msedge.exe 5708 msedge.exe 5708 msedge.exe 5708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
AcroRd32.exemsedge.exepid process 1244 AcroRd32.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe 1244 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 1244 wrote to memory of 2684 1244 AcroRd32.exe RdrCEF.exe PID 1244 wrote to memory of 2684 1244 AcroRd32.exe RdrCEF.exe PID 1244 wrote to memory of 2684 1244 AcroRd32.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 1840 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe PID 2684 wrote to memory of 4796 2684 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\LXQQ-2657PAYMENT.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=89A9E8458CFF5222F7FA7F5FD5F8FEC6 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1840
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7FB50D2AE54690B758EB1361B19089FA --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7FB50D2AE54690B758EB1361B19089FA --renderer-client-id=2 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job /prefetch:13⤵PID:4796
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1C88183AF2B229159AE036A4AA8957B2 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1C88183AF2B229159AE036A4AA8957B2 --renderer-client-id=4 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job /prefetch:13⤵PID:1936
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=83A98EEE4FBED72E108A5BFAD4EE011E --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4928
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=16DBE14B5D515F4E98AE0E0E298DAA9D --mojo-platform-channel-handle=2604 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4820
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C28695F57631A489CCDFA4FBF5F50186 --mojo-platform-channel-handle=1888 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4372
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://presentations.yesware.com/ff9bcda91cb86b02dc3c2f6d644b74b02⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcb24346f8,0x7ffcb2434708,0x7ffcb24347183⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:83⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:13⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:13⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:83⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1012 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x224,0x228,0x22c,0x220,0x230,0x7ff64df15460,0x7ff64df15470,0x7ff64df154804⤵PID:4712
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:13⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:13⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:13⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:13⤵PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:13⤵PID:5888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:13⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:13⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2904 /prefetch:83⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1621878847419582044,15427798153195489835,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3008 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5708
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5232fd2def2082a5099a52754067187c2
SHA105f3ba7fbf8e804b4f43607150b603b2eefeecf7
SHA256011f29435dfc6485cff2f87b19a79368694a0806db3863a4bd32bff12f96e955
SHA5122829416a64f85f5ad6ed24e80b84fbe6e2b818d6077da9cde1f18497d171a4b3706d16089d852bec5981a747f1fcc6125549c0ce2fd553d50b55734cd029dc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5b2b3764a0eb3b6ee8f395cc1f3c31d85
SHA1c3293471d6d018cd316b53c809036835c4060e9b
SHA256e741768fc8a1a618b926abb44bacd1cb178cd73489d5fd828304c913d785fa52
SHA51299b7549e1a058d37f47977c312ca8c6a83139f7a1a684022205f930ab7d2f00a57e4e09416860770d86dda1fcf9dcef441693cd2cce13ad42369805a0a1b6f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize430B
MD5429cd9451577083de941740768f353ab
SHA1b88a477fe0a6374a4d6c93928359ca73dbb2148d
SHA25604946c79ab050a30341d83e5f188d226903ceb2f6ddb5f4c5dc6509e737c10c3
SHA5122d6560f860d95dc50cf92e8e70c551d5783228c038b32e2e325b60512a82b0d654d1f4de529837befba2103efe598b48645e275e4cd2c7da1d1808c73bce7373
-
Filesize
152B
MD50820611471c1bb55fa7be7430c7c6329
SHA15ce7a9712722684223aced2522764c1e3a43fbb9
SHA256f00d04749a374843bd118b41f669f8b0a20d76526c34b554c3ccac5ebd2f4f75
SHA51277ea022b4265f3962f5e07a0a790f428c885da0cc11be0975285ce0eee4a2eec0a7cda9ea8f366dc2a946679b5dd927c5f94b527de6515856b68b8d08e435148
-
Filesize
152B
MD5425e83cc5a7b1f8edfbec7d986058b01
SHA1432a90a25e714c618ff30631d9fdbe3606b0d0df
SHA256060a2e5f65b8f3b79a8d4a0c54b877cfe032f558beb0888d6f810aaeef8579bd
SHA5124bf074de60e7849ade26119ef778fe67ea47691efff45f3d5e0b25de2d06fcc6f95a2cfcdbed85759a5c078bb371fe57de725babda2f44290b4dc42d7b6001af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5c21efa09ea4dc161dd78b888457f1d1f
SHA1a9db9e208a2f5460d2f8af5722050c5bccf7adaf
SHA25697fd72fd964718b04478b43f9208a52c1aae7831cfd524aa9e12f441fdc79eaf
SHA51273346ed0f4ea9ec3ba31d6094ab344345394cf0acbf2899a8e1512cb0de9a8c179bf35e14db4f92fe589e70b3ff6fdb9446042a7d04ecc7a69890f21ad7dfa0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5177f6ff1bca789261892102b1bd44947
SHA14434fb8b2cf8fb460b830d23065bf817cffa9310
SHA256eb72036dcd5c3b5cd8b0417181a52cff6be2b1e18cf09e5e4f9dfaafb9c1636d
SHA512c5139563666f6ed9d3ed87e2ac1d0a6d362a64f48ef0ef63056775325de7bc23d55b2cf639ee74666e6acc8481981e9dad9964e6d97d2775af19211286a22f15
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
2KB
MD56a3fc5da9f7d471fea3d062cc63b6516
SHA19bc9f7d8c6c966595805586ddd165a090aea52c6
SHA256beecad5094cf4d6076a72b689bba4170e5535e7db891216a35dca7c9763b01af
SHA5126f915982445a5c12e8fb45fbabc2f0500c81fa57569edb0382f65e61de4626208b1a4881f4d8cbf35093c7409815a48866748f3c93882491165537dc3b32e39f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5b5beb96c95e42b856eb644662f7eb26d
SHA14e31bf3d26a76ec7c0b3cd492b61acebdea35a8d
SHA2568f0899e7692533d795e4f6a7ada906811c4184ce77e29c554e29ba2ba6cd4021
SHA512df04785d619e017af42d4855bddc9a49bd8f6867c259e4bda7e79fbb834f6fb379dfc141f7bc38349044e456bb66ed0cd1e848ce0b7e0ce65fd03cc66f67ed25
-
Filesize
5KB
MD58cc0475b9d7c79ab7ae1b5e071611daa
SHA1d31dfd598d559da65844251d26184a215233f2e2
SHA256e7379555a9d3eb32263f2e3c4aed42c4db669c60363038bc8182f8bb3a0d303d
SHA5121c89f8fd5ee97ba3a8b65987793141a24b7e439feefe866b850048087ed5259ae242df544e7592553c66e762612d3e31abe4c8ae3e9f2c3224677dd2fa9e53fa
-
Filesize
4KB
MD5c2d8c84811bcd2f9c7ea71f137ab2762
SHA1b4162f83710798cb01c658101b063eb5fe68dec5
SHA2560e31a431c97cf66f202bd6ab32cabb3df24663777ecb05a16694d7be2aa1fbee
SHA5129dbbc38f8a4da6e54d31e46a6cb0e6166e59908ac6bd57c10aea90e262b8426bcf4e9cc9872e7811622211470a5f24c67eb44f1ff6fa3aea2365e032e62ae9f4
-
Filesize
5KB
MD59ac03618705b96532d6e3257bbcd2377
SHA1e46d519c79b36eafbfe236854909f470cf4e8535
SHA256476cd2b9e071d11fcd8c47b78293bbfb2649d1e8b2ffda72ad37cac82a4b5c88
SHA5122e40c29aae7d7652f633323b7d41fa0652c051606ef2671c9deb813fe669b4f86cbfaed7c524b8b8cea3b1dfb7608ab67c4e10812dcae297f56c7cc34e3de2ff
-
Filesize
24KB
MD5d53ac35ab3976e67caeed75c4d44ffc1
SHA1c139ab66d75dc06f98ada34b5baf4d5693266176
SHA256647867c7236bcb78b7d585b476d82a101a077fac43c78dc59e612253fbf69437
SHA512391355c71734ded913239a6db10a3202087e756bccc8e29411108f21b3f2460d9a9c606619aadd785285be70eddcf61ef9519441cd387cd3823c1399a6967cc2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5a4274f5157c9181dd76d808542559afe
SHA17aef07386e54def9f411e16ddb6fb37b9937068c
SHA256a217b81717083132ed1df4d519dc33c6b53f73994bd74edac255aa7a9a8ab03f
SHA5127b90dfa5a38387afa66934930140b29042c2cfd4ae4e2633567077c5c4b10d824beb31865478e7d0f3574751d6a3188f933028c9a822b4a4386fa24879afd9b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c55a1cc6-2d4e-4fc7-87a8-1cf229721d57.tmp
Filesize1KB
MD58c3084dca1f4ec992b851892c697e839
SHA15b62a16684e84a2e8d405c45b8e247eadbff2c32
SHA2562f7dec3f8781624c817a4aae85cbab17de5bca065cf1d99446b1a79d8e6625f9
SHA512df093f2708dc300def7a76946ebb4b489f7da06fefd669b0a44723956c8439175f3dfe346035ff26e1a7b21bf5aebecca01fa8aeaf86954dc40f4bb7d56eabc1
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
9KB
MD57c30096c23620bb4e9d19681a3f29316
SHA125d5297fda9aaa399db3c2cae8a3e59c7c5d0911
SHA256803c1fcbbb75832d1a2720d63296f299bf7152e59ac4bf94ff786ddbf7421173
SHA51292142088a9553711a6276b2d8baf53569e47d7144e013a9c0aa72a6ee7ac9e5c5c365b0905dee8383b24282cd2575247ac86ea5a1c1ad4d728e74c5e73c2c22f
-
Filesize
12KB
MD57ad00b8a9bc1035d20677c7933358d23
SHA1aed7dead4a217e970e7cbb8df23668305b8af5df
SHA256797de0cdea5478fc2b3046b4b741be1917fa057ab900263d204c065bd241699f
SHA512fcadeabe01b1f02e7602a962905012af655c29449edc2c28423c092d1b218d8c64fa4cb1abb92f2a156d6cc41da0578b04492f4d6f9a17961be427fd19780afe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD563b930721ac8898f3aaffe55b1611997
SHA1fde7a8582717ed1360171155fefc8a4eb3244339
SHA256364c661b63a60af6cb4f3517664ad69dd4677e5db50db6c2b9cbc235cb311a1b
SHA512fc8dd7251b6b0a9e21e5c28d6d24b4311831ccaab860ebd870eec4a476ee4ba994e78c5cedc4ade8e20b25ee309cefb1515bf3c8fad56b2aa58b6bc4df30b50f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e