Analysis
-
max time kernel
113s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 10:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bitly.cx/EVFV
Resource
win10v2004-20240508-en
General
-
Target
https://bitly.cx/EVFV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 756 msedge.exe 756 msedge.exe 224 msedge.exe 224 msedge.exe 4852 identity_helper.exe 4852 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
Processes:
msedge.exepid process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 224 wrote to memory of 808 224 msedge.exe msedge.exe PID 224 wrote to memory of 808 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 4192 224 msedge.exe msedge.exe PID 224 wrote to memory of 756 224 msedge.exe msedge.exe PID 224 wrote to memory of 756 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe PID 224 wrote to memory of 4812 224 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bitly.cx/EVFV1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6e846f8,0x7ffea6e84708,0x7ffea6e847182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2708 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4974867452087156604,17476600925826876840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2200 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001Filesize
43KB
MD5db2a509594a5a1893b68ab6751b4821b
SHA1de248758ad71bb86150de155daa2fae0ef82186b
SHA2567205ea02f7af5c57824a95597af310a9a7f1cddb053abb3b4b82af8f09fb6f51
SHA51237a82855bfdcd0f93c097883437c22362b8cd79530885f981c6e03fd6f2f80a8177a979a005feec10b61aa2b84b49faf0a05e548d472655eb50ff4df5b159e73
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001aFilesize
119KB
MD557613e143ff3dae10f282e84a066de28
SHA188756cc8c6db645b5f20aa17b14feefb4411c25f
SHA25619b8db163bcc51732457efa40911b4a422f297ff3cd566467d87eab93cef0c14
SHA51294f045e71b9276944609ca69fc4b8704e4447f9b0fc2b80789cc012235895c50ef9ecb781a3ed901a0c989bed26caa37d4d4a9baffcce2cb19606dbb16a17176
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001bFilesize
121KB
MD52d64caa5ecbf5e42cbb766ca4d85e90e
SHA1147420abceb4a7fd7e486dddcfe68cda7ebb3a18
SHA256045b433f94502cfa873a39e72d616c73ec1b4c567b7ee0f847f442651683791f
SHA512c96556ec57dac504919e806c7df536c4f86892b8525739289b2f2dbbf475de883a4824069dbdd4bb1770dd484f321563a00892e6c79d48818a4b95406bf1af96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
528B
MD5dd4f9c274dcd22528c51f20566241ec6
SHA13cad280785b85f75b4ddf4ae07880679da23d5db
SHA2565036fd3b99f906a6fb5b190bbb4918153bec43c879d3431285d477e0f12d58ef
SHA512ef73e05471234f1fc57a5faea6cb4cf0694477382bcd8f45b6ca773a439f0245121474b9d3423800ae90ade75525bf506c3193ba271201c4e14307cbdcbb1ce1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
456B
MD5eacdd5d56691c46ab52ba8e5954ec40d
SHA1ce977ef26d4854282ae386ec7c3eade9d67c1626
SHA2566e273b875b34a511cb27e00d55483ddf66f7141d85ff725240c5355303e87b83
SHA512a46d1efc6d7c2f0b029e32872885e7a1b8a1c4fb652c38ec7a5834b453e76f97bafd63f18416bb3eb5066ee71acafe48afec51155548282244b0694af1392972
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD5dddd9b4fcc0f3b884f517cd3b8c4720e
SHA1efaaf465a93fa0907bf725fb7364402716e11d65
SHA25682849e92aeef08c52cb6e6e1163cf62a027681e2c185457534c8caa9a218cfbe
SHA512bae9f0acdf57994dec1e368fbf08c1a0783ba1fc68b763330700e3422332735284c514f1cd984411f0e1666fe5a36b0d548e3cc023502317c880921e57bd0e42
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD53730c68ca4b00645e5c534d773109f5b
SHA1bb77352099b633a4bfe02ad21c1e46aab3027237
SHA2568bafc5e89f58ebf3378395bc4d1254125f6b0dd2f660b6ce900563d23167c7ee
SHA512687179b7a325f1579f08db75c95c82d168a38a8a556c1ae904c68f5c04e62bcea4cf3b8767c5b556beee9de323da2de172215292978faa9424adcda87a468154
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD51c2c31a40ae2ff406335c142d62b80f3
SHA18764ea6ea1b3e4e7eca470aa9c82e976185ebb1d
SHA256795cb4be78c62654c02f170bce054ee852247914f0ab1395f8cd9775c21a35fe
SHA512c25b6d1b0e0580b4e17372c37ad841271afdd0c0450b960c07a0bc1aac1ea51431b40c8542c00fdb3c75c496aedc7a0ba2dad4b9cf6df26ccfca2c849b44c2b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5884e18dd8471a3358179f7246e5f47bc
SHA15590d2eac2387ef1d40b8d82b24e6244238dc326
SHA2566913a4177199a99c8cd12c90758299dde34c5f761e45caa2ef36f7f584e6da67
SHA5129cb1b847d7495097a05b8c5dd8fd97e3b9d2bf5bfda0f495a8fce6162c3075a511fccb7f3dda280802be79147cc6f013058a19c25d56a5d721c4b2fb8a88c3ec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD577f2c6e65e7ab4554b5342c652038d1b
SHA1af1a579cbf509910a38d8a4bec2532a2e9430e24
SHA2564ef216053a693f135606f23a80f574a513782e60cb6f7fb113ee08fc6709067c
SHA512857c9b9ce6edd819671b44ddf5a3c39bf0b5c309135f09c6746c8f4f751a250409a873fe0bcc585d0c8b0ec4a4fd6f13baff8d8aa53ca9bdd38e133e31f00fc8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD519fa25b91d723435249d498646f6d0d3
SHA1184eaf87f4ab705e05cd5748eeb6d645f1166eb4
SHA256c70b7b7b5d2460191b96e94b7860d08f5128e709ee0ae7ab340bf41d2f252fb3
SHA512b5c9f877b108898560d750cf4aeaa263bb1a3376c7f0bbc1b10bf5efe68512c292d2ecd33d85576faf7c5f10a565781f732bcdbb2435f4a8ef4c5ae9f5170f07
-
\??\pipe\LOCAL\crashpad_224_TCQJDVNOYGWEPDUDMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e