Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
Resource
win10v2004-20241007-en
General
-
Target
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
-
Size
783KB
-
MD5
e33af9e602cbb7ac3634c2608150dd18
-
SHA1
8f6ec9bc137822bc1ddf439c35fedc3b847ce3fe
-
SHA256
8c870eec48bc4ea1aca1f0c63c8a82aaadaf837f197708a7f0321238da8b6b75
-
SHA512
2ae5003e64b525049535ebd5c42a9d1f6d76052cccaa623026758aabe5b1d1b5781ca91c727f3ecb9ac30b829b8ce56f11b177f220330c704915b19b37f8f418
-
SSDEEP
12288:0E9uQlDTt8c/wtocu3HhGSrIilDhlPnRq/iI7UOvqF8dtbcZl36VBqWPH:FuqD2cYWzBGZohlE/zUD8/bgl2qW/
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x000a000000023bad-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe -
Executes dropped EXE 1 IoCs
Processes:
DPBJ.exepid Process 4836 DPBJ.exe -
Loads dropped DLL 4 IoCs
Processes:
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exeDPBJ.exepid Process 2224 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 4836 DPBJ.exe 4836 DPBJ.exe 4836 DPBJ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
DPBJ.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPBJ Agent = "C:\\Windows\\SysWOW64\\28463\\DPBJ.exe" DPBJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 64 IoCs
Processes:
DPBJ.exeArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exedescription ioc Process File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_06.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_18.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_27.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_46.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.001 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_46.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_11.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.009 DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_12.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_15.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.007 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\AKV.exe ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_28_54.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_09.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_42.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_02.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_08.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_37.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_07.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_17.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_23.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_29.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.009.tmp DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_33.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_35.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_38.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_58.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_41.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_48.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_49.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_06.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_22.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_29.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_08.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_15.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_37.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_41.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_24.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_13.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_18.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_31.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_23.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_26.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_30.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_33.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_51.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_03.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_32.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_44.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_28_49.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_00.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_01.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_53.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_05.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_36.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_49.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_30_36.jpg DPBJ.exe File opened for modification C:\Windows\SysWOW64\28463 DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_28_56.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_25.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_39.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_12.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_13.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_24_2024__11_29_20.jpg DPBJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exeDPBJ.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPBJ.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 33 IoCs
Processes:
DPBJ.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\FLAGS DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\FLAGS\ = "2" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\VersionIndependentProgID DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\VersionIndependentProgID\ = "IAS.ExtensionHost" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0 DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\ProgID\ = "IAS.ExtensionHost.1" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\ProgID DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC} DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\TypeLib\ = "{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\Version DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\VersionIndependentProgID\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\ = "Cativa object" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\0\win32\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\InprocServer32 DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\FLAGS\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\HELPDIR\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\HELPDIR\ = "C:\\Windows\\System32" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\Version\ = "1.0" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\0 DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\0\win32 DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\TypeLib DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\Version\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\InprocServer32\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\ProgID\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\ = "ctv OLE Control module" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\0\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\dmocx.dll" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\TypeLib\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F}\InprocServer32\ = "%SystemRoot%\\SysWow64\\iassam.dll" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{39F6B5E9-A773-4C8D-56BC-B886ECEE30DC}\1.0\HELPDIR DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E904FF8-F528-4C1F-768B-37A939ED660F} DPBJ.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid Process 4736 msedge.exe 4736 msedge.exe 2952 msedge.exe 2952 msedge.exe 5016 identity_helper.exe 5016 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
DPBJ.exepid Process 4836 DPBJ.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
Processes:
msedge.exepid Process 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DPBJ.exedescription pid Process Token: 33 4836 DPBJ.exe Token: SeIncBasePriorityPrivilege 4836 DPBJ.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
DPBJ.exepid Process 4836 DPBJ.exe 4836 DPBJ.exe 4836 DPBJ.exe 4836 DPBJ.exe 4836 DPBJ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exemsedge.exedescription pid Process procid_target PID 2224 wrote to memory of 4836 2224 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 83 PID 2224 wrote to memory of 4836 2224 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 83 PID 2224 wrote to memory of 4836 2224 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 83 PID 2952 wrote to memory of 4124 2952 msedge.exe 106 PID 2952 wrote to memory of 4124 2952 msedge.exe 106 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4980 2952 msedge.exe 107 PID 2952 wrote to memory of 4736 2952 msedge.exe 108 PID 2952 wrote to memory of 4736 2952 msedge.exe 108 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109 PID 2952 wrote to memory of 4280 2952 msedge.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\28463\DPBJ.exe"C:\Windows\system32\28463\DPBJ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc501246f8,0x7ffc50124708,0x7ffc501247182⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3372 /prefetch:82⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1732 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13094613330120120740,3628635851340830087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD57e3c5b0b883b0d794b3a55b893a5d187
SHA15493982b314d8b7c96de1178963657236c39995c
SHA2564291d3807ad59127236e7e2b88155a93149f53b8529b9ff5472153025c7ca4c6
SHA5123780ef9efc6dfe173e256872214c5013c5c217d11d0d15a3dacbaccf5df5b2e1467fc0508b535e04791a5c3f44b13a36aa8b6e6019482b5214edf700b267663e
-
Filesize
6KB
MD504d8e711aeee813dca3bb9bb75f5dec3
SHA15119404735dbbee2cca1b648e341b8bc58df422f
SHA2568ea83c6acab4c297fa6d5f279567f6bfb4a9274a5424a3819e10ce000d05b6a1
SHA5129e86dd201c5ed31518eabc4606fbaf5e09eafe920b86f06ad68a5b6f0ce12ecdb6574f55526fbc18eb82921e28c1ca2a9189925e07bfccb84d9c44a6eed42b71
-
Filesize
6KB
MD5ae8eb6a60c8483f671b58fb2fd70467b
SHA1a531aedb1371bc4652dfa8864107f5f0895c2359
SHA25619fc5edf3797ab96ab82572cc5aecb07bd9e1778eb4cb1870d9755758f7ad1c6
SHA5125e638f9def9294a81f77c920451ae14f6535f9e6282bb0d1f5846b18d97b286303bd6b84c854f5e7014e188f26468a133576457748c9ec1b06394ef4efcde03e
-
Filesize
6KB
MD56abda23437d7ec67f7fe165fbcd28d64
SHA1730f255d44fe13ca544a70812830fab258312eb2
SHA2566cc619d39939ec80d7096377bbacb64d1ebe2937a674a933b958c0ee98a37091
SHA512e29ccfdf08bdbe806f197b589d3bb7413ddc43c3fbce5f87967a528f23228dba67183a52a9079217c3c309175c6e1c69d0391ef3f974b2953b56cefa95cda6a8
-
Filesize
5KB
MD565b8c8cda79490f130a7cbbf21f37918
SHA1ddbea42acf8cc0b2ec86d8b144099473485a5aee
SHA256fab11a213684188b963451d95ac419d07eb96976b0fe7b595abbdb670fdcfadd
SHA512eaf361b6ee9c23e9275ba9a6f2df3d0fb8e3f9fe93802ad2642013d62c2990c6d253f0cbe580994dc0ce25570534eac4336b6735f2ef87c70a49d4f801c0d55a
-
Filesize
1KB
MD5eb7ea0f0832386194618ac430e13276c
SHA1b50c71c8dab0ccf1c9f76fdf9177f4151f782cdd
SHA256504e525fe08c47f973c788e6d6dce62a876e62e0a3e49412ecda27c30cdd5084
SHA512c07de94e0a848d4a55c0d60acda25a00a290fdf4e56222c47202ba572c0ba5f95ee4c1a97d9fb85e55400a7cc11d9444190e8905f4d7a76e09bc4c1fa867089e
-
Filesize
538B
MD5f2cf66f897bca20d80f5d98ed67cd523
SHA1644e7353530cee3795f5fa16b1a6c6379d84bebb
SHA25692e75f07f7baedf1c21fd055af26dd3f5413b02f8557add7a16db7d1d3f2a874
SHA51297ed7e274dd822006d403b63922223af6d62c6adcd4c0105ff3185b9379407f1438d170a7e6e3af8f931d5d5a98c95fcde43e02e885455df611a9006984f88f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD581dc66d10a87c0d1037a5b0f42f30c90
SHA17e70cba06d630fcdf63d5899d7796f607f61d357
SHA2568d32d740e8b4298352de67bfd065b1311c74e3c43081f06694031b87ecf63ff4
SHA512f7699a9d03821b528eac35a256686e8187a2f2f138b81bcc1c151f612df7a5efe99b782740df590377ebd76eb8fabbf6169535e741224817268515eefa1febd1
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
492B
MD57a0f1fa20fd40c047b07379da5290f2b
SHA1e0fb8305de6b661a747d849edb77d95959186fca
SHA256b0ad9e9d3d51e8434cc466bec16e2b94fc2d03bab03b48ccf57db86ae8e2c9b6
SHA512bb5b3138b863811a8b9dcba079ac8a2828dae73943a1cc1d107d27faca509fda9f03409db7c23d5d70b48d299146de14b656314a24b854f3ae4fdb6ef6770346
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
1.6MB
MD5d18cfcf685cb2bbc614622f5c9585245
SHA12f3fe812244e258040371aa16a5b992b459ebc6f
SHA256faf3e23bae64552ea3cd55b1f0cbc50eb3afefe62a6fc1d86a2455295a2057f5
SHA512c3308c833427ebdf830cc84a2348f6b13e165f532d76d9729042de09dffbe2dabba58966fc2011180e5246a98c0755898ece77924a84310d0f00dec1a31b9913
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a
-
Filesize
120KB
MD5ba12f01e62101e5b6cf9bb06aa801086
SHA1291805c5fcd2e04d8c96e7ab651a2aa24189e73c
SHA256d803d437bccf3282f85204535fc2d3f2e65ba3e99e19d6b38960c9dab14453af
SHA51235536f6c37a1b1453a9efa5f14d0f60f9bf2285abf55de128aaf2bef704939d4cc0dcb4b019cce37bd4b8b8126b9e135d5bd81793f49b3aef9451dd7d33fd936
-
Filesize
144KB
MD5959bfcae8b72e5f9c5487bb0ca53d1d8
SHA100ab17a9b41b617c5ca1858f4ad8c404f249403a
SHA256f51908eecf7df9570c61a548572ee33786b433e4bddbbc4677384fc7b6c57735
SHA5126d0b7eb824fdaf494664147acba204e38ffbd1ba4ec68f7d2a8df151b4314aad1fddd295f8b53574a62e8f7fffe45163fffb270907c042b4322b08ccfea88dbb
-
Filesize
136KB
MD5da716cf7b2d61333949ddea7c9e4d659
SHA1358d666dda5d23b760ce44becd27a09cab042eb8
SHA2563b62dd6924fad0e6d6396ec14de015537f009755db4eccb50bdca3d7763e6489
SHA512c58a29dd843e44c53c253f30ea09c62ae8f0a2f60028f5d7044934a09df7152ceb2dfd94b3fe6521b3be03e1e3d850da2173d5db55c99b4bb92ed4e021b76e3f
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e