Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 12:44
Behavioral task
behavioral1
Sample
812adobe_update.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
812adobe_update.exe
Resource
win10v2004-20250314-en
General
-
Target
812adobe_update.exe
-
Size
87KB
-
MD5
3f16a2de1242fc887a4b955300946b50
-
SHA1
94262ade0e49262c1f5e1fb4ad8e3b4a22048013
-
SHA256
41786d15008e2675fbcb8d543647bd6871eeabbb9f4a7f3346aa1f7e786eb7b7
-
SHA512
c51b7e97ccdd52ead4c303219f3eb172859580c3ddd83dab57134d4cb061a01ccada315f5944110015850c101a8975a9e466a9aa4322120344613f1fd4acc124
-
SSDEEP
1536:pAJX27T5dgGQEOLwKhZxlAbd7dkMeDmyOvMt0K3uSqGaVpd:p827T5dKw0AxZwSZ0tP3uRp
Malware Config
Extracted
metasploit
metasploit_stager
51.68.213.100:1440
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1670954577\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_598432556\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1853664381\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_598432556\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_208992242\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_208992242\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1853664381\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1670954577\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1878263899\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1878263899\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1878263899\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_598432556\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1853664381\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1670954577\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_1878263899\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_598432556\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping316_598432556\_metadata\verified_contents.json msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133874666757847208" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3218366390-1258052702-4267193707-1000\{22A6D89B-AB09-4A7F-85A6-FA837BBBA764} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 432 812adobe_update.exe 5864 msedge.exe 5864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 432 812adobe_update.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 316 msedge.exe 316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 432 wrote to memory of 316 432 812adobe_update.exe 87 PID 432 wrote to memory of 316 432 812adobe_update.exe 87 PID 316 wrote to memory of 4152 316 msedge.exe 88 PID 316 wrote to memory of 4152 316 msedge.exe 88 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 4460 316 msedge.exe 90 PID 316 wrote to memory of 4460 316 msedge.exe 90 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3512 316 msedge.exe 89 PID 316 wrote to memory of 3588 316 msedge.exe 91 PID 316 wrote to memory of 3588 316 msedge.exe 91 PID 316 wrote to memory of 3588 316 msedge.exe 91 PID 316 wrote to memory of 3588 316 msedge.exe 91 PID 316 wrote to memory of 3588 316 msedge.exe 91 PID 316 wrote to memory of 3588 316 msedge.exe 91 PID 316 wrote to memory of 3588 316 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\812adobe_update.exe"C:\Users\Admin\AppData\Local\Temp\812adobe_update.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Digital Ocean CFS.pdf2⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2f0,0x7ffcb730f208,0x7ffcb730f214,0x7ffcb730f2203⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2348,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=2344 /prefetch:23⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1832,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=2412 /prefetch:33⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2256,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=3016 /prefetch:83⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3532,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:13⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3540,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:13⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4208,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=4284 /prefetch:13⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4220,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:23⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --init-isolate-as-foreground --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=3968,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=4484 /prefetch:23⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5180,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:83⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --string-annotations --always-read-main-dll --field-trial-handle=5568,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:33⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5564,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5524 /prefetch:83⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5116,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5104 /prefetch:83⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3984,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5560 /prefetch:83⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5392,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:83⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5392,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:83⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6560,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5768 /prefetch:83⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6688,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=6724 /prefetch:83⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6732,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=6724 /prefetch:83⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6824,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5680 /prefetch:83⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6636,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=6648 /prefetch:83⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6984,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=6992 /prefetch:83⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7148,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=7160 /prefetch:83⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7140,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=7308 /prefetch:83⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=704,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=4344 /prefetch:83⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7280,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=7004 /prefetch:83⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6992,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5036 /prefetch:83⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6124,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=6896 /prefetch:83⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6136,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5896 /prefetch:83⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5896,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:83⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5868,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=5076 /prefetch:83⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5076,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=888 /prefetch:83⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5060,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=7000 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7240,i,11592821343583760915,10630297269012621508,262144 --variations-seed-version --mojo-platform-channel-handle=2996 /prefetch:83⤵PID:5600
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
Filesize
280B
MD54013ebc7b496bf70ecf9f6824832d4ae
SHA1cfdcdac5d8c939976c11525cf5e79c6a491c272a
SHA256fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a
SHA51296822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD590191515060f4f18725df73d85259a58
SHA1b75c02beee739df8bbaf3fa69bbb682a5e8a8354
SHA256d18aca7c455b3baef0995fa9697abfd9049fcdd910353ab523a6dc2cff059696
SHA512497c9ef9d3e8341e9b8a24f8547bc71a9b3fcbddd4ab7f5051b4bc979da626795463d593c8d37e4ba084c7b3cc688a7d3de647f9c68d3b0d084622ee9bbb0bfe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57dfd1.TMP
Filesize3KB
MD536d761ac7d73e35cf1394e681e7cf2d7
SHA12580f2c15d39945d68656280f81bba1136d573df
SHA25644ee24d2c259eb64be730511d9a3de9a0c3367b69dccdc6763285ba5c8c4b4c6
SHA51261ff9c0491bcd42e86fe8fa69b5584c043ba0e07954fbb804ff06abdb8187ec2ec75c06924c6e5b967d796cfc4d7bd6657deac4022eb68883231cbb1035a972a
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
1KB
MD55326e31a41f6f2fc436e2bc6220a4c1d
SHA1f2899908ba75854c9a1092f56f918e6ce4e2c483
SHA2561628a80799e7a39455f17211c2638f8422ba33769cf93b37aac36619ac28ed41
SHA512326871ff4fd1a1c078eb875de8dd320e8637155eb335c2d6dd0f299fefc38ccb32d233a16680c5fe4a723633239a9d4cfb32b0b1438751ffb80b21991034d476
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD55d4e67accc5c849494cc33650d7b2829
SHA1b6f41c7a5ffd50ef1677bd2c2f6fa8b5b9afc9ee
SHA256ca0a7461276aa79b8c9d649880ffbc3756eb44428ff609f12ea12781763580dd
SHA5129330d662053374a43c12bf63da2c308e2f4d03138f995738e6f83ff0248abf44f7f91e67fafd058484fc0f0e4219d27274f6388b78367ac6cea544b3aca66bd6
-
Filesize
14KB
MD5615b18df50f2ae106725aa2aa6ab8233
SHA18812b7abcb6e5e872532aaf446ebfa5ee6d5e007
SHA256469b5be3253d5a14d01e67f1ad129ebec6256d7b8fcd07b599b86ab6e086d9e5
SHA512b0323a55e828f9aa2b8a7c18e2198cf71232fc72bef8cdcf41fdc4d1c140fb616cb4e54309aa9b044860126d23c112de24af0f47d6c57525a56dd6c84bcb47d8
-
Filesize
36KB
MD54ba67d25e62b24dec83b0c2bad3dfd03
SHA16edf4d1e8589d7aa050dbc6aedbf811542143e49
SHA2561cc35edb6d6afd7e522392b45873501b6d03b24ac26f4ee95800979c4a412b2e
SHA512237c7bed2ac470807d2039fe1c3fdcd83a1247e51a640df210ea8d6a6af1201d16029a7a36cebf671bdc7c0490e4500742711105d32dcaa68ae7c4adf280b630
-
Filesize
4KB
MD591941a73463143522a0f8125103c8e30
SHA133472135a59194c14a1b8d705169eff5e5d11c2d
SHA25699120bda53d0f9508757734f4ccc8fc9aee6e055bb9d3521df08d00e244ede29
SHA512d5d85b3a8e13063dcd2c0f7622b980f0129768643d5360070bda60be200c70a6a94773204f2605d83bf156a8c30ea3de0985b8246b87cf2010541718f3efaffd
-
Filesize
1KB
MD51d50ca90a300ae509c3990b496cd6b42
SHA18d771fa8ce5abb5bca52d077db2327f8a4adb41c
SHA25601529a0143ebbbd174a6e7efd4bf1168b7d61caf51c6d67e2bca36fec11ad690
SHA512024cf4b660eb6c1b70466d286fb7a33cce0e1bf83671214f8cfc4fda580b2886164a6fdbcd5be5ea66dbf7594af57a82d1c96253e93f2552032a3cecd6cc3f29
-
Filesize
23KB
MD52162440a2788d5bb72c1a3c90d9049f8
SHA150ef1f18dabe20d1835f7557c583b38681b23623
SHA256c7caa4d0b9ef57e7379e690d6b6805d542c624873b6a00bce895ff47cd89b851
SHA5122a292ae77a34da634483e324a18014b5072d5adf743978faf51fc17b0b8ea0dd9d1e3192f75a602d8677b7cbbfe0cd75efc9ec440d341e9efd960677fd7cdd7e
-
Filesize
880B
MD5bba22407f2ddfd9e983cb1b7ec7c0bd3
SHA1530216050997ce191de162b565e320aa9624cafa
SHA256830f6beecd2226c6a0da456d28885c027b0e77408a3f6d8d9c00d616ba10414b
SHA5123281a5c20066f4990f89f21f41ecdc54408b2dbc67431187f8bd63a9f0ff20a10a040ff0fad60205f59ea79b967a193a9cc0b585b9adacf052140e0c81902c3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe586155.TMP
Filesize469B
MD524e00a8e634cc7562c70a7f67146a7d7
SHA1be77d649d5046e30697ee36674ce667e5559f70e
SHA2563934de930f1d071bd19f2822f3962aae3a60bd96f1812a36432332b040049d1b
SHA512fd28c605313647099483ca1af2614b600b6a7838c5ef7d92d1f863afe59f158078332f07f83632ccf23ef77294e78602842e6c48e2b5f841e4c1124dcf58238e
-
Filesize
21KB
MD597ffbea42e9a0795865f12dedaa14292
SHA182b1a9a09d849ca8e55914ceb05677991729de10
SHA25684db83a7515ea99283ea322d6ae8a7e806287e7e98771a53a5d0e3ff362ecd16
SHA512884e56e3e7419a5ce22725d8b39b6d9424c882185762fe6ebb3a5c67d65e87b846ecce8a26491019acd3ba79641f489a32e20e2c7b99576315352cca1f5a13a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe58629d.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD52d7484655d253d1b2c0001394c90fbda
SHA122d85d7e11f857d71b81cd2375bdee891e9f21ca
SHA256bdb8c3622d39b742325f275e21800041ae24d66c0826564ead7f062ca2c745f9
SHA512a4ee3700d2ba243a432890072506af0b606f4f4f84ac0f332c1f6d3e02d7b3aae6aab954d81beb60bba237d4201e735a2883f7ade2db1bd5c3d9a85b81485b47
-
Filesize
6KB
MD5bb1ace9da27a6e744fb87aec58246537
SHA1bfaef75b2fa8e026772ab6c7a82fe5769cf13c4f
SHA25633e3a17cef5df450d49192d301956626ba9086c0309b212ece658906de5e804d
SHA51231c435c49969ab26b2a8f7acb21fec5dfc653f28b3df5fc413f776e4bde326ba47f76d21b2f547fdfb25fd5df2f14fccb945f659ad4481f4e8600571621cc846
-
Filesize
34KB
MD58bbe65183a69f7187a8c222d88c4d61e
SHA1a3e50c6d75752ab7f80b473b9b4654eff440ec60
SHA2567d62092dd3b6c500db70df7883e86569933c2ea481d05d94aa040816b328b9be
SHA5122a0d0723f660cd1ac2c42aad69576e186d6c25bcc937162e9ac5483b3bddff74686a46c82b992f105d35a3bbe79a1c2240563c9b2d53d86a3db85fdb2c7aca84
-
Filesize
7KB
MD50378f2744356f29c453f3db610b9e73f
SHA1fe268e919e43bf943e7c82abe2ed57cbfdec4e30
SHA256ea32edf92309bb7eb4b62ea9e850f01b3cb5570d62ac783b9b119001bed5f776
SHA51233c050753ca8cbf7275e5b6a3b8e19c7154ea50193fb54986382b8572ec7d5f36e5504bb2cc1d4ce31d8ad5050103ebbd9a355fe5f83997fac63f48b08f32548
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5440ebf66114213e917dad9dacbaf8a74
SHA17a1a3af7c612f1bb78f10c70682fb1578de1a0ef
SHA256863d123c50e500a5877d719702c19fa5bfadb8bd17b3ec5d20c87241a1fb2c17
SHA512a5f271207c8a1c5a0fdcd7b9da309327b1825e4c10db5806a5de98d5960d5c1a96dda5e095c79a844ad8c3712756112de3ff916b4faf9a9f41cf54a29c549f2f
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
74KB
MD5d03e65cf99648dc339b8bdc036d50d19
SHA174b1cda3e72bbce92bdf90f4088e3871c0027c3a
SHA256708782a8853132c2948352bc2e79bcd67c0cd5b5cf2bc8fe98d8e4a46779b837
SHA51269dd3c0a57736e1d2caeb4e4f7c4febe1197122cda5254ad95a17de0290ff33e47d019a50ccb52025ad5b3a8a45702edd9760224e6c69540ad95f12d58727824
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de