Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 10:57
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gfy.bst10cloud.com/identityserver/connect/authorize/callback?response_type=code%20id_token&nonce=bI5ksFMfyrcOR7dze4ycEA&state=_9n4wp745XABl4CtPjLC2A&code_challenge=Rzk1eO-NENCTp7tWo89D8wODAa42kBiEeUm1PkdZ6GM&code_challenge_method=S256&client_id=58cBTWueQwL5&scope=openid%20profile%20email%20primarysid%20upn&redirect_uri=http%3A%2F%2F127.0.0.1%2FAutoUpdater&response_mode=form_post&acr_values=idp%3AAzureScheme&[email protected]
Resource
win10v2004-20250314-en
General
-
Target
https://gfy.bst10cloud.com/identityserver/connect/authorize/callback?response_type=code%20id_token&nonce=bI5ksFMfyrcOR7dze4ycEA&state=_9n4wp745XABl4CtPjLC2A&code_challenge=Rzk1eO-NENCTp7tWo89D8wODAa42kBiEeUm1PkdZ6GM&code_challenge_method=S256&client_id=58cBTWueQwL5&scope=openid%20profile%20email%20primarysid%20upn&redirect_uri=http%3A%2F%2F127.0.0.1%2FAutoUpdater&response_mode=form_post&acr_values=idp%3AAzureScheme&[email protected]
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_1183847822\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_1263691336\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_1263691336\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_1263691336\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_1108561560\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_353502869\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_1183847822\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_1183847822\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_1263691336\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_1108561560\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_353502869\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1008_353502869\protocols.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876330865356778" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-869607583-2483572573-2297019986-1000\{AFF372CE-4609-47F4-A776-28EB3E8D4C9A} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5992 msedge.exe 5992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2900 1008 msedge.exe 88 PID 1008 wrote to memory of 2900 1008 msedge.exe 88 PID 1008 wrote to memory of 2992 1008 msedge.exe 89 PID 1008 wrote to memory of 2992 1008 msedge.exe 89 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 3420 1008 msedge.exe 90 PID 1008 wrote to memory of 556 1008 msedge.exe 91 PID 1008 wrote to memory of 556 1008 msedge.exe 91 PID 1008 wrote to memory of 556 1008 msedge.exe 91 PID 1008 wrote to memory of 556 1008 msedge.exe 91 PID 1008 wrote to memory of 556 1008 msedge.exe 91 PID 1008 wrote to memory of 556 1008 msedge.exe 91 PID 1008 wrote to memory of 556 1008 msedge.exe 91 PID 1008 wrote to memory of 556 1008 msedge.exe 91 PID 1008 wrote to memory of 556 1008 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gfy.bst10cloud.com/identityserver/connect/authorize/callback?response_type=code%20id_token&nonce=bI5ksFMfyrcOR7dze4ycEA&state=_9n4wp745XABl4CtPjLC2A&code_challenge=Rzk1eO-NENCTp7tWo89D8wODAa42kBiEeUm1PkdZ6GM&code_challenge_method=S256&client_id=58cBTWueQwL5&scope=openid%20profile%20email%20primarysid%20upn&redirect_uri=http%3A%2F%2F127.0.0.1%2FAutoUpdater&response_mode=form_post&acr_values=idp%3AAzureScheme&[email protected]1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x250,0x7ffa930cf208,0x7ffa930cf214,0x7ffa930cf2202⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1772,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:32⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2192,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2456,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=2472 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3536,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3552,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4288,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4352,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:22⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5248,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5424,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5428,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3556,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5324,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3788,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3788,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6260,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=6276 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6400,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=6416 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6224,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6756,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6548,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=6772 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6816,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=6316 /prefetch:82⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6988,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=7008 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6992,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=7008 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4356,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=7104 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4400,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6932,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5588,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=4624 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7104,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=756,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=6168 /prefetch:82⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6960,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=7040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3324,i,10097944986017448040,13365759098384124766,262144 --variations-seed-version --mojo-platform-channel-handle=1032 /prefetch:82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
6KB
MD5d83083aec22c383a749cb93216fa5613
SHA15051a7e4d39ceb86cb7bef45aaac2581e4820f1c
SHA256f58cc8d6348a870dc33316f2d88388a2a5628728b24dd326aae3bd7c268d4b42
SHA512ea45933eae6fa1ed1917966a22c5fa9409fc7fb87c8ae2090c104a40b99bc2c0d8604add9979586c9b9014893a60a3757c0a33356441d9bf6bfc76e6ba80ea4f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5c99a7da23b3fff01a280a7ec6c5a676f
SHA13894cbc606f67f908917e9069e24cfe2353f87f4
SHA2566d2c7046e46927fab6c7e96d10ff0ead134e803c2aa558a76b4d3d426e510cc1
SHA512a631ff000f6667dc8399438f2e97d9e05e5b7773aa5550cb51cb41559fdf0529ebf604d65e368cb9fda7f6f6f0e2b1ad0a341a0d879a7c2a7651562ea1d240cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57e501.TMP
Filesize3KB
MD5117f2563bf61a971e4cbbb3cda10e46c
SHA18b98ab37807ebf9b5c652fd10e55f87b7e526d9d
SHA256b02a63f6b9d2a3da070f3a8fd39242c842bebfbb2704e5324fe982473e99384a
SHA5125dee1ccf0b12e74fd0ff6e7162ec9cd81ea2a0c6b03d7b393ec1b6613ac90af506f051a65284ede69bff2ea223ba6ccf3882ec1d01313deeda884533dbd61554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD559e16e4039ec0b73bd29deb75a288433
SHA1655dc686edf169f53a257fdd7c47f56b45a8adaa
SHA2568c4363631aaa808f818036a5d050140c5d780a8aa5034bd5ad04bf4b16401258
SHA512f6020f90b18603fc92ab6f61a3249312528583573cd5b94428784583315853d30caae8e26dfadfc664db5a5ad028167f57f65e231be6393b68e4dc08c1325326
-
Filesize
2KB
MD5b5ca5dd0dce415f7028387ba6457e094
SHA193dd7b592e7e634b5e2525b1cb263f4d993ac841
SHA2568e4a8a417427331d2a2c4ba7cd533d0fb5ea584a6ffd93f812238470ffe02498
SHA51295f9dabccd07e43b9025c47e560ec36ab46a391422c7279f23bfb4c7341749ca83119192444e5df3a2d95c488504eac7d21b8bf5f50efe5a9ba371d47a062539
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD57fd76f6af67219d7d08af381370a5c28
SHA15c37336c881e07f6c104c7afba87eeb2fc086e7e
SHA2567ffdc5e4c854188e499882bd6ee6f177acd04bd96cc0941e0f260c6c26c87a50
SHA512b30dc4506d8f23bb5457e50881d4b64fac1de2fc53679930f90a1bc25793c12ddfe9002b64daa739f34433829814c1715e18136faaf98fc7fa857f60d4577beb
-
Filesize
13KB
MD54cdca0e23532a1ccbecc364a9bca884a
SHA169f4fa9175f75921aa58db6268d7568042b1aa0d
SHA25694821bd3ef1b2f7043bea7d0dedf1e18dd29627cc1be8d185fd4cb2fcae5a63d
SHA512b9e1930aa224d7ec65f6ff85b326b9f8a2f980412cad4be87d10cc7c3b72fedae6c883598a01702d4647a2ffcb42e3cc2fb6336749e8ba674a127c56e87a6773
-
Filesize
36KB
MD53a7a89b5a2edda551b0c5452defaf72a
SHA1e738245e4a1fa258f20debf88ad410d86df596d7
SHA2569cc9445fddcecb5a2b48594e2d9b33d4fd246bd38937679dae6cee034cef0e8b
SHA512bf9d6caab24b3d5e7e4b700b801bdf4fbb8c3dc1ea36050211ef003ac822a272ab6eee14b4d7e609f8478d823e932a917fb423036b884d7d192e4c54a637172e
-
Filesize
4KB
MD519498ab757862430bd12ba6aba6eaa02
SHA15678e328fef6e7d53be3008de9d8a3f7ca8f30ec
SHA2560834b61e06e6f7bd3c537eaeaf7e5e06b4c22018e23ed2fa7a699735909be5f3
SHA5126fb8d2c24b71f66227447d5fa0a8c483a2771fec9ba5075e52e14767af6f4c04e93d8b5482871bff777dad9277e6a1cb9f553317c39645a284cbc05387a7645c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b603c0b9-ac64-465f-b1d1-e1d4dfeacb12.tmp
Filesize69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\24b16eec-c962-450b-9d5b-ad44a9cd6c2c.tmp
Filesize22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
Filesize
876B
MD513ee91822bfbc8edfd179487f8bdd694
SHA18107dc22689655390315f4c478ae6a595b8f4960
SHA256aac651da5bdd693dd884fc1a1fc78f6d1de2078b8fea2a15964de67bbe2f93fa
SHA512b174485344f205d5c73cdb47da717bbc0a8dce4e0bbb8ea9020d508c19917bca954a28d6c673d45243a2ee046e039fc2f43134f2e98f559a4821381851834f7c
-
Filesize
23KB
MD539ce4600e617e815f9ac315bad34d35d
SHA11c5b5d105c5aeccc9e579a147adcfb35630453eb
SHA256d1810025375872e4c4ed422dd2095c26b903a54ca3ea6115a450addafce99f45
SHA51269dea2eed90d199e4832fe6f068253be3ec16fa6c37a237da343b2c4ea6598296682cb26d21993bd770ce57ea98803bed3023b0ff6411e9618ab012fa1b2ceb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe58605b.TMP
Filesize467B
MD57a4fb9ce87b52568f1ef834b6aab85ab
SHA1cad04bb85eb3b616fecfc9fd24ffc24aef185f95
SHA256391ec04fbbd7a389a89c9999d7129cbd2be5ce3e95241ec23a827ba03727dbc9
SHA51276602b7b7e54b1f0e7ec426c321f94bf49becc0cfdd514878617555265eba0ec0946d3bedc97d7398454f44e465cbce0ace7b23e5e13bdeb8382864667ce9e9d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD5892d8de951c7fc2e44d178589e655fcb
SHA1a7b8fc9e58041e9e7aa349694c5bd3930bdd3828
SHA256b6ab70eefd19abc2a2df6be25c827cdebbaab6b295d692286f1c69dc2fc70dbf
SHA51249f2466e6153d2a2ba1ef586ec24c5ce786768551585ac1cc443f97d394eafe0d68a9302e03b40f3b2fcb9b83865b655bf6730310ad0482cb76c1eb810b48c9e
-
Filesize
39KB
MD53794e3157ba1f60ee011565999601688
SHA130ccba07714845b07369089710f692b8028e6711
SHA256350c80a1dd4c6ebf12d8e3c074de838379a1898641aebf29d80dcf4de08f461b
SHA512eee7eef9a61545576cdba712b0f1a36a4053fd3b6b5c67eb20f556fe2631c62f48108042d39a4d66a26e42fddfd990b592f0ab782beb03d7a1b607dd191cc3ac
-
Filesize
7KB
MD57120039d35af214380bc4c385bdca5c8
SHA17324e3a02a1aae27612acda38ee3d5ad3af35f01
SHA256a4b5c5b7632e74ce07a921196586739ef15d4e1b69993fb69713956a9f857ef8
SHA51276f0facacf01c9ca26372020f7da92ac07a7dd73e422ff36e94d783e31b0d28587494e0fecae8bf2e6c5a7d26d02657c381fd24dbe2c05d3a3494cc0c7e098d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD55cf525cc52bb666f34beb313514cee14
SHA1fd2aebea87dfb3632edd27649173ba729e356c33
SHA2565e17c6da8b804f21a9fd7ff37cbb806893fb36d8ebf8978440654255ba4d01ac
SHA5125f6ecf99cc7ac7aabc92b001890b3eaf10875a0da24b1927dcab8f7ba29997d1947ae0c632d665e159f96e319578d923fe76366fda9477eb5d6613501b91174a
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1008_1640495381\2156b1a4-9346-4042-9649-7fe6919e280a.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de