Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2025, 12:08
General
-
Target
vapev4.exe
-
Size
5.2MB
-
MD5
6b9b6812b8e6d61602667f0c992666e1
-
SHA1
37bfd6870570bf5a505c2f04eb2b9fea38a5b04b
-
SHA256
deb41cc8958cc50c40cf80e9a4fab93d8386f5434ba72eda040f3e18b5b3820c
-
SHA512
d76b11b978350ab440dfa26c66e1e1c21323f26e757ee6753d44961fc5fe6a64662f7c48a68c7e0b2090467fba71fc9345477aa726521cb75afb854c79a9cf6b
-
SSDEEP
98304:ym9tIN6GN8Uqs9jveeV30sLVDTJNJ3PijqD/HZc/8gcEnniAF:ymru6GNa2jfSwJNxij0/HZQ8gBnF
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/4028-2-0x00007FF662C40000-0x00007FF6634CA000-memory.dmp vmprotect behavioral1/memory/4028-3-0x00007FF662C40000-0x00007FF6634CA000-memory.dmp vmprotect behavioral1/memory/4028-764-0x00007FF662C40000-0x00007FF6634CA000-memory.dmp vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 26 discord.com 27 discord.com 29 discord.com -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\th\messages.json msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\fr_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\de\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\vi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ur\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\sk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\is\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ka\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\uk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\my\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\gl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ta\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\en\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_68977705\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\offscreendocument.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ja\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\lv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\da\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\fil\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\zu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\cs\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\el\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ca\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\en_GB\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\id\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\service_worker_bin_prod.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\km\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\zh_HK\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\fr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1860913706\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\no\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\sr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ml\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\sv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1755122772\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1755122772\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1755122772\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\eu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\lt\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ru\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_68977705\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\hr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ro\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ko\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\nl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\lo\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_68977705\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_68977705\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\tr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\ms\messages.json msedge.exe File created C:\Windows\SystemTemp\msedge_url_fetcher_1056_1013904588\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\dasherSettingSchema.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\af\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\pt_BR\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\iw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\pt_PT\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1056_1278733826\_locales\mr\messages.json msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876373325336459" msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2873637269-1458872900-2373203793-1000\{3108C992-2909-4623-9716-FF5CE3A15E22} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2873637269-1458872900-2373203793-1000\{7BE3C376-75AE-4E56-A37C-11DA833F0163} msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4028 vapev4.exe 4028 vapev4.exe 4028 vapev4.exe 4028 vapev4.exe 5952 msedge.exe 5952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 1056 4028 vapev4.exe 80 PID 4028 wrote to memory of 1056 4028 vapev4.exe 80 PID 1056 wrote to memory of 2964 1056 msedge.exe 81 PID 1056 wrote to memory of 2964 1056 msedge.exe 81 PID 1056 wrote to memory of 4388 1056 msedge.exe 82 PID 1056 wrote to memory of 4388 1056 msedge.exe 82 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4744 1056 msedge.exe 83 PID 1056 wrote to memory of 4924 1056 msedge.exe 84 PID 1056 wrote to memory of 4924 1056 msedge.exe 84 PID 1056 wrote to memory of 4924 1056 msedge.exe 84 PID 1056 wrote to memory of 4924 1056 msedge.exe 84 PID 1056 wrote to memory of 4924 1056 msedge.exe 84 PID 1056 wrote to memory of 4924 1056 msedge.exe 84 PID 1056 wrote to memory of 4924 1056 msedge.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\vapev4.exe"C:\Users\Admin\AppData\Local\Temp\vapev4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/xerafree2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e8,0x2ec,0x2f0,0x2e4,0x2c0,0x7ffc6dc6f208,0x7ffc6dc6f214,0x7ffc6dc6f2203⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1860,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:113⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2172,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=2168 /prefetch:23⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2520,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=2684 /prefetch:133⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3428,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:13⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3448,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:13⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4832,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=4856 /prefetch:13⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3756,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=3736 /prefetch:143⤵
- Modifies registry class
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4692,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:123⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5092,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=5344 /prefetch:143⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5332,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=5364 /prefetch:143⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5976,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=5700 /prefetch:143⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6124,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=5984 /prefetch:143⤵PID:400
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11044⤵PID:4268
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5700,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=6324 /prefetch:143⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5700,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=6324 /prefetch:143⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5784,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=6000 /prefetch:143⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6000,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=6352 /prefetch:143⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=736,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=6640 /prefetch:143⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6028,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=6380 /prefetch:143⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6036,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=6700 /prefetch:143⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5504,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:143⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6772,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=5100 /prefetch:143⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6876,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=1928 /prefetch:143⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6364,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:143⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6852,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=6296 /prefetch:103⤵
- Suspicious behavior: EnumeratesProcesses
PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5584,i,15838495041818198779,15580725007431193945,262144 --variations-seed-version --mojo-platform-channel-handle=3576 /prefetch:143⤵PID:5444
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2292
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:2840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD58272581d8cb38484cc8cb6afbdd0d37e
SHA12baa96a0439003aabaad1ce5619ea0a581cf261a
SHA256025356bf819ea8a5da44ac2c4510bc380a9448247a30665577430ca7a44ca297
SHA51260574186c595b0018d9223afd38e59378b1b00ef4f39be17ef2d7613cdac5b8f9e6dc3f2efefd559a0e4e8d64884d6ea155e874df13f170bb6dfbb41a0104959
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD5e1bd99312459c6b3162f2688f2bb8427
SHA13e920241995c972d5612640e7cf8ef4dad180c1f
SHA2567febee4b335a0c49b103697a6cde52bd444ff59a519a3821611972d58c89413a
SHA51244ff1123f5c2a91672460fba93d14ffd084778fc88c103d7ccffb4f9245970bd3a8473a34896475bf5fdad7ea42c29b1306a6c01e214ddcabc5de0933cd3dda3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe590565.TMP
Filesize4KB
MD58c3c1a7c97ae85ce7105c6f7ba912c0c
SHA1a87931696c9125b1dd3fb7faa65316dffdf3530c
SHA25688344e48ad6aba3bddc0550697ba93aee2b3874e4fefb5888a7d025126655e06
SHA5124f099425ea8dee80b41548424c5512b3c81934eac0c626b11091933c461d827de032296664aed6ad9cb213ef47ca3e9f4e71e00418fe89582ca5b43e8381fe4a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD579456bec530300c7e25ff9098b3a721a
SHA10f2e467e8fb8ebb5240a36cd3de50c4b1a5c087f
SHA2568db267f54b5ca8eb54fa8dea5881776da58e2c19f6da0f6b2c09263fc6f0403e
SHA512cdf7568eaad45c72afd48971364428568755c5dcf69399710259b171c6498cd78f2004c265a622f016592826719f869e5cf31dd34742b861d0d317589d845ed1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD59ffe1b2604744c5d6c2d3d2bec02195c
SHA15e44a6e6fa629731077d4ffc6b7dcd4310468215
SHA256200a665a221cf40b2578b5881af7f12a768ab636f3cb4bea60f8626425bcce19
SHA5128567ca54a42e8540a882ba7a1ffb1884169da724cb01a5a147c3efa13394026bf02beba7f7941e375f70a9cf755621a9d6d6e4f6789de5f24eda2bd43a5ae286
-
Filesize
16KB
MD56d6244a28bdff57c47b097b85948bb09
SHA15d0f2219f17c8eca9fe4f0aaee48348854baefec
SHA2567b4e3458ddc712e2e62ec464d66d5f3b6df3b38ba1233f4b1afae00fe6c98cdc
SHA512c1f94fe0eb0e97ad025197f71ac48adfaa1769ac4b8ff3f067e17e8376fde7fcecff6fbb72579ce4a01c23df1ba85467dea6568a7bf7ea03f18ea69d21a25610
-
Filesize
37KB
MD53fa21ec240bcd34519d0a04b4005c404
SHA1ee62f99be315e5a2f5561512b93cef3a16fd2064
SHA25614840d8f87c58df78f1fb5dcc392ff8e570ada74bfd76a841274c669864e30c1
SHA512c623d61d330f666c549d12ddd7511918b404fe7fcf67263ba39f5e03a4b92cb6d13055a917632807bed4757f520c7677335486f2629849f29d1edf59d314f8ae
-
Filesize
22KB
MD58defab9555b0541752cfbbe07f4f9846
SHA11499eaba851a97d52df3d48ba97fe4ca80fb5697
SHA256692d94877e4eb781e242e1782c1ccdf3c91e875656adf5c2c200b6cc9f2b8967
SHA512a0f10173439f8d67a9a77e2bef1a72287bc623444a935f3c9407a7e227d8953abb9dbb3fc2fb526ed8d7a7dfcb37ea9ca79cbfaf6f35b6884307bf6babd2c864
-
Filesize
467B
MD55739c18bcc321bd08ec58b4c01fe76fb
SHA197eef65caa39982c7b5b4a00f8f8950d64695a1d
SHA25693691ada2d5f4f8e77a9134bbb92521433195bf209c81ed9b9e3b57418ad7852
SHA512b42a427fc508e69b967ea5914e54da581235a0a65835e29ad5ef08464e8beef6450ec17e9b2ebf5cd067e31fa356163f8b8ec7ccfd42f54f9cb8208d444eb3cb
-
Filesize
898B
MD576392d9f40628628501df5a2a6f6b21a
SHA1b1ed0bf7865f9f66041acdb17f1e562ba3df0e5d
SHA2565b341eff9a94a248b5fa2779b643ce40ce45c8d8ed4e414e2a168c7985e64346
SHA512e5d69e81577a4c17cf1bcec26c3138bece711d4895a8a353bf9fd46d422761b2615af47b7afd7651e7e7867990ad5b094facda63b4b63bf7a590910c08344a6f
-
Filesize
23KB
MD5fa5c3ffe26f520ad4988f5caaab9e64e
SHA148b9897330ce5fb989912113293d02d0f36181aa
SHA2569c731418de31f3565f628b3ecd3ae5d6d721446df3af2149aa9ad9eca9434316
SHA512a75132d0f8922032e848214f18b110dcb0bba95bd25768a6a1a25a2e8fde759c9bd3e3a79856929886d2f8b3aab0cf2a90342c13eade5c69268994dac941004d
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
55KB
MD5a143087fad0f1289e71d0cc1c4e56e23
SHA10927506d89084ba10a2ae3350141641886d67018
SHA256d53c8db677527a4ce71afe4b659514bda7b3a8219d6134baf52d05d999333bbb
SHA5124dce37cd2f73d3cda8654aa4f71c62be40aa24d8882a5ffefd379e2f66871a3bef813e074e30d57d3afae1fc66ceb58315784c68f0770000a055975c4e37df7c
-
Filesize
50KB
MD5008b2eaa628c0ec053843119397052b4
SHA1e09f35e7b3fcbe1f03eca38e55f75c0535c80b03
SHA256153b47e2020e7e7a3e3e92123dfa39f77c9bf40c514b1aef9288cd78895ed0d6
SHA5121651926886a394d871fd93c6a7b202002a9a72e7be12b1d9a598285b1b50a317cc0d5ea50f5e76f16de5a14bfd71b295731418063c336eb2ab7032b50ed9667c
-
Filesize
40KB
MD5ae8a694c792b50ea31322d8ba9d78e80
SHA11e0df4f1d36215158b8753268799af82bb41aa34
SHA256fedcb20377bd52b1862fc16fe812a2166e9aa77f262b3cf9946bcbdb36d942ac
SHA512fb2d4c4d2db1d5993faf8d03d39d1201ca6f6cb3bea5c5c3acc4d49a1aea450295b091eff0562792e45deae616e482efd74017f2f00dd6f108645d623f46b99c
-
Filesize
41KB
MD5e6583604bdf0429028109e5a6b95d97f
SHA123ffd503cd1a66cf2cd27657549c4cb13991ff96
SHA2560346bc6313a03ee96592d975c3afbc9fffec790d5de26a25269b182436774981
SHA51298e97fc8c2580c0b9d23ad1bf2ece9ffcbef7605cadeb7f0680d82a8da7a58e94688ed4c99e86b79c677c83f980522291ab12b29a765dbef208cd236cecbfd2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1